melissa Profile Banner
@melissa Profile
@melissa

@melissa

Followers
29K
Following
89K
Media
1K
Statuses
4K

experiments in parenting from first principles / n=1 experiments in biohacking / internet anthropologist

elon’s 𝕏
Joined February 2008
Don't wanna be here? Send us removal request.
@melissa
@melissa
2 months
one time as a kid, my dad told me about some old research he'd read he said, maybe asian kids are better at math because they just try 50% longer
78
485
12K
@melissa
@melissa
5 days
i like the way he ends he says, here at two sigma, we value learning and studying then he goes, if you ask me something or tell me something, where either of us learns anything, i'll give you some two sigma swag unsurprisingly, it's a deck of cards
0
0
15
@melissa
@melissa
5 days
@BlackHatEvents he similarly warns of oauth tokens "those things live forever"
1
0
8
@melissa
@melissa
5 days
this is pretty much where i've landed too
1
0
6
@melissa
@melissa
5 days
@BlackHatEvents even in the more granular api mechanisms of google workspaces, he notes that the access controls do not effect first-party google apps first-party google apps is where his not-google app shows up
1
0
6
@elijahliststeve
Steve Shultz
15 days
Three months of confusion. One revelation: God was listening the whole time. Get the rest of the story on my page.
0
19
170
@melissa
@melissa
5 days
this vector has much of the same durability as the one i posted again, in the authorization layer, oauth tokens are post authentication he too notes that in the event of account compromise, password resets have no effect at all nor do traditional recovery mechanisms generally
1
0
6
@melissa
@melissa
5 days
after he tracks down the decoded string, he also finds it referenced in a listserv the post is by a co-author of many oauth specs, including RFC 8252, the oauth spec in question he has nothing nice to say
1
0
8
@melissa
@melissa
5 days
it was real
1
0
9
@CelsiusOfficial
CELSIUS Energy Drink
20 days
Limited time. Lasting impression.
75
52
625
@melissa
@melissa
5 days
@BlackHatEvents it was hard for me to believe, and i did go look at it myself
1
0
9
@melissa
@melissa
5 days
@twosigma "i don't know how many of you have ever been involved in developing a secure message passing or credential storage system" "i don't know if you've ever thought, you know where we should put that? put it in the browser title bar" "it's easy for me to make a joke in hindsight"
1
0
10
@melissa
@melissa
5 days
@BlackHatEvents in his research into google's oauth, he notices some weird string he decodes it and searches the documentation it says, google's authorization server should return the authorization code *in the browser's title bar*
1
0
10
@melissa
@melissa
5 days
"if you tell your users to look for [an authorization to a third-party app], they're not going to find it"
1
0
10
@TENGAUSA_online
TENGA USA Online
3 days
Pleasure that envelops you. Pleasure you've never felt before. TENGA FLIP 360 🛸
0
0
2
@melissa
@melissa
5 days
@twosigma @BlackHatEvents it's unrelated to the vector i posted, other than it's also oauth it's more facile, requiring explicit consent, albeit from a first-party google service to another first-party google service the trick is, it's not google it's a third-party impersonating google, and succeeding
1
0
13
@melissa
@melissa
5 days
this is brian smith-sweeney, he heads up infosec risk at two sigma he gave a talk at black hat back in 2023 two years prior, in 2021, he'd accidentally discovered a new vulnerability in google's oauth he stresses the attack vector is not limited to google
4
0
41
@melissa
@melissa
7 days
@Casshibra he was the superior lobotomist https://t.co/We8JIK2uNq
spencermichaels.github.io
0
9
124
@melissa
@melissa
6 days
you can just break things
@MysteryHacker1
1223334444555554444333221
7 days
@melissa breaking things is easy melissa. statistically speaking almost every intervention you can make to a compute makes it less likly to operate as intended.
1
0
17
@BrandXJon
Jon Schiefer
6 days
On of my favorite quotes from https://t.co/6zu6VAwlw1 is "The easiest way into any home network is through the TV." It seems that threat has been exploited on an international scale.
Tweet card summary image
thebxi.com
@melissa
@melissa
8 days
we didn't want a smart tv, but there's no more dumb ones out of the box, it was so slow we joked it had north korean spyware joke's on us, it did a man in the middle attack compromised every device except, strangely, mine all because i'd bullied google into deleting youtube
1
2
16
@CWDenizen
Clown World Resident⏩
6 days
@melissa This is the safest approach regardless of what Google does. If you cannot trust the hardware then there's nothing to stop its manufacturers from simply using your TV as a computer. There is no authentication protocol that can prevent that.
0
1
11
@sidewayskoyote
SidewaysKoyote
7 days
@Michelgrabowy @ADioumaev @melissa don't assume the TV is not connected. ANy snippet of code can cause it to connect. ever accidentally had that setting on your phone where it always looks for a wifi network? (carriers like to default that one during upgrades to save data packets transiting the cell network) the
4
1
19
@yacineMTB
kache
6 days
you can just do things btw please do not let a corporation have root access to your home
@melissa
@melissa
7 days
needless to say, there will be no more smart tvs this leaves scarce choices: –– old tv –– projector (surprisingly hard to find dumb) –– commercial signage display screen (dumb but notably low quality) i picked d/ none of the above i decided to lobotomize a smart tv instead
24
24
760
@oossoonngg
song
6 days
@melissa ancient technique of smart tv acupuncture, wise
0
1
5