Sven Haster (@buurmansven) 's Twitter Profile
Sven Haster

@buurmansven

Programmer. Gamer.
He/him.

ID: 352956496

linkhttps://www.crashdata.nl calendar_today11-08-2011 09:57:08

4,4K Tweet

88 Followers

296 Following

Janel Comeau 🍁 (@verybadllama) 's Twitter Profile Photo

on the one hand, small-scale subsistence farming is such a uniquely miserable lifestyle that escaping from it has been one of the primary goals of mankind over the last 10,000 years but on the other hand, homesteading does look very cute on Instagram

Jarno van Straaten🍉 (@jarnovstraaten) 's Twitter Profile Photo

🏳️‍⚧️YES!🏳️‍⚧️ Motie aangenomen! #Deventer is na Nijmegen en Groningen de derde stad van Nederland die de kosten voor wijziging van geslachtsregistratie gaat vergoeden, van deskundigenverklaring tot nieuwe paspoorten. Een enorme overwinning voor de queer gemeenschap in Deventer!🏳️‍⚧️🏳️‍🌈

🏳️‍⚧️YES!🏳️‍⚧️

Motie aangenomen!

#Deventer is na Nijmegen en Groningen de derde stad van Nederland die de kosten voor wijziging van geslachtsregistratie gaat vergoeden, van deskundigenverklaring tot nieuwe paspoorten. Een enorme overwinning voor de queer gemeenschap in Deventer!🏳️‍⚧️🏳️‍🌈
John Bull (@garius) 's Twitter Profile Photo

To understand Musk's renewed obsession with X and focus on financial services, you REALLY need to understand the X/Confinity merger that became PayPal. And, particularly, the Peter Thiel-led coup that kicked Musk out as CEO/Chief Strategist. Here's how that happened. 1/🧵

Nina Turner (@ninaturner) 's Twitter Profile Photo

There’s literally a children’s board game that demonstrates that “free-market capitalism” always leads to one person controlling everything.

Jake Williams (@malwarejake) 's Twitter Profile Photo

.Tenable CEO posted about a vulnerability in Azure allowing for unauthenticated cross-tenant data disclosure. The timeline shared is frankly unacceptable, especially given that many organizations will only have 90 days of logs to investigate. 1/ linkedin.com/pulse/microsof…

.<a href="/TenableSecurity/">Tenable</a> CEO posted about a vulnerability in Azure allowing for unauthenticated cross-tenant data disclosure. 

The timeline shared is frankly unacceptable, especially given that many organizations will only have 90 days of logs to investigate. 1/
linkedin.com/pulse/microsof…
Bishop Talbert Swan (@talbertswan) 's Twitter Profile Photo

Kalief Browder was FALSELY accused of stealing a backpack. He spent three years in Rikers Island, one of the worst prisons in the world, awaiting trial, mostly in solitary confinement. He committed suicide. Donald Trump has 78 federal and state criminal charges. He goes home

Kalief Browder was FALSELY accused of stealing a backpack. He spent three years in Rikers Island, one of the worst prisons in the world, awaiting trial, mostly in solitary confinement.

He committed suicide.

Donald Trump has 78 federal and state criminal charges. He goes home
AFRICAN & BLACK HISTORY (@africanarchives) 's Twitter Profile Photo

Inventions that would not exist without Black Women. —A THREAD— Valerie Thomas, NASA physicist, invented 3D Movies In 1977, she began to develop the illusion transmitter, the 1st mechanism that allowed images to be viewed in 3D using concave mirrors & rays of light.

Inventions that would not exist without Black Women. 

          —A THREAD—

Valerie Thomas, NASA physicist, invented 3D Movies

In 1977, she began to develop the illusion transmitter, the 1st mechanism that allowed images to be viewed in 3D using concave mirrors &amp; rays of light.
DutchNews.NL (@dutchnewsnl) 's Twitter Profile Photo

The fraud was first discovered in 2017 but still continues today, because IT systems are not linked. dutchnews.nl/2023/08/dozens…

Halvar Flake (@halvarflake) 's Twitter Profile Photo

Idk, but doing "anti fuzzing" is equivalent to "how to cheat your scale when trying to lose weight". If course it's doable. So is sticking pencils up my nose. But neither is a good research frontier.

Halvar Flake (@halvarflake) 's Twitter Profile Photo

Claudio Criscione Other thoughts: Am I increasing the cost for an attacker *more* than fuzzing & fixing? Am I removing all benign players? Why should users pay for my deficiencies?

Adam Karpiak (@adam_karpiak) 's Twitter Profile Photo

“Hiring the best candidate” and “hiring the best candidate willing to put up with your interview process” are two different things.

SwiftOnSecurity (@swiftonsecurity) 's Twitter Profile Photo

🤬USERS ARE IDIOTS IGNORING YOUR MESSAGES, BLAMING YOU?🤬 Here's the thing about communication. After a few words your possibility space is more atoms than the galaxy. You haven't iterated enough. You need to experiment. Here's what I've learned ~20 yrs in support messaging.🧵

Kirsten Verdel (@locuta) 's Twitter Profile Photo

Dag allen, ik heb een update, zet je schrap voor wat... gekkigheid. Eén van de andere mensen die een brief had gekregen ivm vermeende aanwezigheid op Schiphol is vorige week uitgenodigd op gesprek bij de Koninklijke Marechaussee. Er werd gebeld of dat kon, de vólgende dag (!) 1/

SwiftOnSecurity (@swiftonsecurity) 's Twitter Profile Photo

The work I am doing in the fundamental configuration of machines is every bit as Security as threat hunting and SOC and red team. Everything they do is built off the fundamentals and consistency of the environment. To "win" before it ever happens. And leave no doubt when it ends.