Daniel Miessler's Blog, page 114
October 9, 2017
On the Meaning of School and Company
I recently learned the origin of the world “school”, and was reminded of the origin of the word “company”.
We know school as a place to train for future life—to learn things—and if you’d asked me what its origin was I’m sure I would have said something like, ‘to learn’.
It’s not.
School comes from Greek, and it’s meaning was “leisure”. I find this highly ironic since so many high-end education systems are focused on ensuring that kids sleep longer and have more fun while learning.
Then you have the word company, meaning a place that you go to work. It comes from old French back around 1100, and it meant a military unit. Then it later became a word for people you spend time with and eat with. And of course companies have officers and secretaries, just like a government or military.
So it’s strange. School is a crappy place to go and learn a bunch of boring things, and its original meaning was leisure. And company is a place to make a living, but it comes from a military unit designed to work together in defeating an enemy.
They make a lot more sense when you think about the original forms.
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
October 8, 2017
The Reason Business Doesn’t Take InfoSec Seriously
I saw a thread recently where someone was complaining about Dave Kennedy making a hilarious inside joke on CNN without any of the participants knowing. Evidently people on Twitter said this is why InfoSec isn’t taken seriously.
Then someone else showed up with this reply, which prompted my response.
The reason infosec is not taken seriously is because we can’t map risk to money.
— ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ (@DanielMiessler) October 8, 2017
Until then we’re scary magicians with attitudes.
The reason information security is not taken seriously by the board room and other senior executives is because we cannot translate risk into financial terms.
Yes, being hacked is being taken seriously. And they’re certainly ready to throw some money at the problem in order to fix it (or look like they’re trying). But this isn’t the same thing as respect.
Most industries are about to talk about ROI. Sales, marketing, etc. You have a certain amount of spend, and you get a certain amount of return.
That’s missing in information security, and until that changes we’re going to be considered dirty mages with arcane powers.
They’ll keep us around, of course, but we don’t get to eat with them. Our kids can’t date their kids. Etc. It’s not real business because it’s not based on arithmetic.
So, yeah, we have a bad reputation for being mischievous and such, but that’s not what’s hurting us. Our real obstacle is our inability to have adult conversations about return on investment.
Until then we get to eat at the kids table.
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
The Difference Between Violence and Terrorism
A lot of people, including @BayoumiMoustafa writing for the Guardian, are saying it’s racist not to call the Vegas gunman a terrorist.
The argument is that if this were a black person, or a Muslim, they would have been labeled a terrorist immediately. The position is particularly specious given the amount of racism going around right now, but it’s a red herring for a very specific reason.
Too many people are confusing terrorism with violence. Most terrorism is violent, but not all violence is terrorism. Here are three major definitions of the word.
Oxford Living Dictionary
Terrorism
noun
The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.
Wikipedia
Terrorism
noun
The use of violence or threat of violence in the pursuit of political aims, religious, or ideological change.
U.S. Code
Terrorism
noun
Premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents.
So you don’t have terrorism just because you have violence. Terrorism is violence with a goal. If there’s no goal (and no message describing that goal) then it’s not terrorism—no matter how horrific.
The reason Muslim violence is often called terrorism is because Muslims who commit said violence often directly attribute their actions to their religious beliefs, e.g., by saying, “Allah Akbar” before or while executing bombings, stabbings, and shootings.
That’s a message (we’re doing this in the name of God). That’s a goal (we will defeat the infidels). That’s terrorism.
If the Vegas shooter had done what he did in the name of a racist movement, or anti-government, or religion, it would have been terrorism as well. Dylan Roof, for example, was absolutely a terrorist because he had a racist ideology (complete with manifesto) and his actions were in line with that ideology. But so far we have nothing of the kind from Vegas.
What was the Vegas attacker telling us? Don’t listen to country music? Don’t go to Vegas?
It so far seems that there was no message, and that means—no matter how horrible it was—it cannot be considered terrorism.
So the next time this happens, and you’re inclined to get upset because something is not being labeled terrorism when it should be—ask yourself a simple question: Was there a political goal or message being furthered by the attacker?
If not, you just have violence.
That doesn’t mean it’s less bad. It doesn’t mean we don’t look for a cause. It doesn’t mean we don’t try to prevent it from happening in the future. It just means that we don’t have to worry about others doing the same thing under the banner of an ideology.
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
October 6, 2017
Sample Page
This is an example page. It’s different from a blog post because it will stay in one place and will show up in your site navigation (in most themes). Most people start with an About page that introduces them to potential site visitors. It might say something like this:
Hi there! I’m a bike messenger by day, aspiring actor by night, and this is my website. I live in Los Angeles, have a great dog named Jack, and I like piña coladas. (And gettin’ caught in the rain.)
…or something like this:
The XYZ Doohickey Company was founded in 1971, and has been providing quality doohickeys to the public ever since. Located in Gotham City, XYZ employs over 2,000 people and does all kinds of awesome things for the Gotham community.
As a new WordPress user, you should go to your dashboard to delete this page and create new pages for your content. Have fun!
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
October 2, 2017
Unsupervised Learning: No. 95
This is episode No. 95 of Unsupervised Learning—a weekly show where I curate 3-5 hours of reading in infosec, technology, and humans into a 30 minute summary. The goal is to catch you up on current events, tell you about the best content from the week, and hopefully give you something to think about as well…
This week’s topics: IE leak, Whole Foods, Sonic, Apple Open-sources Kernels, Equifax $15 million retirement, tech news, human news, ideas, discovery, recommendations, aphorism, and more…
Listen and subscribe via…



Read below for this episode’s show notes & newsletter, and get previous editions…
Information Security news
An Internet Explorer bug leaks what you type in the address bar. Link
Whole Foods had a breach of credit card data captured at some of its taprooms and full table-service restaurants. The main store’s POS systems were not affected. Link
Sonic has had a breach of credit card data affecting an unknown number of store payment systems. Millions of customer credit cards are now being sold online as a result of the breach. Link
Apple has open-sourced the kernel code used in macOS and iOS, which is called XNU. Link
The Equifax CEO has retired with $15 million after 143 million people were affected in his company’s data breach. $15 million. For doing the exact opposite of succeeding. Link
Patching: Netgear
Technology news
Amazon released new hardware, including a new alarm clock form of an Echo, as well as updated Echo models. Link
Amazon is working on smart glasses with Alexa built in. Link
Music streaming revenue is up 48% so far this year because of services like Spotify and Apple Music. Link
IKEA has purchased TaskRabbit, but it will continue to operate independently. Link
IBM now has more employees in India than in the U.S. Link
Human news
A 64-year-old man killed at least 58 people, and injured over 500, while shooting out of a window in the Mandalay Bay hotel in Las Vegas. He used automatic weapons to open fire on a crowd of 20,000 people down below who were attending a concert. I’ve written a short essay about what I believe to be the cause of these events. Link
A quarter of part-time college professors are on public assistance, and some are getting desperate in their attempts to make a living. Link
IQ scores have been falling for decades, and scientists aren’t sure why. Link
Elon Musk announced dramatic new plans for intra-Earth space travel as well as missions to Mars. Link
Ideas
The Invisible Line Between Order and Chaos Link
Why Biometric Data Breaches Won’t Require You to Change Your Body Link
Three Distinct Benefits of Reading Link
Discovery
The Everything Bubble. Link
The pocket guide to Essential Startup Advice, by YCombinator. Link
An interesting discussion of TLS Session Tickets. Link
Information Theory of Deep Learning Link
The top 20 tech companies by revenue per employee. Link
Geekbooks — A subscription to top technical books. Link
Notes
I just finished Essentialism, and it’s definitely one of my top 10 productivity books of all time. Link
I’m experimenting this week with a much shorter podcast & newsletter, just to see how people like it. It’s a tradeoff between being thorough but taking a long time to consume, and being concise but not having as much content. Let me know what you guys think about the balance.
Recommendations
Read Essentialism and incorporate its concepts into your life. One of the best books I’ve ever read on being effective in everything you do. Link
Aphorism
“We can be absolutely certain only about things we don’t understand.” ~ Eric Hoffer
You can also sign up below to receive this newsletter—which is the podcast’s show notes—every week as an email, and click here to get previous editions.
Newsletter
Every Sunday I put out a curated list of the most interesting stories in infosec, technology, and humans.
I do the research, you get the benefits. Over 10K subscribers.
And if you enjoy this content, please consider supporting the site, the podcast, and/or the newsletter below.
Monthly Support
A subscription is the most helpful way to help me continue making content.
Supporter - $5 / monthMember - $25 / monthPartner - $50 / monthPatron - $100 / monthOther amount
$
SubscribeOne-Time Support
You can also make a one-time contribution of any amount.
$
Send
Thanks for listening. I’ll see you next week.
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
The Invisible Line Between Order and Chaos

image from slate
The Las Vegas shooting yesterday forced me to write about something I’ve been thinking about for years.
It seems entirely too easy to produce chaos in a large society. And in fact if you told me that millions of people would put themselves in metal boxes and fly down a street at nearly 100mph, separated only by their own attention, I’d have told you it would have never worked.
Why? Because it’s too easy for someone to disrupt.
Someone could easily just swerve into oncoming traffic. Someone can cut a giant hole in the ground and cover it with black paper so people drive into the hole at high speed. People could drop bowling balls from overpasses and skyscrapers and high-rise hotels and kill the people down below.
And with this incident we see that you can also just break out the glass in a giant hotel and shoot down at tens of thousands of people, with automatic weapons that you just brought through the front door.
So if I were to design a society, or be consulted on a society, I would say that you can’t have these vulnerabilities. But the problem is that you need those vulnerabilities for the society to be usable.
And there’s another problem with saying that you can’t build roads like this, or skyscrapers like this, or overpasses, or hotel windows—in the vast majority of cases, they do work exactly as designed.
So even though millions of people can easily abuse these design flaws (or tradeoffs), for some reason they don’t. And that’s the invisible line I’m talking about. This is the most important defense in all of society.
In short, the reason more people don’t do this is because it’s, well, non-conventional. It’s improper. It’s unthinkable. It’s just not something that you do.
This is an unbelievably powerful force that makes an open society possible.
There are a few things that keep this force working, and a few things that diminish it.
Convention is a powerful factor. If nobody has done a particular attack before you, and you know it’s not proper or allowed or morally sound, it’s a lot harder to do it for most people. The fact that it’s never been done before is a defense in itself.
Mental Health is another factor. People who are mentally healthy are able to honor society’s rules and don’t have overwhelming forces pushing them to break those norms.
Religion is another powerful element that can overpower a society’s conventions. If God says something and convention says another, God might win that argument. And if the command is to kill, it just might happen if the belief is strong enough.
Ideology is broader than Religion but has the same characteristics. If you believe that a certain race should be exterminated, or that another race is superior, or that technology is evil and that people who promote it should be removed from the equation—these are all strong beliefs that could inspire action that counters the natural invisible force that protects society.
The problem today seems to be that a number of these are eroding at the same time.
More and more people are doing crazy, destructive things that then open the door for copycats.
We’re losing a meaning and happiness infrastructure that kept people focused on work and family and following the rules, and people are becoming unstable as a result.
And various ideologies—religious and otherwise—are becoming strong enough to convince people to harm others in opposition to the rules of society.
The key point is that it’s effortless to step over this line. It’s easy to harm people en masse in an open society. Extraordinarily easy. All you have to do is realize it’s possible, and have enough of a reason.
And the more we strip away the ephemeral and convention-based reasons not to, the more danger we’ll be in.
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
September 30, 2017
Three Distinct Benefits of Reading

image by tanya antre
I read a lot, and I sometimes struggle to find ways to articulate how useful it is, and how much it’s improved my life. After…well…reading more on the topic, I think I’ve settled on three distinct benefits.
Reading updates your mental models. Reading doesn’t just give you a series of facts that you can later recall. It’s also teaching you about the world the same way that experience does. Except with reading you’re getting multiple lifetimes of experience. That experience teaches your mental models of how the world works and subconsciously shapes your decision-making. It basically makes you smarter in a way that you cannot put your finger on because it’s baked into how you see the world.
Reading gives you new perspectives. Reading can give you a completely different understanding, at a conscious and emotional level, of how an event took place, or of the difficulties of an individual or group. These conscious ties to history or people give you a different way of understanding those things, and that additional perspective can give you tremendous advantage.
Reading is euphoric. Not only does reading provide you conscious and subconscious advantages at the intellectual and emotional perspective levels, but it can also serve as one of—if not your primary—means of entertainment. There are more worlds available in books than anywhere else, and becoming an avid reader opens those worlds for you to explore. Once you are practiced at reading, which won’t take long, you can be at peace and having the best time of your life, completely alone in the quiet.
Summary
Extraordinary enjoyment can come from exploring other worlds, all of which can be had, by yourself, in the peace of solitude.
Perspective changes give you conscious emotional connections to things that allow you to see situations from different angles.
Mental model updates subconsciously shape and improve your intelligence by baking in lifetimes of experience into your own judgement.
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
September 26, 2017
Why Biometric Data Breaches Won’t Require You To Change Your Body

Image by burak kostak
I hear a lot of people in InfoSec say things like,
I guess if my biometrics get hacked I’ll just change my face! Or, New Security Best Practice—Change face, eyes, and fingerprints every 90 days!
These are funny, but it’s important to realize that there’s a difference between you and pictures of you.
Imagine, for example, that there’s a security guard at the TSA that authenticates people using a comparison of images from a stick figure camera.

from XKCD
If you look at these pictures above, taken by Randall Munroe with that camera, you can see differences in the people, and those differences are used to authenticate them. So if the TSA guard knows that Philip is the guy with the beret, he can either let him in, or not.
These pictures could be out there in the world, circulated in airports, and even read by automated scanners to determine who to let in or not let in, but we wouldn’t be tempted to say that these pictures have stolen us in some foundational way.
In the case of the stick figure camera this is obvious because the stick figure image of Philip that it makes is just a a feeble abstraction of the real Philip.
The part a lot of people are missing is that modern biometrics are just stick figure cameras with better resolution.
They don’t capture eyes, or voices, or fingerprints. What they do is make crude diagrams of those things.
But wait, you say. Stick figure diagrams can’t confuse humans into thinking they’re a real person! And you can’t log into an iPhone with a stick figure diagram of a fingerprint, while you can with TouchID data.
That’s true, and that brings us to the second piece of this idea: it’s the combination of the diagram and the reader that matters.
Humans don’t authenticate other peoples’ faces based on reality either. They actually create a representation in the brain of a person they’re viewing, as perceived by the eyes, the brain, etc., which is turned into a concept.
It’s just another drawing. The original, eye-based kind.
Then the reader—going back hundreds of thousands of years—was also the human eye (and brain), and that completed the pair: the eye takes the image, stores it as a concept, and then the eye reads it and checks for a match.
With modern biometrics we have a different pair: a machine takes the diagram, and a machine reads it to see if it matches. But it’s still just a representation of the thing and not the thing itself.
Why does this matter?
Because to change the authentication system you just have to change either the image or the reader. The object itself is largely irrelevant.
The more complexity you have in a stick figure drawing, the more choices you actually are making about what to sample and how to store that representation. With a system like TouchID there was a lot of data there, and a lot of choices about how to capture it (sensor), manipulate it, and then store it (algorithm). With FaceID there’s far more.
Imagine a representation of a fingerprint in a biometric system as something like a randomly situated, three-dimensional matrix of dots the size of a basketball. As you rotate this ball around in your hands, with all the various sizes of the dots, and distances between them, that’s the fingerprint. That’s your stick figure picture.
And if you adjust the algorithm for capture of the image, or the algorithm for how it’s saved into the 3D array of dots—in any way— well, now you have a completely different image.
And most importantly, you now have to update all your readers to understand the data in that image as being a fingerprint that belongs to someone.
So what’s the takeaway here?
The magic of a biometric system is in the pairing of the diagram data and the reader, and it’s up to us—as people who make and deploy technology—to determine what those diagrams look like and what readers check those diagrams for authenticity.
So—no—we’re not in danger of needing to change our faces, eyes, or fingerprints anytime soon. If there were a breach of biometric authentication data at some point in the future (it’s when, not if) all we’ll need to do is update the software (and/or hardware) that reads the abstractions of those biomarkers.
It’s important to note, of course, that “just update your systems!” isn’t nearly as easy as it sounds. We should expect some percentage of systems to be deployed that will accept leaked versions of your likeness for a period of time after a breach. But we shouldn’t conflate that problem with needing to change our faces.
Biometric authentication is all about creating and comparing technical facimiles of what we are, and the solution to a biometric data breach is updating those abstractions, not updating ourselves.
Notes
I find it both interesting and sad that after all that it still brings us back to patching.
It’s also fascinating to realize the difference between spoofing vs. a machine vs. spoofing vs. a human. The ability to edit human voices and make them say anything you want, for example, is about to become a major disruptor.
There’s a separate problem of being able to spoof things with such great accuracy that no sensor will be able to tell the difference between it and the real thing. Take for example a molecule-by-molecule match of a person or something. It’s far away, but we need to be aware of the limitation.
Thanks to Steven Harms for talking through some of these concepts with me.
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
Format Painter in Apple Pages
I mostly use Microsoft Word for documents because Office is the platform of business, but in my more creative side projects I tend to use Apple’s Pages.
One of the things that Word does really well is copying formatting from one place to another. They have a feature called Format Painter, and it can be invoked in any Office app using the little paint brush icon.
Here’s how to get the same effect in Apple’s Pages.
Select the text you want to transfer the formatting of.
Navigate to Format --> Copy Style, or ⌥⌘C.
Navigate to the text you want to transfer the formatting to.
Navigate to Format --> Paste Style, or ⌥⌘V.
Hope this helps someone!
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
September 25, 2017
Unsupervised Learning: No. 94
This is episode No. 93 of Unsupervised Learning—a weekly show where I curate 3-5 hours of reading in infosec, technology, and humans into a 30 minute summary. The goal is to catch you up on current events, tell you about the best content from the week, and hopefully give you something to think about as well…
This week’s topics: Deloitte hacked, Equifax fumbles, SEC hacked, iCloud ransom, Adobe PGP facepalm, Verizon S3 buckets, CCleaner, tech news, human news, ideas, discovery, recommendations, aphorism, and more…
Listen and subscribe via…



Read below for this episode’s show notes & newsletter, and get previous editions…
Infosec news
Deloitte had its email system hacked (which looks to have possibly been Microsoft’s O365) via an administrator account that lacked 2FA. The breach was discovered in March of this year but could have been going on since late last year or possibly even longer. Link
Equifax has been sending concerned customers to a phishing site for weeks, and now we’re learning that they bought their identity protection service in August when they (but not the public) probably knew about the breach. We (and definitely I) cannot know that the truth is as bad as them strategically planning to make money off their own error, but at this point I wouldn’t be surprised. Link
Someone hacked the SEC last year, and accessed what the SEC is calling “nonpublic information”. It appears that the hack was used to make trades and earn profit. In July a report came out saying that the SEC lacked basic security controls. Luckily it’s just our economy we’re talking about. Link
Some Apple users have had their iCloud accounts hacked—likely by sharing passwords with another account that’s been compromised and published online—which resulted in the attacker locking their Macs remotely and then demanding money to unlock them. Link
Adobe posted their private PGP key on their blog. These people must have cursed the gods in a previous life or something. The whole company is like a giant Flash vulnerability. I’m loving the subscription model for their tools, though. Link
Verizon has had another data leak via—you guessed it—an unsecured Amazon S3 bucket. The content was scripts, server logs, etc. that included internal usernames and passwords. Link
The CCleaner tool has been infected with malware and has compromised at least 700,000 PCs, and Cisco’s Talos group believes that the authors attempted to get inside 18 major tech companies for the purposes of espionage. Link
ISO has rejected two NSA-designed encryption algorithms, apparently because they aren’t sure they can trust the NSA. Fair enough. Link
Swiping to enter your passwords on Android is an extremely weak protection against shoulder surfing, with 64% of attackers being able to reproduce a login after observing only one example. Link
Patching: Apache, iTerm2
Technology news
Google bought part of HTC’s smartphone team for $1.1 billion in a move that looks to be an acquihire of around 2,000 HTC employees and a longterm commitment to more seamlessly merging their hardware and software on mobile. Link
It looks like the GPS accuracy of our personal tech (and probably cars) will get upgraded in 2018 from 5 meters to 30 centimeters. And not only is it far more accurate, but it’ll work way better through buildings and other obstructions. Link
London will not renew Uber’s license in the city, citing quality concerns. Link
The Washington Post has a bot that’s posted over 850 articles in the past year. It’s mostly been factual updates, but expect this to upgrade in quality and start pushing on human talent before long. Change is coming swiftly here. Link
Human news
A massive new study of over 130,000 people across 17 countries has shown that even minor daily activity like vacuuming or walking to work (150 minutes per week) can reduce one’s chances of dying of any cause by 28%. And people who spent more than 750 minutes walking briskly reduced their chances of dying early by almost 40%. Basically, do anything active for 30 minutes a day. Link
Some economists are predicting a labor shortage due to the combination of economic growth and more and more people exiting the labor market (many of which are getting on disability and taking opiates). I’m interested in how this prediction will intersect with my own analysis of motion towards the gig economy, individual influencer/brands for services, and companies preferring to use contracted/temporary employees. Link
Scientists put slime mold onto a map of Tokyo and it quickly built the same train system that humans did. Link
Making projectiles out of Tungsten is evidently quite effective. Link
Ideas
With Facebook and Google You Are Literally the Product Link
Gender Dysphoria Contradicts Both Conservatives and Liberals Link
Co-working (in an office) may be getting popular because it’s about team productivity, not individual productivity. So while it may be true that YOU work better remotely, that doesn’t mean the team gets more done that way. Interesting perspective. I think a balance is needed. Link
Text Size and the Quality of Content Link
Discovery
Israeli researchers exfil data from air-gapped networks using infrared camera LEDs. Link
Explore Neural Networks in your browser. Link
Counterintelligence for Cyber Defense Link
An interesting perspective on “the Notch” on the iPhone X that basically says it’s going to become the new distinctive feature of iPhones. Link
Android Oreo has a number of significant security improvements, including stronger separation of third-party and core Android components, and an improved update mechanism. Seems like a solid security update. Link
A study indicating that IQ maps pretty directly to income. I don’t have enough statistics training to quickly check his work, but the tone seemed genuinely curious and non-biased. Link
AWS Extender — A Burp plugin for testing the security of Amazon S3 buckets. Link
Git Secrets — Prevents you from committing secrets to your repository. Link
Mindweb — a full (and visual) computer science curriculum online. Link
SniffAir — A wireless sniffing system by Rob Fuller (@mubix). Link
RepoSsessed — A project of mine that scans GitHub repos for various types of vulnerabilities (currently focused around secrets). Link
Notes
Haven’t read as much in the last week or so, but I’m still finishing The Fourth Turning and Essentialism.
I’m all Apple’d up with the latest gear (except the iPhone 8 because I’m waiting for the X). I have a new Space Grey Aluminum 42mm Series 3 watch on the way (with LTE), and just installed my new AppleTV with 4K. It’s stunning.
Recommendations
What You Need to Know About Climate Change. I know some of my readers are skeptics, and I know some of you are not. Regardless of which group you fall into I urge you to listen to this podcast. I’m one of those people who’s convinced that we are causing extraordinary warming, but I’ve always hated the fact that there don’t seem to be clear explanations of how we know there’s a problem. That’s precisely what this episode addresses. Link
reddit.com/r/wholesomememes — a Reddit sub dedicated to being excellent to each other. It’s just positive stuff, and I’m telling you that you should incorporate it into your routine. It might change how you see humanity in a positive way. Link
Aphorism
“The important things are always simple. The simple things are always hard. The easy way is always mined.” ~ Murphy’s Laws of War
You can also sign up below to receive this newsletter—which is the podcast’s show notes—every week as an email, and click here to get previous editions.
Newsletter
Every Sunday I put out a curated list of the most interesting stories in infosec, technology, and humans.
I do the research, you get the benefits. Over 10K subscribers.
And if you enjoy this content, please consider supporting the site, the podcast, and/or the newsletter below.
Monthly Support
A subscription is the most helpful way to help me continue making content.
Supporter - $5 / monthMember - $25 / monthPartner - $50 / monthPatron - $100 / monthOther amount
$
SubscribeOne-Time Support
You can also make a one-time contribution of any amount.
$
Send
Thanks for listening. I’ll see you next week.
_
If you enjoyed this, you can explore my other content, subscribe to my newsletter, and/or show support for my work.
Daniel Miessler's Blog
- Daniel Miessler's profile
- 18 followers
