Harris Nussbaum (@harrislion16) 's Twitter Profile
Harris Nussbaum

@harrislion16

Senior Cybersecurity & Technology Leader with Over 25 years of experience managing and directing multi-functional teams across multiple engineering disciplines.

ID: 1497221139407458306

linkhttp://engma.io calendar_today25-02-2022 14:45:23

180 Tweet

415 Followers

20 Following

ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

Myth 01: “A VPN makes me untraceable.” Let’s get this straight: A VPN does not make you invisible. It only changes what observers see at different points of the traffic route. It can reduce some tracking, but it doesn’t erase archived traffic patterns, correlation, account

Myth 01: “A VPN makes me untraceable.”

Let’s get this straight: A VPN does not make you invisible.
It only changes what observers see at different points of the traffic route. It can reduce some tracking, but it doesn’t erase archived traffic patterns, correlation, account
ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

RAVID is at the very core of the Enigma Protocol. Contrary to traditional network infrastructures, RAVID provides a fluid network infrastructure. It continuously randomizes routes, nodes and session characteristics by distributing traffic across adaptive tunnels that change over

RAVID is at the very core of the Enigma Protocol.

Contrary to traditional network infrastructures, RAVID provides a fluid network infrastructure. It continuously randomizes routes, nodes and session characteristics by distributing traffic across adaptive tunnels that change over
Harris Nussbaum (@harrislion16) 's Twitter Profile Photo

In the early days of radio, intelligence work wasn’t just about hearing the enemy, it was about finding them. We would sit hunched over receivers, spinning dials through static, or as we called it, “spinning and grinning.” Most of the time there was nothing but noise. Then

In the early days of radio, intelligence work wasn’t just about hearing the enemy, it was about finding them.

We would sit hunched over receivers, spinning dials through static, or as we called it, “spinning and grinning.” Most of the time there was nothing but noise. Then
ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

Thrilled to have our CISO and Chief Digital Privacy Officer, Jennifer Raiford in Tel-Aviv for the 2026 Cybertech Global Conference. Enigma on track to scale globally. cybertechisrael.com/speakers $ENX

Harris Nussbaum (@harrislion16) 's Twitter Profile Photo

Development update #001 We have completed a closed Beta of the productized RAVID infrastructure featuring the EPN beta. Everything is live, stable, and demonstrating the scalability it was designed for. Testing will continue this week, and then we will move into the public

ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

RAVID Tech Stack: Practical Implementation Choices Security and reliability claims depend on the concrete technologies used to implement them. RAVID’s tech stack demonstrates how its architectural goals are realized using established cryptographic, networking, and consensus

RAVID Tech Stack: Practical Implementation Choices

Security and reliability claims depend on the concrete technologies used to implement them. RAVID’s tech stack demonstrates how its architectural goals are realized using established cryptographic, networking, and consensus
ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

Identity & Authorization: Access Before Connectivity Traditional networks grant connectivity first and attempt to enforce trust later. RAVID reverses this order, ensuring that network access itself is conditional on identity and policy verification. RAVID enforces a strict

Identity & Authorization: Access Before Connectivity

Traditional networks grant connectivity first and attempt to enforce trust later. 

RAVID reverses this order, ensuring that network access itself is conditional on identity and policy verification.

RAVID enforces a strict
ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

Open Source Agentic AI: Risk or Opportunity? (Pt. 01) A new generation of AI agents has blown up worldwide over the last days, bringing to life immense hopes and horrible fears alike. In just one week, we’ve monitored hundreds of leaks, breaches, and privacy incidents, while

Open Source Agentic AI: Risk or Opportunity? (Pt. 01)

A new generation of AI agents has blown up worldwide over the last days, bringing to life immense hopes and horrible fears alike. In just one week, we’ve monitored hundreds of leaks, breaches, and privacy incidents, while
HydroshiPapii🌊 (@hydroshipapii) 's Twitter Profile Photo

Merlijn The Trader JPMorgan deploying real RWAs on Ethereum isn’t just bullish for $ETH but also a massive signal for privacy infrastructure institutions can’t operate fully transparent on-chain that’s exactly where $ENX fits Enigma is building Ethereum-native privacy infrastructure designed for

ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

Open Source Agentic AI: Risk or Opportunity? (Pt. 02) Part 01 of this article highlighted the attack vectors and opportunities of open-source advanced AI agents like Moltbot, Openclaw etc. In Part 02 we will break down the different kinds of risks presented by this new

Open Source Agentic AI: Risk or Opportunity? (Pt. 02)

Part 01 of this article highlighted the attack vectors and opportunities of open-source advanced AI agents like Moltbot, Openclaw etc.

In Part 02 we will break down the different kinds of risks presented by this new
ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

Announcement: Enigma Livestream EP. 06 Tomorrow, February 4th at 6pm EST We're excited to host another Enigma Live Session. This time we will get an extensive EPN Update by our Chief Architect Harris Nussbaum and our AI Lead Colby Myers. The stream will cover: • Recent

Announcement: Enigma Livestream EP. 06 

Tomorrow, February 4th at 6pm EST

We're excited to host another Enigma Live Session. This time we will get an extensive EPN Update by our Chief Architect <a href="/HarrisLion16/">Harris Nussbaum</a> and our AI Lead Colby Myers.

The stream will cover:
• Recent
Harris Nussbaum (@harrislion16) 's Twitter Profile Photo

Founder’s Notes (03) - Codes, Ciphers, and the Cat-and-Mouse Game In the 1930s and 40s, the German military placed its faith in a machine called Enigma. With its rotating wheels, plugboard settings, and astronomical number of possible keys, Enigma was believed to be unbreakable.

Founder’s Notes (03) - Codes, Ciphers, and the Cat-and-Mouse Game

In the 1930s and 40s, the German military placed its faith in a machine called Enigma. With its rotating wheels, plugboard settings, and astronomical number of possible keys, Enigma was believed to be unbreakable.
ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

"Encryption buys time. It delays, frustrates, and complicates. But it is never the whole defense." In the age of quantum computing and AI, cyber defense can't rely solely on encryption anymore. With the use of RAVID Enigma ensures that your data can not be found in the first

ENIGMA Protocol (@engma_io) 's Twitter Profile Photo

Did you know? The VPN industry has a major centralization problem. Research shows that 97 of the most popular VPN services are actually owned by just 23 parent companies. For you as a user, this creates a "shell game" where you think you’re choosing a new provider for better

Did you know?

The VPN industry has a major centralization problem. Research shows that 97 of the most popular VPN services are actually owned by just 23 parent companies. For you as a user, this creates a "shell game" where you think you’re choosing a new provider for better
Harris Nussbaum (@harrislion16) 's Twitter Profile Photo

Founder’s Notes (04) - Movement Is Life: The Radio Revolution By the mid-20th century, the rules of the spectrum were changing. Intercepting a steady, predictable signal had once been straightforward: find the frequency, tune in, and listen. But then came a breakthrough,

Founder’s Notes (04) - Movement Is Life: The Radio Revolution 

By the mid-20th century, the rules of the spectrum were changing. Intercepting a steady, predictable signal had once been straightforward: find the frequency, tune in, and listen. 

But then came a breakthrough,
Harris Nussbaum (@harrislion16) 's Twitter Profile Photo

Founder’s Notes (05) - The Fusion of SIGINT and Electronic Warfare For much of its history, Signals Intelligence (SIGINT) focused on interception. Operators captured transmissions, analyzed them, and passed intelligence through command structures. Over time, the mission

Founder’s Notes (05) - The Fusion of SIGINT and Electronic Warfare

For much of its history, Signals Intelligence (SIGINT) focused on interception. Operators captured transmissions, analyzed them, and passed intelligence through command structures. Over time, the mission
Harris Nussbaum (@harrislion16) 's Twitter Profile Photo

The Generational Leap of Warfare Warfare has always evolved through structural shifts. Each generation of conflict has been defined not only by new weapons, but by changes in how those weapons affected survivability and targeting stability. In the trenches of the First World

The Generational Leap of Warfare

Warfare has always evolved through structural shifts. Each generation of conflict has been defined not only by new weapons, but by changes in how those weapons affected survivability and targeting stability.

In the trenches of the First World