Stephan Somogyi(@thinkpanzer) 's Twitter Profileg
Stephan Somogyi

@thinkpanzer

Primum non nocere |
User Protection @Google |
Sr Research Fellow @columbiajourn |
Meddling kid |
Weniger, aber besser |
Tweets mine.

ID:96268540

calendar_today12-12-2009 03:44:17

4,5K Tweets

3,2K Followers

2,1K Following

Follow People
sofía celi(@claucece) 's Twitter Profile Photo

The videos for our talk at Real World Crypto are up! The talk is about designing cryptography for small organisations. The session also has the amazing talks from Stephan Somogyi and Leah Rosenbloom which I encourage to anyone watch! youtube.com/watch?v=c4kZds…

account_circle
Real World Crypto(@RealWorldCrypto) 's Twitter Profile Photo

In-person registrations for RWC 2023 are nearly at venue capacity. So if you are planning to attend RWC 2023, register now. Please do not assume that you can register on-site: this is most likely not going to be possible.

account_circle
Stephan Somogyi(@thinkpanzer) 's Twitter Profile Photo

Were it not for Tom Coates and anna pickard, I would not know about Roxie's, and I would therefore not presently be in particularly pleased possession of two packages of milk chocolate caramel digestives.

May your karmic accounts be appropriately credited.

account_circle
David Kleidermacher(@DaveKSecure) 's Twitter Profile Photo

Congratulations to the inaugural class of / New America Fellows and for continuing to grow its impact! newamerica.org/international-…

account_circle
Stephan Somogyi(@thinkpanzer) 's Twitter Profile Photo

Since these threads sometimes get lost in timezone and weekend differences, now is a good time to make this one more visible again.

If you have —or know of — an open role that might fit Coretta Jackson, MBA 🦋 's skillset, please reach out to her!

account_circle
Stephan Somogyi(@thinkpanzer) 's Twitter Profile Photo

I'm hugely looking forward to tomorrow, when I'll be partnering with Coretta Jackson, MBA 🦋 — follow to learn more about her, how she got into infosec, and where she's going!

account_circle
LRB Bookshop(@LRBbookshop) 's Twitter Profile Photo

thank you so much to the anonymous ex-Waterstones manager who forwarded me a copy of the actual snake policy. (this is from 2018 so it may have changed slightly since then, but this consistent with what people have been reporting of their own experiences)

thank you so much to the anonymous ex-Waterstones manager who forwarded me a copy of the actual snake policy. (this is from 2018 so it may have changed slightly since then, but this consistent with what people have been reporting of their own experiences)
account_circle
Joe Groff ⎷⃣(@jckarter) 's Twitter Profile Photo

Fantasy: I can write C code without any memory errors
Sci-Fi: With this tool, I can write C code without any memory errors

account_circle
Stephan Somogyi(@thinkpanzer) 's Twitter Profile Photo

Really helpful to be able to point to examples like this, in part also to highlight that baseline social engineering evolves/improves over time.

Spoofing a searchable number demonstrates planning & scale.

Using narrative tension to get the target to enter info is solid work.

account_circle