subhajitsaha0x Profile Banner
Subhajit Saha Profile
Subhajit Saha

@subhajitsaha0x

Followers
598
Following
1K
Media
139
Statuses
1K

Hacker | Security Engineer | Threat Intel & Appsec in Fintechs | Startup Security

🏔
Joined January 2022
Don't wanna be here? Send us removal request.
@subhajitsaha0x
Subhajit Saha
11 months
Are you a solo security engineer or part of a small team?.Got hired but have no idea where to start the foundational security? 🤔 . This blogpost can be helpful to kickstart your foundations for building the security in your startup.
Tweet media one
0
1
4
@subhajitsaha0x
Subhajit Saha
9 days
Do you know? .Every Chatgpt conversation you shares with your friends are already being indexed by search engines? .It is not you and your friend but the whole godaamn internet . It’s like taking a shower on the top floor of a skyscraper in Manhattan, completely exposed behind
Tweet media one
0
0
2
@subhajitsaha0x
Subhajit Saha
19 days
SYSTEM DESIGN & DSA is profound fundamentals of any branch of engineering. Security engineering fails if you have no concept of best class engineering.
0
0
0
@subhajitsaha0x
Subhajit Saha
23 days
NEGOTIATING WITH RANSOMWARE CYBER CRIMINALS LOOKS LIKE -
Tweet media one
Tweet media two
0
0
0
@subhajitsaha0x
Subhajit Saha
23 days
Rest - people posts , or discuss to look cool being 0 - . SOUNDS SMART ❌.MENTAL MASTURBATION ✅
Tweet media one
0
0
0
@subhajitsaha0x
Subhajit Saha
24 days
Why there is no mainstream coverage? . INDIA JUST BREAK THROUGH CYBERSECURITY WITH QUANTUM ENTANGLEMENT 🚨. Laws of Nature gives a perfect security, .Quantum key distribution (QKD) leverages the laws of quantum mechanics. Entangled photons are used to create keys , once tamper
Tweet media one
0
0
0
@subhajitsaha0x
Subhajit Saha
24 days
Thats cool !! Check your airtel app đź‘€
Tweet media one
0
1
3
@subhajitsaha0x
Subhajit Saha
24 days
🙌🏼.
@BNBCHAIN
BNB Chain
25 days
Help us build what comes next. BNB Chain is looking for collaborators on our next-gen architecture—sub-150ms finality, 20K+ TPS, native privacy, & Web2-level UX. Submit your proposal 👇 .
0
0
0
@subhajitsaha0x
Subhajit Saha
25 days
FREEE Audit your JWT tokens through your browser. Throw some love to @payloadunit . #BugBounty #pentest #securityengineering #ctf #hacking.
@payloadunit
Payload Unit
25 days
Introducing JWT Cracker – a focused offensive security tool for breaking down JWT Tokens. You can now audit tokens right from your browser - mobile friendly, bookmark & doesn’t need your machine to spin up. Try it live 👉
0
1
9
@subhajitsaha0x
Subhajit Saha
26 days
Be the Operator, Be your true USP !
Tweet media one
0
0
0
@subhajitsaha0x
Subhajit Saha
1 month
Where's yo bitch @?? .Payment transfer no cellular no internet no government no banks . Decentralised Revolution digital payment transfers P2P , E2E encryption. @jack 🙏
Tweet media one
0
0
0
@subhajitsaha0x
Subhajit Saha
1 month
We reject: kings, presidents, and voting. We believe in: rough consensus and running code. - David Clark, 1992
Tweet media one
0
0
1
@subhajitsaha0x
Subhajit Saha
1 month
"We reject: Central banks, trusted intermediaries, and fiat monopolies, government surveillances. We believe in: Code, Decentralized protocols, Cryptographic Consensus, and running Nodes" - Bitcoin whitepaper (Satoshi Nakamoto) . GOVERNMENT OF THE PEOPLE, BY THE PEOPLE, FOR THE
Tweet media one
0
0
0
@subhajitsaha0x
Subhajit Saha
1 month
"LLM users consistently underperformed at neural, linguistic, and behavioral levels".
media.mit.edu
 This study explores the neural and behavioral consequences of LLM-assisted essay writing. Participants were divided into three groups: LLM, Search Engine…
@subhajitsaha0x
Subhajit Saha
1 month
The (Natural Language Processing) NLP & Pattern Recognition for the human brain is way way faster & smarter than these ML artificial models . Our brain finds the best effective way of doing things, So our first approach is AI nowadays but hallucinations & spiral looping making
Tweet media one
0
0
0
@subhajitsaha0x
Subhajit Saha
1 month
The logic we can put into the routing layer whether Consistent hashing, Centralized Data or P2P gossip. From the security perspective with the metadata the hashing changes too , . Is it secure??.
0
0
0