Emory L. · @emory
181 followers · 1857 posts · Server soc.kvet.ch

OK, time.

our team does not like being asked for "templates" or “outlines" of our workshops. each TM is different in terms of where we spend our time.

we know the areas that must be covered in and , and i've been writing a play/runbook (pattern?) for the format of our workshops that is becoming training material.

but i don't want it to be a . what would you use? agenda? areas of interest? pattern? outline?

happy wednesday, !

#threatmodel #security #privacy #threatmodels #template #infosec

Last updated 1 year ago

dispatch · @dispatch
518 followers · 2850 posts · Server ioc.exchange
dispatch · @dispatch
516 followers · 2835 posts · Server ioc.exchange
Robert Dresden · @acetylcholin
20 followers · 5 posts · Server mastodon.gamedev.place


I thought it might be cool to have a collection of AI Evasion, detection and adversiall Attacks Papers, given that my dominant hobby right now is writing an AI video Editor for stable diffusion. So let's begin:
First of all will be GPT-3 Bot detection
arxiv.org/abs/2210.07321

Followed by AI Person Detection :
arxiv.org/abs/1910.11099

Feel free to add your findings. :)

#threatmodels #ai

Last updated 2 years ago

dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange
dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange
dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange
Doc Edward Morbius ⭕​ · @dredmorbius
2071 followers · 14632 posts · Server toot.cat

@galaxis I made a similar point aboout the execution of Kim Jung-nam:

Data are Liability: Book your Assassination Now

Travel and hospitality databases are widely accessible and shared amongst a tremendous number of organisations. State intelligence organisations might readily have access through their own state-run airline, or through private operations or plants within same. Similarly for terrorist, narco-criminal, money-laundering, or other organisations. Financial, banking, and payment-processing systems, only slightly less so. A P.I. license or position on a fraud or abuse desk at a major online retailer, or any skip-tracing agency, can have access to such information.

What is your threat model?

old.reddit.com/r/dredmorbius/c

#dataareliability #belarus #kidnapping #assassination #threatmodels

Last updated 3 years ago

dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange
dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange
dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange
dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange
Doc Edward Morbius ⭕​ · @dredmorbius
2071 followers · 14642 posts · Server toot.cat

Trust and Safety: Information Resources?

I'm looking for information, references, or other pointers, on current or best practices as well aas scope or definition, of online trust & safety or abuse areas. Possibly also relationships or differences from security, threat, legal compliance, or related measures.

Anyone w/ experience on the Fediverse, industry, organisations, or research, insight appreciated.

Boosts welcome.

#TrustAndSafety #security #threatmodels

Last updated 4 years ago

dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange
dispatch · @dispatch
472 followers · 2723 posts · Server ioc.exchange