ianquantum.bsky.social
@ianquantum.bsky.social
Makes me want to look for WoL rootkits :/
February 8, 2025 at 7:28 PM
All of my posts that ended up there were authored anonymously, but one did end up becoming a House Bill!

Security can be taken seriously!
February 8, 2025 at 7:27 PM
I suggest following up next week with bsky.app/profile/ianq...
and maybe we can explore Post Quantum Crypto or PQ-Web3 a bit.
February 8, 2025 at 7:24 PM
A lot of the "customizations" to make Windows slightly more secure are only available with more expensive licenses.
February 4, 2025 at 6:48 PM
I'll respond to a different interpretation of your question. Powershell didn't exist for setup recovery, I had only basic options and did everything by hand. One of my claims to fame is hex editing a partition table back into existence. Windows booted.
January 18, 2025 at 9:56 PM
I used powershell for none of that. I use zsh, sh quite a bit for a lot more.
January 18, 2025 at 9:54 PM
TikTok hacked the local wifi and bluetooth connections trying to profile every device nearby. It would read all contents of clipboard and other copy paste. It would intercept as much data as it could grab. TikTok CEO lied under oath about these violations.
January 18, 2025 at 9:53 PM
What I want is a network firewall rule to block every IP address they control.
January 18, 2025 at 9:51 PM
When I worked for microsoft tech support 1/3 of what I did was uninstall crap and try to solve DLL hell. 1/3 was registry edits. 1/3 was trying to install windows when windows would not install. usually by telling setup to /suc it.
Exploits use powershell to avoid the security features.
January 18, 2025 at 9:48 PM
They need to get rid of NTLM and a bunch of the backwards compatibility for insecure protocols to even be considered *possibly* secure.
January 18, 2025 at 9:44 PM
everything that isn't secure by default is the "default surface area to attack"
January 18, 2025 at 9:43 PM
by "help" you mean "exploit" right?
January 18, 2025 at 9:42 PM
you just did.
January 18, 2025 at 9:39 PM
spam spam spam spamity spam!
January 18, 2025 at 9:38 PM
They exist for it. Until then, they just keep waving at you.
January 18, 2025 at 9:36 PM
This is Year of Quantum by WEF/UN so good luck avoiding it now.
January 18, 2025 at 9:35 PM
Unfortunately I have been called "quantum messiah" by a lot of people, independently.
I am mostly quoting the roadmaps of quantum companies and pointing out that blockchain and web3 are potentially dead in 2027 if any company hits their roadmap target.
January 18, 2025 at 9:34 PM
That's not the first quantum teleportation. The first one didn't even need the internet.
www.quantamagazine.org/physicists-c...
Physicists Create a Holographic Wormhole Using a Quantum Computer
The unprecedented experiment explores the possibility that space-time somehow emerges from quantum information, even as the work’s interpretation remains disputed.
www.quantamagazine.org
January 18, 2025 at 9:32 PM
Back in the day there was a CD that gave you nearly unlimited control over any network. Security wasn't something people were willing to discuss, so underground exploit libraries yielded enormous power.
January 18, 2025 at 9:27 PM