Heidi Swart (@heidi_swart) 's Twitter Profile
Heidi Swart

@heidi_swart

Journo. Looking at security/surveillance/cyber/tinkers/tailors/soldiers/spies dailymaverick.co.za/author/heidisw…

ID: 115321435

calendar_today18-02-2010 09:06:23

5,5K Tweet

1,1K Followers

1,1K Following

Ian Cameron (@iancameron23) 's Twitter Profile Photo

This past week has been another significant reminder of just how deep the crisis of integrity runs in the South African Police Service. The allegations tabled by KwaZulu-Natal Provincial Commissioner, Lt Gen Mkhwanazi, are not just shocking. They emphasise what many of us have

This past week has been another significant reminder of just how deep the crisis of integrity runs in the South African Police Service.

The allegations tabled by KwaZulu-Natal Provincial Commissioner, Lt Gen Mkhwanazi, are not just shocking. They emphasise what many of us have
Nika Tweets⁷ (not ver-ified)☕️🐶🎵 (@tweets_nika) 's Twitter Profile Photo

Remember when Digital EU 🇪🇺 posted about the importance of quantum safe encryption because that will keep our communication safe? That post didn't really age well if you see that jurnalists are targeted by trojans again and again. #chatcontrol #EU netzpolitik.org/2025/paragon-s…

Sam Bent (@doingfedtime) 's Twitter Profile Photo

Border agents copy entire phone contents in seconds using Cellebrite devices. Full disk encryption only protects powered-off devices.

Border agents copy entire phone contents in seconds using Cellebrite devices. 
Full disk encryption only protects powered-off devices.
EFF (@eff) 's Twitter Profile Photo

A VPN is not a tool for anonymity, and while it can protect your location from some companies, there are many other ways companies may track you. ssd.eff.org/module/choosin…

defenceWeb (@defenceweb_afr) 's Twitter Profile Photo

The Defence Materiel Division blames an inefficient Armscor for poorly managing procurement as well as the dockyard, negatively impacting SANDF equipment serviceability. It recommends partnering with the Chinese Navy to improve vessel availability. defenceweb.co.za/featured/defen…

Luiza Jarovsky (@luizajarovsky) 's Twitter Profile Photo

🚨 BREAKING: The EU published the template for the mandatory summary of the content used for AI model training, and it's a game-changer for AI transparency [HINT: AI companies have had nightmares about it]: According to Article 53(1)(d) of the EU AI Act, providers of

🚨 BREAKING: The EU published the template for the mandatory summary of the content used for AI model training, and it's a game-changer for AI transparency [HINT: AI companies have had nightmares about it]:

According to Article 53(1)(d) of the EU AI Act, providers of
Heidi Swart (@heidi_swart) 's Twitter Profile Photo

General David Petraeus on War in Iran, Gaza and Ukraine | A Charlie Rose... youtu.be/fbCRFlEAJlU?si… via youtube.com/@charlierose?s…

𝚑𝚎𝚗𝚔 𝚟𝚊𝚗 𝚎𝚜𝚜 (@henkvaness) 's Twitter Profile Photo

ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index after our investigation. They thought they'd solved the problem. They were wrong. (1/5)

ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index after our investigation. They thought they'd solved the problem. They were wrong. (1/5)
𝚑𝚎𝚗𝚔 𝚟𝚊𝚗 𝚎𝚜𝚜 (@henkvaness) 's Twitter Profile Photo

Nicolas Deleur OpenAI Internet Archive DANΞ Grok Here are some newspaper articles based on this thread : German faz.net/aktuell/feuill… zeit.de/digital/intern… English themirror.com/tech/tech-news… telegraph.co.uk/business/2025/… Italian repubblica.it/tecnologia/202… French geeko.lesoir.be/2025/08/01/cha… numerama.com/tech/2045359-c… Russian

Sam Bent (@doingfedtime) 's Twitter Profile Photo

Why do cell towers triangulate your location even in airplane mode? The baseband processor runs independently from your main OS and can be remotely activated.

Why do cell towers triangulate your location even in airplane mode?
The baseband processor runs independently from your main OS and can be remotely activated.
amaBhungane (@amabhungane) 's Twitter Profile Photo

We refuse to accept that corruption is the cost of doing business with the state. AmaBhungane is joining legal challenges by the Western Cape Premier and the City of Cape Town against the new Public Procurement Act — a framework that risks entrenching corruption.

JvL 🇿🇦 (@jvanlogg) 's Twitter Profile Photo

“The United Nations estimates that money flowing to organised crime outstripped all the money that the developing countries could devote to long-term development. South Africa is losing a large portion of its GDP every year, to the illicit economy.” sars.gov.za/targeting-tax-…

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6