Rafay Balochتصدیق شدہ اکاؤنٹ

@rafaybaloch

Information Security Researcher, Published Author on Cybersecurity, Public Speaker, Chevening Scholar, featured by , , - RT ≠ Endorsement

جولائی 2010 کو شامل ہوئے

ٹویٹس

آپ نے @rafaybaloch کو بلاک کردیا

کیا آپ واقعی یہ ٹویٹس دیکھنا چاہتے ہیں؟ ٹویٹس دیکھنے سے @rafaybaloch ان بلاک نہیں ہوگا

  1. پن کردہ ٹویٹ
    13 جنوری

    Whatsapp's new privacy policy has triggered a debate among masses about its alternatives from Privacy/Security standpoint. Clearly, & are popular candidates leading to Q's on which one being more secure. Lets discuss key security differences in this thread

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  2. نے ریٹویٹ کیا
    21 گھنٹے پہلے

    Recently, NSO Group extended an invitation to meet and discuss our concerns about their ongoing spyware abuse in more detail. We do not believe this invitation is made in good faith and have declined. Here’s why:

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  3. نے ریٹویٹ کیا
    14 مئی

    Counter-Strike Global Offsets: reliable remote code execution by (Guest article)

    منسوخ
  4. نے ریٹویٹ کیا
    15 مئی

    Israel's cowardly destruction of press HQ in city is unjustifiable. Solidarity with our friends and colleagues in Gaza.

    منسوخ
  5. نے ریٹویٹ کیا
    15 مئی

    Israel has the right to defend itself against several dozen AP journalists and freelancers.

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  6. نے ریٹویٹ کیا
    13 مئی

    Russia calls on Israel to ‘immediately’ end settlement of Palestinian territories & maintain peace at Jerusalem’s sacred sites

    منسوخ
  7. نے ریٹویٹ کیا
    13 مئی

    Media offices! State ordered military attacks on media offices. Every single journalist, the world over, has no excuse but to attack this brutality, barbarity and illegality.

    منسوخ
  8. 14 مئی

    This seems to be another one of those troll tweets, which has sent trending again. Ironically dogecoins suffers from very same issue of electricity consumption as as both are based upon POW.

    منسوخ
  9. 13 مئی

    During my recent interview with , i have discussed software based supply chain attacks due to third and fourth party applications and have discussed why existing security controls are insufficient in solving these issues and need tor a more robust approach.

    منسوخ
  10. نے ریٹویٹ کیا
    8 مئی

    4) Privacy coins are great, but they're too small and too easy to smother via regulatory actions like de-listing from exchanges. Only Bitcoin has immunity-via-dominance to delisting. It adopting privacy-by-design instantly normalizes financial privacy. Ultima Ratio Cryptum.

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  11. 11 مئی

    Ransomware groups operating from Russia cannot be extradited, thereby there is no deterrence. The only solution US government has is to prevent companies from paying for ransom to discourage these groups.

    منسوخ
  12. 9 مئی

    Even if Twitter would have implemented E2EE on Direct Messages, They would have still been able to comply to GOVT requests. As Technically, they would still been able to access the DM's locally, reset passwords, access session tokens to retrieve messages. 3/3

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  13. 9 مئی

    E2EE only protects data in transit not data at rest. and 's model is different as they store data locally on the mobile handset and the server doesn't have access to encryption keys. 2/3

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  14. 9 مئی

    .'s article talks about how 's Twitter DM's were used to build up a case against him and suggested end to end encryption would have saved him from the trouble. This argument is flawed as E2EE would not have helped him here. 1/3

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  15. 9 مئی

    Sometimes, One should be careful what they wish for.

    منسوخ
  16. نے ریٹویٹ کیا
    6 مئی

    📺 Today's fireside chat featuring and covered financial privacy, financial surveillance, cryptocurrency, and so much more! Catch the replay ⏯️

    منسوخ
  17. نے ریٹویٹ کیا
    5 مئی

    Malicious Office365 apps are the ultimate insiders: They bypass 2FA, survive password resets, & give attackers launching point for more attacks. New research shows they're very effective at getting bad guys inside O365 organizations.

    منسوخ
  18. 4 مئی

    I am not really sure why, but this screen really gives me a calming and soothing effect.

    منسوخ
  19. 4 مئی

    IMO collects wide range of device data such as IP address, user settings, device model, GEO Loc, facial tracking, SIM serial number, operating system, mobile carrier details and much more. IMO Team frequently taps into live streams on pretext of quality of service. 4/4

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  20. 4 مئی

    IMO will share personal data with third party ad partners and without seeking any additional consent and without de-anonymizing the data. Users personal data will be transferred in event of merger, acquisition, consolidation, reorganization, asset sale, or bankruptcy. 3/4

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ
  21. 4 مئی

    IMO will retain backup of your personal data including chat messages, photos and videos for a time span of 90 days. IMO will retain all your personal data for unspecified time even after you have deleted your account. 2/4

    اس پیغامات کے سلسلے کو دکھائیں
    منسوخ

لوڈنگ میں وقت لگ رہا ہے.

ٹوئٹر گنجائش سے زیادہ بوجھ یا ایک وقتی مشکل سے دوچار ہے۔ دوبارہ کوشش کریں یا مزید معلومات کے لیے ">ٹوئٹر اسٹیٹس پر جائیں۔

    آپ کو بھی پسند ہو

    ·