Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile
Sooraj Sathyanarayanan

@ianonymous3000

Helps you be safer in the cyber world 🌐; Advocate for Privacy and Digital Freedom; sometimes about Productivity👨‍💻. Founder & Chapter Lead @null_neu

ID: 1397773033

linkhttps://linksta.cc/@ianonymous3000 calendar_today02-05-2013 17:47:49

9,9K Tweet

2,2K Followers

1,1K Following

Ente (@enteio) 's Twitter Profile Photo

Mozilla has granted Ente $100,000 to build an #opensource, #privacy preserving AI 💰  We'll join the Mozilla Builders Accelerator by Mozilla Developer! ⚡  More details in comments 👇

Mozilla has granted Ente $100,000 to build an #opensource, #privacy preserving AI 💰 

We'll join the Mozilla Builders Accelerator by <a href="/mozhacks/">Mozilla Developer</a>! ⚡ 

More details in comments 👇
AI at Meta (@aiatmeta) 's Twitter Profile Photo

📣 Introducing Llama 3.2: Lightweight models for edge devices, vision models and more! What’s new? • Llama 3.2 1B & 3B models deliver state-of-the-art capabilities for their class for several on-device use cases — with support for Arm, MediaTek & Qualcomm on day one. •

📣 Introducing Llama 3.2: Lightweight models for edge devices, vision models and more!

What’s new?
• Llama 3.2 1B &amp; 3B models deliver state-of-the-art capabilities for their class for several on-device use cases — with support for <a href="/Arm/">Arm</a>, <a href="/MediaTek/">MediaTek</a> &amp; <a href="/Qualcomm/">Qualcomm</a> on day one.
•
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

For the Blue Team: - Expand monitoring to include user-specific directories. - Customize detection rules and leverage behavioral analytics. This helps with better threat detection. Stay vigilant! 🔒

Ente (@enteio) 's Twitter Profile Photo

In case you missed it, you can now #share your 2FA codes with Auth! 🚨 Your team can access the codes only for the duration you specify ⏰ Everything, end-to-end encrypted 🔐

In case you missed it, you can now #share your 2FA codes with Auth! 🚨

Your team can access the codes only for the duration you specify ⏰

Everything, end-to-end encrypted 🔐
null NEU (@null_neu) 's Twitter Profile Photo

Join us for an enlightening presentation on data privacy by Naomi Brockwell priv/acc, renowned tech journalist and privacy advocate, at Northeastern on Oct 4, 2024, 6 PM onwards. Learn essential strategies to protect your personal info in today's digital landscape. #PrivacyFirst

Join us for an enlightening presentation on data privacy by <a href="/naomibrockwell/">Naomi Brockwell priv/acc</a>, renowned tech journalist and privacy advocate, at Northeastern on Oct 4, 2024, 6 PM onwards. Learn essential strategies to protect your personal info in today's digital landscape. #PrivacyFirst
Naomi Brockwell priv/acc (@naomibrockwell) 's Twitter Profile Photo

If anyone is in the Boston area Oct 4, join me at Northeastern University! I want to discuss how we can accelerate privacy 🚀💪🛡️🔏 meetup.com/bostonzcash/ev…

Ente (@enteio) 's Twitter Profile Photo

🚨 Your Google Keep notes aren't as private as you think. 📝 Every thought you jot down could be analyzed to profile you. Google's privacy policy allows this. It's a data goldmine for Google. Why stick with Google Keep when superior alternatives exist?

🚨 Your <a href="/Google/">Google</a> Keep notes aren't as private as you think. 📝

Every thought you jot down could be analyzed to profile you. Google's privacy policy allows this. It's a data goldmine for Google.

Why stick with Google Keep when superior alternatives exist?
GrapheneOS (@grapheneos) 's Twitter Profile Photo

GrapheneOS users on 8th/9th gen Pixels are making a massive contribution to getting memory corruption bugs in the open source ecosystem thanks to the nice crash report notifications created by our hardware memory tagging feature. One of the latest fixes: github.com/mullvad/mullva…

Keith (@gnukeith) 's Twitter Profile Photo

Chromium's sandboxing on Linux and Chrome OS uses a multiprocess model to assign different privileges to various browser parts. There are 2 layers: Layer-1 (semantics layer) prevents resource access using the setuid sandbox, and Layer-2 (attack surface reduction layer)

BostonSecurityMeetup (@securitymeetup) 's Twitter Profile Photo

Back in October for #cybersecurityawareness month ! Thanks to @google for hosting us. Thanks to SnapAttack for sponsoring us ! We have Thomas Gleason talking about balancing innovation with security ! & Benny talking about Revival Hijack! RSVP at meetup.com/the-boston-sec…

Back in October for  #cybersecurityawareness month ! Thanks to @google for hosting us. Thanks to <a href="/snapattackHQ/">SnapAttack</a> for sponsoring us ! We have <a href="/thomasdgleason/">Thomas Gleason</a> talking about balancing innovation with security ! &amp; Benny     talking about Revival Hijack! RSVP at meetup.com/the-boston-sec…
OWASP Boston (@owaspboston) 's Twitter Profile Photo

Another OWASP Boston Chapter Meetup! This time we have Audrey Long talk about Threat Modeling Fundamentals! RSVP and Grab a spot on October 9th ! You can attend this in person or online meetup.com/owaspboston/ev… #owasp #owaspboston #appsec #threatmodel #security

Another OWASP Boston Chapter Meetup!
This time we have Audrey Long talk about Threat Modeling Fundamentals! RSVP and Grab a spot on October 9th ! You can attend this in person or online
meetup.com/owaspboston/ev…
#owasp #owaspboston #appsec #threatmodel #security
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

It's not just about what companies know about you, but how that data can be combined, shared, and ultimately weaponized. Metadata like location & activity logs may seem harmless on their own but can reveal intricate patterns about a person's behavior and identity when correlated.

Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

Spotted Mullvad.net VPN and browser ads on the Green Line in Boston! #Privacy and #security are more important than ever in the US 🇺🇸 Have you tried Mullvad yet? They are solid. #Mullvad

Spotted <a href="/mullvadnet/">Mullvad.net</a> VPN and browser ads on the Green Line in Boston! 

#Privacy and #security are more important than ever in the US 🇺🇸 

Have you tried Mullvad yet? They are solid. #Mullvad
Naomi Brockwell priv/acc (@naomibrockwell) 's Twitter Profile Photo

In today’s digital world, nothing is truly secure. We don't need to keep a permanent trail of all our conversations. Disappearing messages are a great tool in your privacy toolbox for this increasingly permanent digital age. youtu.be/T32XfRSaC0w odysee.com/@NaomiBrockwel…

In today’s digital world, nothing is truly secure. We don't need to keep a permanent trail of all our conversations. Disappearing messages are a great tool in your privacy toolbox for this increasingly permanent digital age.
youtu.be/T32XfRSaC0w
odysee.com/@NaomiBrockwel…
Naomi Brockwell priv/acc (@naomibrockwell) 's Twitter Profile Photo

Last night at Northeastern U. University we held the first ever priv/acc community meetup to discuss how we can accelerate privacy. Thanks so much to everyone who came out! Let's do this!!! 💪🚀🛡️ #PrivacyIsNormal null NEU

Last night at <a href="/Northeastern/">Northeastern U.</a> University we held the first ever priv/acc community meetup to discuss how we can accelerate privacy.

Thanks so much to everyone who came out! Let's do this!!! 💪🚀🛡️
#PrivacyIsNormal <a href="/null_NEU/">null NEU</a>
Sooraj Sathyanarayanan (@ianonymous3000) 's Twitter Profile Photo

Performance Comparison: all core workload - Intel single core workload - Apple Intel Core i9 14th Gen vs Apple M3 Max 16 Core CPU Benchmark: cpubenchmark.net/compare/5867vs… These are the processors on a System76 laptop vs Macbook Pro

Performance Comparison: 
all core workload - Intel
single core workload - Apple 

<a href="/intel/">Intel</a> Core i9 14th Gen vs <a href="/Apple/">Apple</a> M3 Max 16 Core

CPU Benchmark: cpubenchmark.net/compare/5867vs…

These are the processors on a <a href="/system76/">System76</a> laptop vs Macbook Pro