Stilgherrian (@stilgherrian)

Wentworth Falls NSW AU

The below is an off-site archive of all tweets posted by @stilgherrian ever

May 25th, 2016

@OaaSvc You’ll need to speak to @hacklabs about that. It’s all a SEKRIT.

via TweetDeck in reply to OaaSvc

@dannolan Nope, an early one for me tonight.

via TweetDeck in reply to dannolan

And thus ends the presentations for Wednesday.

via TweetDeck

I just asked how this process can be scaled down. Have a clear plan for when you hand off to specialists. Don’t muddle through.

via TweetDeck

And there we are. These slides will be online later up, too. pic.twitter.com/dIb8m5TKL8

via Twitter for iPhone

Oh, and learn from the lessons. (What a good idea.) pic.twitter.com/4gbd4nvskb

via Twitter for iPhone

This is the most critical stage, we’re told. Do it while everyone’s there working the problem. pic.twitter.com/IZoYf7bK3c

via Twitter for iPhone

Before you put the system back into production… pic.twitter.com/ptInuxCHjC

via Twitter for iPhone

It’s a brave person who thinks they can clean a system rather than nuke it from orbit. pic.twitter.com/wbaXommMCL

via Twitter for iPhone

Take system images, but check that they’re not corrupted. And from there, what? pic.twitter.com/vYp2BMBpjD

via Twitter for iPhone

So do you containment straight away? Or do you need to gather evidence? pic.twitter.com/iSG37o0Mbt

via Twitter for iPhone

So if it IS an incident, do this. Document everything! pic.twitter.com/whxpNQPEoN

via Twitter for iPhone

@avulkan This is more or less across all phases of the cycle.

via TweetDeck in reply to avulkan

So what actually constitutes an “incident”? pic.twitter.com/jobioms45E

via Twitter for iPhone

Your jump bag should include all this stuff, so you’re ready to respond. pic.twitter.com/rKyYN71udq

via Twitter for iPhone

@nphair @OaaSvc There’s often a couple layers of mules now. Grunts get 5%. Grunt-organisers get more. Sometimes 25%, I think.

via TweetDeck in reply to nphair

There’s a key message in here, as always, about having a plan and rehearsing it.

via TweetDeck in reply to stilgherrian

The bullet points for the Preparation phase. (I’ll tweet these as an index to my notes.) pic.twitter.com/Q81MTTEK94

via Twitter for iPhone

And here are those six stages of incident response. pic.twitter.com/1MjoQehwQv

via Twitter for iPhone

Now in Ashley Deuble, Griffith University, “The 6 stages of incident response” conference.auscert.org.au/ashley-deuble

via TweetDeck

agarner If your drivers licence is in the hands of the bad guys Departments of Transport will not re-issue until it is misused

via Tweetbot for Mac (retweeted on 4:38 PM, May 25th, 2016 via TweetDeck)

OaaSvc If you need help with identity theft, talk to IDCARE.
idcare.org
1300 432 273

via TweetDeck (retweeted on 4:38 PM, May 25th, 2016 via TweetDeck)

MelbourneGeek 87% of cybercrimes iDCare deal with are self detected by the victim. More evidence in support of mandatory data breach laws

via Twitter for iPhone (retweeted on 4:38 PM, May 25th, 2016 via TweetDeck)

OaaSvc Of course this is only valid for 21 days. After that you need a police report id to do it for longer. You’ll never get an id.

via TweetDeck (retweeted on 4:37 PM, May 25th, 2016 via TweetDeck)

OaaSvc Few people know this, but you can tell all three bureaus to remove you.

via TweetDeck (retweeted on 4:37 PM, May 25th, 2016 via TweetDeck)

OaaSvc You can get a credit report for nothing off the three credit report agencies.

via TweetDeck (retweeted on 4:37 PM, May 25th, 2016 via TweetDeck)

OaaSvc So how about all those hotels who photocopy people’s cards. Or in some states, nightclubs?

via TweetDeck (retweeted on 4:37 PM, May 25th, 2016 via TweetDeck)

OaaSvc Drivers license number is THE most important detail in cyber crime. They don’t need the card.

via TweetDeck (retweeted on 4:37 PM, May 25th, 2016 via TweetDeck)

OaaSvc 8% of IDCARE’s clients require face to face mental health care. Mainly because of their treatment after the crime.

via TweetDeck (retweeted on 4:36 PM, May 25th, 2016 via TweetDeck)

OaaSvc The tech industry is the WORST performer in the data.

via TweetDeck (retweeted on 4:36 PM, May 25th, 2016 via TweetDeck)

OaaSvc Wow! The data IDCARE has shows that the degree of harm experienced from an identical cyber crime is dependent on postcode.

via TweetDeck (retweeted on 4:36 PM, May 25th, 2016 via TweetDeck)

OaaSvc IDCARE is helping Joanne with the mental health issues which have come out of this. Poor girl.

via TweetDeck (retweeted on 4:36 PM, May 25th, 2016 via TweetDeck)

OaaSvc JFC state & federal police forces need to stand up and work with these people. Not hang them out to dry. Get your act together.

via TweetDeck (retweeted on 4:36 PM, May 25th, 2016 via TweetDeck)

OaaSvc She is yet to hear from police. She probably never will. This is not good enough!

via TweetDeck (retweeted on 4:36 PM, May 25th, 2016 via TweetDeck)

OaaSvc WTAF?! This poor girl is laundering money unknowingly. Can’t stop, the criminals know her details. The police hand her off.

via TweetDeck (retweeted on 4:36 PM, May 25th, 2016 via TweetDeck)

OaaSvc Joanne goes to the police. Next she gets passed around from bureaucracy to bureaucracy until she finally gets to IDCARE.

via TweetDeck (retweeted on 4:35 PM, May 25th, 2016 via TweetDeck)

OaaSvc Her mum recognised the scam (Joanne is a teenager). The “employer” has Joanne laundering money and receiving 5%.

via TweetDeck (retweeted on 4:35 PM, May 25th, 2016 via TweetDeck)

OaaSvc Hasn’t seen anyone yet but has passed on her TFN and bank details.

via TweetDeck (retweeted on 4:35 PM, May 25th, 2016 via TweetDeck)

OaaSvc Joanne was recruited as a Travel Admin Assistant. Had a Skype call (no video) and got the job.

via TweetDeck (retweeted on 4:35 PM, May 25th, 2016 via TweetDeck)

OaaSvc This case is quite recent, 30 April. IDCARE has experienced around 22k incidents over the past 12 months.

via TweetDeck (retweeted on 4:35 PM, May 25th, 2016 via TweetDeck)

OaaSvc First up an example. “Joanne’s Story” (not her real name)

via TweetDeck (retweeted on 4:35 PM, May 25th, 2016 via TweetDeck)

OaaSvc As opposed to @AusCERT, ACSC, and @CERTAustralia who help government and business.

via TweetDeck (retweeted on 4:35 PM, May 25th, 2016 via TweetDeck)

OaaSvc IDCARE is about the prevention and response to the community for identity and cyber security incidents.

via TweetDeck (retweeted on 4:35 PM, May 25th, 2016 via TweetDeck)

I was meant to be in the preso by IDACRE’s David Lacey on identity theft, but I’ll retweet some other’s observations for now.

via TweetDeck

Just had a fascinating chat with @Akamai’s Mike Smith, which will feed into a couple stories down the track.

via TweetDeck

gavincostello Dr Tennakoon talks to incidents of “cyberbullicide”. Because cyber bullying, unlike offline bullying, can go 24/7/365.

via Tweetbot for iΟS (retweeted on 3:02 PM, May 25th, 2016 via TweetDeck)

@dobes I can fix anything with this one simple trick.

via TweetDeck in reply to dobes

agarner Psychological impacts on cyber security victims pic.twitter.com/WiFFnyl9ej

via Twitter for iPhone (retweeted on 3:01 PM, May 25th, 2016 via TweetDeck)

ajlobster Banking tips pic.twitter.com/8Q90f056EZ

via Twitter for iPhone (retweeted on 2:56 PM, May 25th, 2016 via TweetDeck)

agarner City of London Police study suggested that cyber crime should be ‘low priority’ if victims failed to protect themselves

via Tweetbot for Mac (retweeted on 2:54 PM, May 25th, 2016 via TweetDeck)

gavincostello Perceptions of “cybercrime” changing, but many still think you should be low priority victim if you haven’t protected yourself

via Tweetbot for iΟS (retweeted on 2:54 PM, May 25th, 2016 via TweetDeck)

gavincostello Makes good case for distinguishing between “High tech crime” and “cyber enabled” crime; using Internet for a traditional crime

via Tweetbot for iΟS (retweeted on 2:51 PM, May 25th, 2016 via TweetDeck)

gavincostello In Sri Lanka individual privacy is not considered a right and there are no laws defining some online behaviours as crimes

via Tweetbot for iΟS (retweeted on 2:51 PM, May 25th, 2016 via TweetDeck)

gavincostello Dr Tennakoon says the Sri Lankan CERT often get calls asking them “is this the Facebook help?”

via Tweetbot for iΟS (retweeted on 2:50 PM, May 25th, 2016 via TweetDeck)

gavincostello 96% of reports to Sri Lanka CERT are for Social Media incidents and most are by women

via Tweetbot for iΟS (retweeted on 2:50 PM, May 25th, 2016 via TweetDeck)

daveweigel “And that concludes our seven hours of covering Donald Trump. Up next: Why can’t Hillary or Bernie seem to break through?”

via Twitter Web Client (retweeted on 2:39 PM, May 25th, 2016 via TweetDeck)

OH, in the media work room: “Are you racist against lamingtons?”

via TweetDeck

agarner Justin Clacherty: From your home network you can pivot into the automation provider’s data centre & they don’t even realise

via Tweetbot for Mac (retweeted on 2:30 PM, May 25th, 2016 via TweetDeck)

gavincostello Judging by this talk, To say Building Automation is open and unencrypted would be factual 😳

via Tweetbot for iΟS (retweeted on 2:29 PM, May 25th, 2016 via TweetDeck)

_Mike_Holm_ Wait. These things are connected to the Interwebs?

via TweetDeck (retweeted on 2:29 PM, May 25th, 2016 via TweetDeck)

_Mike_Holm_ Justin Clacherty is worrying me with stories of building control systems NOT using auth/encryption like KNX

via TweetDeck (retweeted on 2:29 PM, May 25th, 2016 via TweetDeck)

I’m taking a sort-of-break in the media work room while the Bristol Factor ratchets back. But I’ll RT some key bits.

via TweetDeck

@hacklabs @darrenpauli Well that’s one possible factor I suppose…

via TweetDeck in reply to hacklabs

“What’s the difference between @hacklabs and a fascist dictator?” twitter.com/darrenpauli/st…

via TweetDeck

OH, media work room: “That’s the second time fisting has come up in this room today.”

via TweetDeck

@AndrewRJamieson “…for some value of ‘important’.” ;)

via TweetDeck in reply to AndrewRJamieson

Yes, this echoes my own thoughts about this subject. twitter.com/joshgans/statu…

via Tweetbot for iΟS

fanfiction_txt An Asian version of Gangnam Style

via Twitter Web Client (retweeted on 12:30 PM, May 25th, 2016 via Tweetbot for iΟS)

So @Anthony_Caruana just referred to the consumer infosec industry as a “confusopoly”.

via Tweetbot for iΟS

Jamieson: Will we need a large breach to pay attention to IoT security.? Yes, but that breach won’t be enough.

via TweetDeck

agarner AJ: Even security people don’t always use security in purchase decisions… e.g. they use phones that aren’t regularly patche16

via Tweetbot for Mac (retweeted on 12:08 PM, May 25th, 2016 via TweetDeck)

gavincostello a security comparison system to highlight reduced risk is certainly a better option than pretending your device is “secure”

via Tweetbot for iΟS (retweeted on 12:07 PM, May 25th, 2016 via TweetDeck)

A follow-up service would have the power to kill off a product’s stars. pic.twitter.com/Q25bAaIekT

via Twitter for iPhone

Jamieson worked through this example to show a 4-star versus 0-star device. pic.twitter.com/bb4T2qu8RY

via Twitter for iPhone

Jamieson is presenting suggestions for constructing a star-rating system for labelling IoT products. Not a bad first cut IMHO.

via TweetDeck

Jamieson saya that just like the kilogram, we can just make up metrics to have numbers to compare.

via TweetDeck

Jamieson: “All computing systems have inputs and outputs. No outputs, it’s a brick. No inputs, it’s a heater.”

via TweetDeck

The solution. (I’ll skip the SF reference ‘cos I’m not a 13yo.) pic.twitter.com/IfwUzxv7UQ

via Twitter for iPhone

Which pentester do you choose? (And the costs aren’t known to the user.) pic.twitter.com/ceA9SMyHoA

via Twitter for iPhone

agarner AJ: Also, where is the value when customers can’t differentiate products based on security.

via Tweetbot for Mac (retweeted on 11:47 AM, May 25th, 2016 via TweetDeck)

agarner AJ: IoT - Why isn’t security just baked in from the start? Because the design -> prototype -> production cycles are compressed

via Tweetbot for Mac (retweeted on 11:47 AM, May 25th, 2016 via TweetDeck)

Steve_Lockstep .@AndrewRJamieson went looking for outlandish examples. Found the Internet toaster is now passé. pic.twitter.com/3AfOKpayVQ

via Twitter for iPhone (retweeted on 11:46 AM, May 25th, 2016 via TweetDeck)

agarner AJ: Discover these by (a) testing for deliberate ones, (b) pen testing for ignorant ones and (c) praying about the others 2/2

via Tweetbot for Mac (retweeted on 11:46 AM, May 25th, 2016 via TweetDeck)

Jamieson’s DIY taxonomy for security threats. pic.twitter.com/5Ovh9etxGw

via Twitter for iPhone

Steve_Lockstep .@AndrewRJamieson (from UL, a metrology company) asks: “How do we measure security?” pic.twitter.com/45u2sFGCQW

via Twitter for iPhone (retweeted on 11:39 AM, May 25th, 2016 via TweetDeck)

Jamiseon: With IoT, as with everything else, we need to define a level of acceptable risk through methodology.

via TweetDeck

agarner Andrew Jamieson: Judging weight is easy, but if we want to measure security then we need to have objective metrics for it

via Tweetbot for Mac (retweeted on 11:39 AM, May 25th, 2016 via TweetDeck)

Next up: Andrew Jamieson, UL, “IOT Security: It’s in the Stars!” conference.auscert.org.au/andrew-jamieson

via TweetDeck

Agreed. Also, silent questions can’t be heard on a recording. Session MC should select and read. twitter.com/Steve_Lockstep…

via TweetDeck

Note to self: They said “HIPPA policies”, not “hippopotamus”.

via TweetDeck

Risks are the same in AU, and we’ve got more medical data. It’s just that breaches aren’t reported.

via TweetDeck

Main risk for healthcare info in AU? We’re more highly computerised than the US.

via TweetDeck

This makes sense. People still ask for “the password for the system”, not “my password”. twitter.com/_Mike_Holm_/st…

via TweetDeck

AndrewRJamieson Sharing passwords a big prblm in healthcare. No malicious intent. Security shouldnt get in way of the process it is protecting

via Twitter for Android (retweeted on 11:26 AM, May 25th, 2016 via TweetDeck)

Steve_Lockstep “It’s not that GPs don’t care about security but they’re busy and their priorities are with patients” - @farahmagrabi

via Twitter for iPhone (retweeted on 11:26 AM, May 25th, 2016 via TweetDeck)

agarner Pacemakers, insulin pumps are hackable, this is ho-hum news in security community but the general public doesn’t know about it

via Tweetbot for Mac (retweeted on 11:26 AM, May 25th, 2016 via TweetDeck)

Just cited: “Russian hackers hold Gold Coast doctors to ransom” (Dec 2012, different story shown) abc.net.au/news/2012-12-1…

via TweetDeck

These medical hacks are what AFP would call “driftnetting”, which I wrote about in April. zdnet.com/article/cyberc…

via TweetDeck

gavincostello Credit Card hack can be identified quickly, hack of medical record can often take months to identify

via Tweetbot for iΟS (retweeted on 11:12 AM, May 25th, 2016 via TweetDeck)

In AU, we’ve seen hackers file fraudulent Medicare claims and re-route the funds. Longer to detect.

via TweetDeck

Just cited: “Your medical record is worth more to hackers than your credit card” (Sep 2014) reuters.com/article/us-cyb…

via TweetDeck

Just cited: “Anthem: Hacked Database Included 78.8 Million People” wsj.com/articles/anthe…

via TweetDeck

Ponemon says 89% of health care providers suffered a data breach in the last two years.

via TweetDeck

agarner Farah Magrabi: There is a fundamental tension between access to healthcare (clinicians and owners) and security

via Tweetbot for Mac (retweeted on 11:06 AM, May 25th, 2016 via TweetDeck)

Steve_Lockstep To be clear, 97% of GPs might use but that’s not the same as . @farahmagrabi pic.twitter.com/77sEAk2QX6

via Twitter for iPhone (retweeted on 11:06 AM, May 25th, 2016 via TweetDeck)

Next: Farah Magrabi, Macquarie Uni, “Securing health info from cyber threats as the world goes digital” conference.auscert.org.au/farah-magrabi

via TweetDeck

_Mike_Holm_ @MelbourneGeek says users should be THIS HAPPY about security controls! pic.twitter.com/WD9oRkHQ3n

via Twitter for iPhone (retweeted on 10:29 AM, May 25th, 2016 via TweetDeck)

Cited just before: “World’s Biggest Data Breaches” interactive. informationisbeautiful.net/visualizations… pic.twitter.com/SgLf0UsBZx

via TweetDeck

@nphair Heh. He hasn’t mentioned OMCG’s yet. He hasn’t really specified types of attackers.

via TweetDeck in reply to nphair

AndrewRJamieson I’m always a bit skeptical when a (large) vendor talks about how there are too many (small) vendors …

via Twitter for Android (retweeted on 10:21 AM, May 25th, 2016 via TweetDeck)

Steve_Lockstep .@MelbourneGeek shows (with ref to ) that industry is vast, yet power is concentrated. pic.twitter.com/3SPt9D4IrS

via Twitter for iPhone (retweeted on 10:16 AM, May 25th, 2016 via TweetDeck)

@0x1C Hey I’m just the messenger…

via TweetDeck in reply to 0x1C

Eye-opener: There’s 700 people in the room. That’s 12% of Australia’s infosec profession. [Sure, lots of caveats.]

via TweetDeck

Savvies cites the familiar figure that by 2020 there’ll be 1.5 million unfilled infosec roles globally.

via TweetDeck

Next up: Nick Savvides, Symantec, “Be the 1%, Beat the 1%” conference.auscert.org.au/nick-savvides

via TweetDeck

Steve_Lockstep 2/2: MyPOV: Messaging apps are toys. We need serious cross platform encrypted EMAIL - but might never get it. @csoghoian

via Twitter for iPhone (retweeted on 10:09 AM, May 25th, 2016 via TweetDeck)

Steve_Lockstep .@csoghoian answered my Q on stage, saying “WhatsApp is cross platform but closed garden”. < But why about email??? [1/2]

via Twitter for iPhone (retweeted on 10:09 AM, May 25th, 2016 via TweetDeck)

franksting Soghoian; if you want encrypted conversation, you need to use a walled garden. Insecure SMS is the only interoperable service

via Tweetbot for iΟS (retweeted on 10:06 AM, May 25th, 2016 via TweetDeck)

@jamver You got the pics, I got the links. ;)

via TweetDeck in reply to jamver

agarner Christopher Soghoian: The NSA Special Collection Service in Vienna pic.twitter.com/8wpYAIEV6E

via Tweetbot for Mac (retweeted on 10:01 AM, May 25th, 2016 via TweetDeck)

jamver .@csoghoian explains such as the Vienna pic.twitter.com/MLOz4Zxqzm

via Twitter for iPhone (retweeted on 9:59 AM, May 25th, 2016 via TweetDeck)

Just cited: “The Black Market Dealers Selling Tactical Surveillance Equipment Online” motherboard.vice.com/read/the-black…

via TweetDeck

To be fair, journalists have a confused look nearly all of the time. twitter.com/OaaSvc/status/…

via TweetDeck

OaaSvc NSA had a backdoor and used it as a beta site for ingesting ALL CALLS from the country.

via TweetDeck (retweeted on 9:55 AM, May 25th, 2016 via TweetDeck)

OaaSvc Oh dear. The US provided a free surveillance system to the Bahamas so DEA and local police could work together.

via TweetDeck (retweeted on 9:54 AM, May 25th, 2016 via TweetDeck)

Just cited: “A Death in Athens: Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?” theintercept.com/2015/09/28/dea…

via TweetDeck

If Microsoft can’t secure its own comms, what hope do any of us have? pic.twitter.com/pwpN4iPtS6

via Twitter for iPhone

@JazzTwemlow ERT can be fun, yes. Just quietly, I’d have liked to see you here again this year.

via TweetDeck in reply to JazzTwemlow

franksting Interesting observation that governments are probably targeting security and software engineers at infrastructure companies

via Tweetbot for iΟS (retweeted on 9:46 AM, May 25th, 2016 via TweetDeck)

jamver Government spy agency targets legally abiding company+employees because they had access pic.twitter.com/x0McTNX733

via Twitter for iPhone (retweeted on 9:46 AM, May 25th, 2016 via TweetDeck)

agarner Christopher Soghoian: The problem with encryption key escrow is you can’t keep the keys secret. Cites GCHQ hack of Gemalto

via Tweetbot for Mac (retweeted on 9:42 AM, May 25th, 2016 via TweetDeck)

@daviottenheimer You’re overstating the meaning of that single sentence out of context.

via TweetDeck in reply to daviottenheimer

Pleased @csoghoian points out governments aren’t controlled by a central power, but departments pull in different directions.

via TweetDeck

This is a solid backgrounder on the current cryptowars, but yeah, most of this is not new here. twitter.com/franksting/sta…

via TweetDeck

OaaSvc I like this guy. pic.twitter.com/rtgPyHDisd

via Tweetbot for iΟS (retweeted on 9:33 AM, May 25th, 2016 via TweetDeck)

OaaSvc WhatsApp went encrypted. Overnight 1Billion users had automatic encryption with the flip of a switch.

via TweetDeck (retweeted on 9:33 AM, May 25th, 2016 via TweetDeck)

OaaSvc Of course the problem here is that you have to have money to protect yourself. twitter.com/Steve_Lockstep…

via TweetDeck (retweeted on 9:33 AM, May 25th, 2016 via TweetDeck)

Steve_Lockstep “Apple sells luxury products; they don’t monetize your messages” - @csoghoian. < Hence Apple can *afford* E2E encryption.

via Twitter for iPhone (retweeted on 9:32 AM, May 25th, 2016 via TweetDeck)

@daviottenheimer I’m not sure, but I don’t think @csoghoian has used the word “attackers”, no.

via TweetDeck in reply to daviottenheimer

Organisations like the FBI didn’t like this, ‘cos suddenly not even Apple could give them users’ messages.

via TweetDeck in reply to stilgherrian

When Apple turned on its crypto, overnight millions of people has encrypted comms without any action on their part.

via TweetDeck

All comms systems, from telegraph thru telephone, have been designed with law enforcement interception in mind.

via TweetDeck

First keynote is Christopher Soghoian, American Civil Liberties Union, “The Next Crypto Wars” conference.auscert.org.au/christopher-so…

via TweetDeck

Bad things are happening on the hashtag.

via TweetDeck

_Mike_Holm_ GM Thomas King unveils @AusCERT’s new Incident Handling process chart pic.twitter.com/9l29iVOzJU

via Twitter for iPhone (retweeted on 9:13 AM, May 25th, 2016 via TweetDeck)

Matt_Deshon Kicking off Ubiquitous with Thomas King of AusCERT pic.twitter.com/PaKnTZ5KR5

via Twitter for iPhone (retweeted on 9:12 AM, May 25th, 2016 via TweetDeck)

@scottamcintyre Heh. I haven’t MC’d an event for ages. Just one corporate thing a couple years ago.

via TweetDeck in reply to scottamcintyre

franksting Apparently the average member age at Auscert is “8”. 🤔

via Tweetbot for iΟS (retweeted on 9:08 AM, May 25th, 2016 via TweetDeck)

ZScaler are letting people smash routers. Literally. pic.twitter.com/0HhHGDJCB7

via Twitter for iPhone

@R_Chirgwin @dawnstarau It’s OK, @darrenpauli is here, so there’s a good chance something incredibly stupid will happen.

via TweetDeck in reply to R_Chirgwin

@KrazyKarl910 @simonhackett @R_Chirgwin @NewtonMark Well I guess we’ll have to plan around the availability of HackettAir’s VH-TCP… ;)

via TweetDeck in reply to KrazyKarl910

@simonhackett @R_Chirgwin @NewtonMark Now @KrazyKarl910 made a suggestion a while back, somewhere out where he’s spending time.

via TweetDeck in reply to simonhackett

@jillethelmurray @abcnews Since we only ever see summaries and not the actual working spreadsheets, there’s no way to tell.

via TweetDeck in reply to jillethelmurray

I’ll be cybering from the @AusCERT Conference all day. If it’s not your thing, mute .

via TweetDeck in reply to stilgherrian

Wed plan: Sysdmin tasks (done); 0900 @AusCERT Conference all day conference.auscert.org.au/program; then whisky, apparently.

via TweetDeck in reply to stilgherrian

RevRichardColes Brilliant idea: cut a pork pie in half horizontally and spread both halves with Dijon mustard à la Victoria sponge. YOU KNOW IT MAKES SENSE!

via Twitter for iPhone (retweeted on 8:29 AM, May 25th, 2016 via TweetDeck)

MarkDiStef The AFR’s workplace editor got every lazy stereotype against millennials in a single lede. pic.twitter.com/QSSyB1OuB0

via Twitter for iPhone (retweeted on 8:28 AM, May 25th, 2016 via TweetDeck)

@dsturnbull Wow, you might just be able to keep a computer and a couple of phones patched.

via Tweetbot for iΟS in reply to dsturnbull

@MarkLaffan Good thinking, but I’ll be having a relatively quiet one on Thursday night.

via Tweetbot for iΟS in reply to MarkLaffan

@briswe I couldn’t possibly machete someone’s creativity!

via Tweetbot for iΟS in reply to briswe

I should not be left unsupervised near platters of cured meats.

via Tweetbot for iΟS

Excellent suggestion. I assume that triggering a cyberdrought is why China (allegedly) hacked @BOM_au. twitter.com/Epigrammist/st…

via Tweetbot for iΟS

@jillethelmurray @abcnews In what sense? There’s a lot of it, and I could go for hours. And I’m not even covering it closely.

via Tweetbot for iΟS in reply to jillethelmurray

“Rural NBN shortcomings could lead to ‘data drought’, farmers warn”. Cute framing. ab.co/25du8J1 pic.twitter.com/6VQL0zWLhO

via Twitter for iPhone

“Conroy claims parliamentary privilege on seized documents”, reports @abcnews ab.co/1NJeHDL pic.twitter.com/WanQ8eb8eo

via Twitter for iPhone

One positive of being a morning person at an infosec conference is being able to have a quiet, leisurely breakfast.

via Tweetbot for iΟS

That’s twice before breakfast now. I’m on a roll. twitter.com/corduroy/statu…

via Tweetbot for iΟS

And a view to the south at the core of Surfers Paradise. pic.twitter.com/XEw0kMSwzs

via Twitter for iPhone

The desired effect has been achieved. twitter.com/bastardsheep/s…

via TweetDeck

And the Gold Coast didn’t look too bad as we were about to touch down at OOL late yesterday afternoon. pic.twitter.com/NdVY9em0mP

via OS X

The Gold Coast is even dreadful when you look inland. pic.twitter.com/ADRVurIq5j

via Twitter for iPhone

The Gold Coast continues to be dreadful. pic.twitter.com/kELCZTSiBB

via Twitter for iPhone

@jeamland Well, only one kind of event each. In Cisco’s case, their infosec people and regional execs find it very funny.

via TweetDeck in reply to jeamland

You know the day is off to a good start when someone has already called you a motherfucker before breakfast.

via TweetDeck

I approve of this proposal. (Hi, @Viss!) twitter.com/Viss/status/73…

via TweetDeck

No-one tell @Viss about the word “phygital”, or there’ll be some sort of explosion. twitter.com/Viss/status/73…

via TweetDeck

Thank you, @Avecto, for sponsoring the first morning’s Berocca at .

via TweetDeck

The YouTube channel you want is Pluffnub. Trust me on this. youtube.com/channel/UCk3cE… twitter.com/timpoliti/stat…

via TweetDeck

fanfiction_txt This would leave Steven poor for the rest of his life and writing top 10 articles for Buzzfeed.

via Twitter Web Client (retweeted on 5:27 AM, May 25th, 2016 via TweetDeck)

fanfiction_txt “I can’t just asked Captain America’s boyfriend to babysit my dog. What is my life, even.” Bucky shrugs.

via Twitter Web Client (retweeted on 5:27 AM, May 25th, 2016 via TweetDeck)

fanfiction_txt Croft is back once more to deliver punches to the face and to restlessly assault animals

via Twitter Web Client (retweeted on 5:26 AM, May 25th, 2016 via TweetDeck)

Meh. You’re not even a journalist until a major corporation bans you from covering their events. I am a journalist. twitter.com/climatekeith/s…

via TweetDeck

Alas, I suspect this conference does not deal with ethanol in the way I’d like. fuelethanolworkshop.com pic.twitter.com/xaXDegMDYW

via TweetDeck

Wed plan, draft: Sysdmin tasks; 0900 @AusCERT Conference all day conference.auscert.org.au/program; then there was talk of whisky.

via TweetDeck

Wednesday. The ocean is bigger than you are. Much bigger. Always remember that. Now, what was it you wanted? Wednesday.

via TweetDeck