Cat Easdon (@cat_easdon) 's Twitter Profile
Cat Easdon

@cat_easdon

Privacy engineering @Dynatrace + research bridging the gap b/t tech and policy. Prev. fellow @VirtualRoutes, @InternetSociety + hacking CPUs. Opinions my own.

ID: 1217731613875933185

calendar_today16-01-2020 08:54:38

403 Tweet

446 Followers

1,1K Following

Wolfie Christl (@wolfiechristl) 's Twitter Profile Photo

I want to share some more details about what we found in our investigation into gambling data that are highly relevant to GDPR enforcement and privacy regulation at large. For example, this is how companies share personal data with each other during a bunch of 'cookie syncs'.

I want to share some more details about what we found in our investigation into gambling data that are highly relevant to GDPR enforcement and privacy regulation at large.

For example, this is how companies share personal data with each other during a bunch of 'cookie syncs'.
Matthew Green is on BlueSky (@matthew_d_green) 's Twitter Profile Photo

I’m mostly blaming law enforcement access for the existence of this data, but I also suspect that marketing and data sales revenue streams played a role in its insecure storage. Making that business illegal should be a national security priority.

Jake Williams (@malwarejake) 's Twitter Profile Photo

Okay, I'm just going to throw this out there, but maybe - just maybe - a vendor having the ability to change every one of their kernel drivers in the field at the same time without any approval from IT/end users is a model we need to reconsider... CrowdStrike.

Okay, I'm just going to throw this out there, but maybe - just maybe - a vendor having the ability to change every one of their kernel drivers in the field at the same time without any approval from IT/end users is a model we need to reconsider... <a href="/CrowdStrike/">CrowdStrike</a>.
Kim Wuyts (@wuytski) 's Twitter Profile Photo

The 3rd 🔶Privacy Threat Modeling Workshop (WPTM) 🔶 will be fully remote and free to attend! 🙌 The program will be a mix of research presentations 🎓, a panel session 💬, updates on the latest developments 💡 in the privacy threat modeling world. And I get to do the keynote 🤩

The 3rd 🔶Privacy Threat Modeling Workshop (WPTM) 🔶 will be fully remote and free to attend! 🙌

The program will be a mix of research presentations 🎓, a panel session 💬, updates on the latest developments 💡 in the privacy threat modeling world. And I get to do the keynote 🤩
Cory Doctorow NONCONSENSUAL BLUE TICK (@doctorow) 's Twitter Profile Photo

"Data At Work" is a research project from Cracked Labs that dives deep into the use of surveillance and control technology in a variety of workplaces - including workers' own cars and homes: crackedlabs.org/en/data-work 9/

Gergely Orosz (@gergelyorosz) 's Twitter Profile Photo

Lots of people have the impression that the EU’s AI regulation is reducing innovation. Read the details: it does this: in *critical areas* at a societal level where an AI system hallucinating would have major implications. Law enforcement, employment decisions , border control.

Jason Kint (@jason_kint) 's Twitter Profile Photo

This strong analysis by Stoller. “It was as if every night Google could break into the offices of WSJ and take its subscriber list, and then go to its own advertising clients and tell them that it could sell them access to Wall Street Journal readers for much cheaper rates.”

Peter Kraft (@petereliaskraft) 's Twitter Profile Photo

What happens if your CPU gets something wrong? If it wakes up one day and decides 2+2=5? Well, most of us will never have to worry about that. But if you work at a company the size of Google, you do, which is why this paper on "mercurial cores" is so fascinating. What the

What happens if your CPU gets something wrong? If it wakes up one day and decides 2+2=5?

Well, most of us will never have to worry about that. But if you work at a company the size of Google, you do, which is why this paper on "mercurial cores" is so fascinating.

What the
Lena Riecke (@lenarieckelr) 's Twitter Profile Photo

Join us at ECCRI for the ✨Virtual Research Workshops✨ this fall with a brilliant lineup of speakers tackling how emerging technologies put pressure on the international order and key pillars of democracy, such as human rights and the rule of law! ⚡️📌🗓️

John Scott-Railton (@jsrailton) 's Twitter Profile Photo

Pardon the interruption while every civil liberties advocate points out that they've warned about this for decades👇 Regularly scheduled programming of officials demanding backdoors & making unrealistic promises of safety will return shortly. x.com/KevinBankston/…

Meredith Whittaker (@mer__edith) 's Twitter Profile Photo

Case in point: there's no way to build a backdoor that only the "good guys" can use. When the entire technical community says that the EU's ChatControl legislation + similar pose serious cybersecurity threats, we're not exaggerating for effect.

Binding Hook (@bindinghook) 's Twitter Profile Photo

In Binding Hook’s latest, privacy researcher @Cat_Easdon asks, ‘How can we put into action ethical AI principles that have a societal and political impact within corporate cultures that have no appetite for ‘politics’?’ bindinghook.com/articles-bindi…

Max Smeets (@maxwsmeets) 's Twitter Profile Photo

Exited to announce that Binding Hook has partnered with Munich Security Conference to launch the AI-Cybersecurity Essay Prize Competition. This effort is intended to open a meaningful debate on the evolving role of Artificial Intelligence in cybersecurity and what it means for Europe’s future.

Exited to announce that <a href="/bindinghook/">Binding Hook</a> has partnered with <a href="/MunSecConf/">Munich Security Conference</a> to launch the AI-Cybersecurity Essay Prize Competition. This effort is intended to open a meaningful debate on the evolving role of Artificial Intelligence in cybersecurity and what it means for Europe’s future.
Heather Burns (@webdevlaw) 's Twitter Profile Photo

My only comment on the US election today is this ad, which is the kind of scenario I used to offer in my conference talks. Data is political. Whatever the outcome of the election is, the scene below doesn’t have to happen in real life. That’s up to you. youtu.be/3FGIyxhGkvo

Baptiste Robert (@fs0c131y) 's Twitter Profile Photo

Hackers claim to have breached Gravy Analytics, a US location data broker selling to government agencies. They shared 3 samples on a Russian forum, exposing millions of location points across the US, Russia, and Europe. It's OSINT time! 👇

Hackers claim to have breached Gravy Analytics, a US location data broker selling to government agencies. 

They shared 3 samples on a Russian forum, exposing millions of location points across the US, Russia, and Europe.

It's OSINT time! 👇
spq (@__spq__) 's Twitter Profile Photo

Here are the details about the AMD Signature verification vulnerability we worked on, Enjoy! bughunters.google.com/blog/542484235…

Bart Preneel (@bpreneel1) 's Twitter Profile Photo

The never-ending crypto wars. It's not key escrow, it's not a backdoor, it's not client side scanning: a magical solution will be developed that can only be used by the good guys. April 1.