Gabriel
banner
morecoffeeplz.bsky.social
Gabriel
@morecoffeeplz.bsky.social
AI Research scientist. Former OpenAI, Apple infosec. “Professor” at John’s Hopkins SAIS Alperovitch Institute. Great deceiver of hike length and difficulty.
The only people I know that refer to ChatGPT as “Chat” are those in romantic relationships with it.

nypost.com/2025/10/16/b...
October 16, 2025 at 5:19 PM
At #LabsCon25 watching Jim Walter covering the tiers of hactivism and why they matter!
September 19, 2025 at 9:01 PM
@jags.bsky.social and @hegel.bsky.social Kicking us off.

“We don’t talk about next year”
September 18, 2025 at 4:10 PM
August 20, 2025 at 9:19 PM
I had forgotten about this. Good times.
April 15, 2025 at 2:59 AM
@dieworkwear.bsky.social is gonna throw down in the Uniqlo parking lot and @msfoil.xyz already has the design for the posters we will be rabble rousing with.
April 4, 2025 at 3:03 AM
April 3, 2025 at 8:48 PM
I was always loyal, always trying to keep things together! I did what I had to do, took a tough vote, AOC, she doesn’t get it.

Nobody respects me! It’s not easy being in my position, trying to keep everyone happy! I’m smart! I can handle things!!
March 16, 2025 at 5:07 PM
Yo, this shit just grows in the ground.
March 16, 2025 at 3:20 AM
I am ordering a new planetary gear housing and I swear that if any of you suggest I watch a Mr. Mixer repair video I'm gonna lose it.
March 11, 2025 at 9:41 PM
Ok lets talk exfiltration/analysis. According to the indictment a major part of I-S00N's business was exfiltrating sensitive data (email inboxes, IP lists, medical records, internal communications) from compromised servers of religious groups, media, and government entities.
March 5, 2025 at 10:49 PM
Interestingly we see that in the indictment they claim to have attacks for most commodity operating systems - except for iOS.

Again this is supported by Harfang Labs original leak analysis - I-S00N was an operational shop, they did not have the in-house expertise to weaponize POCs.
March 5, 2025 at 10:49 PM
Ok, I-S00N CLAIMED to have a zero-day arsenal - but the operational capabilities detailed in the indictment indicate a heavy reliance on phishing.

Research from Harfang Lab on the original leak seems to support this.
March 5, 2025 at 10:49 PM
Let's analyze their TTPs to identify opportunities for operational uplift:

- Attackers sent targeted phishing messages with preliminary social engineering dialogue before sharing malicious links.

- Internal guidelines mandated slow, conversational interaction over mass emails to build trust.
March 5, 2025 at 10:49 PM
Ok back to I-S00N. Here is a brief timeline of their activity.
March 5, 2025 at 10:49 PM
Security perimeter devices remain vulnerable... in other news...

Oh whats this?

Ivanti! You don't say?!
March 5, 2025 at 10:49 PM
Ok, before we keep going... we have two APT-27 actors mixed in with I-S00N?

Lets compare the indictments with the news articles
March 5, 2025 at 10:49 PM
The DOJ indictments make the relationship between the government and these private-sector actors very clear.

These groups operated under the direction/financial backing of Chinese state security services, particularly the Ministry of State Security (MSS) and Ministry of Public Security (MPS).
March 5, 2025 at 10:49 PM
These would fix me.
March 5, 2025 at 6:50 PM
Me to ChatGPT: "The following is a script I wrote that..."

ChatGPT to Me:
February 20, 2025 at 7:30 PM
Excellent and important reporting from @kimzetter.bsky.social on the activities of DOGE operatives.

www.wired.com/story/doge-c...
February 20, 2025 at 4:13 AM
It is a bad thing that we are firing uniquely qualified individuals from government agencies that secure and maintain the US nuclear stockpile.
February 14, 2025 at 3:39 AM
February 13, 2025 at 4:03 PM
Respect your elders
January 30, 2025 at 10:11 PM
January 30, 2025 at 12:53 AM