Chainkit cyber integrity automation (@chainkit) 's Twitter Profile
Chainkit cyber integrity automation

@chainkit

Automate and attest to the integrity of any data, of any type, in motion and at rest—in real-time | Ransomware, APT Detection | Forensics | Compliance

ID: 1027674621015932928

linkhttps://chainkit.com calendar_today09-08-2018 21:54:57

1,1K Tweet

258 Followers

420 Following

Jeethu Rao (@jeethu) 's Twitter Profile Photo

Brian Roemmele So much FUD! Macs also come with a Secure Enclave (aka TPMs elsewhere), which are unaffected by attacks like this. Keeping plaintext encryption keys in memory is sloppy software engineering. Hardware can’t save users from badly written software. support.apple.com/en-gb/guide/se…

BioTone ZKI (@autopilotcyber) 's Twitter Profile Photo

Post-PKI #P2KI is more urgent than Post-Quantum Cryptography #PQC over the short term, And safer over the long term. We said what we said.

Post-PKI #P2KI is more urgent than Post-Quantum Cryptography #PQC over the short term,

And safer over the long term.

We said what we said.
🔯 Balanced Acceleration (b/acc) ☮️ (@accbalanced) 's Twitter Profile Photo

Ars Technica AI has the most valuable unprotected infrastructure in the world. That is about to finally change. This targeted cyber attack (they all are now) was on my ‘inevitable list’ since 2022. There may have prior related cyber attacks before the new disclosure rules. Worse - the back

BioTone ZKI (@autopilotcyber) 's Twitter Profile Photo

Why transition cryptography twice before the end of the decade, when you can skip another asymmetric encryption transition (Kyber) and graduate directly to accessible symmetric-only cryptography for all? The post-PKI era is here. media.defense.gov/2022/Sep/07/20…

Why transition cryptography twice before the end of the decade, when you can skip another asymmetric encryption transition (Kyber) and graduate directly to accessible symmetric-only cryptography for all?

The post-PKI era is here. 

media.defense.gov/2022/Sep/07/20…
🔯 Balanced Acceleration (b/acc) ☮️ (@accbalanced) 's Twitter Profile Photo

Dave Kennedy More incentive to usher in the Post-PKI era. Keys to the kingdom are not a cyber liability when they are autonomous, zero-knowledge, ephemeral and quantum random:

IAM!ERICA (@ericazelic) 's Twitter Profile Photo

The CIA Triad - foundation of information security - Confidentiality - Integrity - Availability If you have no smb signing requirements and enforcements, what are you missing?

Jan Bakker (@janbakker_) 's Twitter Profile Photo

Learn all about passkeys! With the upcoming release of passkeys in Microsoft 365, it's essential to know what's going on under the hood. Stumbled upon this brilliant piece that will help you understand how passkeys can be used cross-platform. corbado.com/blog/webauthn-…

🔯 Balanced Acceleration (b/acc) ☮️ (@accbalanced) 's Twitter Profile Photo

mRr3b00t Yes. But I’m feeling young again by creating the 21st century version of this that’s Post-PKI, via Autonomous Key Management (AKM). Zero-knowledge symmetric cryptography for all. Already Post-Post-Quantum 😎

🔯 Balanced Acceleration (b/acc) ☮️ (@accbalanced) 's Twitter Profile Photo

Andrew Thompson I’m applying this to first-principles encryption. PKI and asymmetric encryption was appropriate for the 1980s. No more. Today PKI is an unmitigated mess of risk via excessive complexity and misplaced trust. PKI defeats zero trust. Cleaner simpler lighter-weight ubiquitous zero

BioTone ZKI (@autopilotcyber) 's Twitter Profile Photo

Post-PKI is real. The economic benefits of a Quantum Leap in cyber _security_ are irresistible. Ask us how you can start to enjoy them!

Post-PKI is real.

The economic benefits of a Quantum Leap in cyber _security_ are irresistible. 

Ask us how you can start to enjoy them!
Luiza Jarovsky (@luizajarovsky) 's Twitter Profile Photo

🚨 AI Policy Alert: The German Federal Office for Information Security publishes the report "Generative AI Models - Opportunities and Risks for Industry and Authorities." Quotes & comments: "LLMs are trained based on huge text corpora. The origin of these texts and their quality

🚨 AI Policy Alert: The German Federal Office for Information Security publishes the report "Generative AI Models - Opportunities and Risks for Industry and Authorities." Quotes & comments:

"LLMs are trained based on huge text corpora. The origin of these texts and their quality
Lukas Beran (@lukasberancz) 's Twitter Profile Photo

Why Azure Logs Should Matter in Your Cybersecurity Strategy Experience how the game-changing power of Azure Log Analysis is fundamentally reshaping your approach to cybersecurity. Build an incident-response plan following actions from first-breach threat actors with the

cygaar (@0xcygaar) 's Twitter Profile Photo

Curious how Coinbase’s new smart wallet works? I was too. Here’s an overview of how it’s possible to create and use a crypto wallet through Touch ID without ever needing a chrome extension. 1. The secret sauce Here's a demo video of a smart wallet in action:

Curious how Coinbase’s new smart wallet works? I was too.

Here’s an overview of how it’s possible to create and use a crypto wallet through Touch ID without ever needing a chrome extension.

1. The secret sauce

Here's a demo video of a smart wallet in action:
Anush Elangovan (@anushelangovan) 's Twitter Profile Photo

As models get larger if you want the largest amount of GPU memory capacity _today_ you need MI325X with 256GB of HBM3e per GPU - with 8 in a node. Congratulations to the Vultr team for bringing the MI325X to the mass market - explore what it can do for your demanding workloads.

Pix🔎 (@pixonchain) 's Twitter Profile Photo

There are only a few ways to get that kind of information. • Inside job – Someone leaked the signer list. • Social engineering – Lazarus studied their emails & behavior. • Device compromise – One or more signers were infected with malware. This means other exchanges are at

There are only a few ways to get that kind of information.

• Inside job – Someone leaked the signer list.
• Social engineering – Lazarus studied their emails & behavior.
• Device compromise – One or more signers were infected with malware.

This means other exchanges are at