• Sign in
  • Sign up
Elektrine
EN
  • EN English
  • 中 中文
Log in Register
Modes
Overview Search Chat Timeline Communities Gallery Lists Friends Email Vault VPN
Back to Timeline
  • Open on infosec.exchange

Dan Goodin

@dangoodin@infosec.exchange
mastodon 4.6.0-alpha.5+glitch

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

0 Followers
0 Following
Joined November 22, 2022
Site::
https://arstechnica.com/author/dan-goodin/

Posts

dangoodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
Dan Goodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
@dangoodin@infosec.exchange · Mar 03, 2026

Tire pressure "transmissions are sent without any encryption or secure mechanisms and include a unique identifier. This allows anyone with affordable equipment like a low-cost spectrum receiver and a standard off-the-shelf antenna to capture and track them throughout time and space."

https://www.securityweek.com/researchers-uncover-method-to-track-cars-via-tire-sensors/

View on infosec.exchange
39
0
28
0
dangoodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
Dan Goodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
@dangoodin@infosec.exchange · Mar 03, 2026

RIP burner accounts

https://arstechnica.com/security/2026/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/

View on infosec.exchange
50
0
71
0
dangoodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
Dan Goodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
@dangoodin@infosec.exchange · Feb 27, 2026

Google has devised a means for securing HTTPS certificates against quantum computing attacks without massive performance hits stemming from the considerably longer size of data required to be included.

Is anyone following this work?

https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html

View on infosec.exchange
39
0
28
0
dangoodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
Dan Goodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
@dangoodin@infosec.exchange · Feb 26, 2026

That guest SSID you set up for your neighbors may not be as secure as you think

https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/

View on infosec.exchange
18
0
34
0
dangoodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
Dan Goodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
@dangoodin@infosec.exchange · Feb 11, 2026

I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

https://red.anthropic.com/2026/zero-days/

View on infosec.exchange
38
0
34
0
dangoodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
Dan Goodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
@dangoodin@infosec.exchange · Jan 28, 2026
Even people with the most to lose continue to support and rely heavily on: -- Google -- Slack -- Meta -- Microsoft -- Apple -- Too many others to list These orgs cozy up to authoritarianism. They terminate your account for any reason or no reaso at all. They shove AI down your throat. And yet, my workplace, union, and so many of the orgs I value and need keep using them and have no plans to ween themselves off. Yes, I realize current dynamics make all of this inevitable. So I'm left feeling hopeless and helpless, which is a terrible place to be.
View on infosec.exchange
7
0
7
0
Boosted by Greg Bell @ferrix@mastodon.online
dangoodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
Dan Goodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
@dangoodin@infosec.exchange · Jan 23, 2026
AI slop is making streaming platforms unusable for music discovery. Now it's doing the same for bug bounty programs https://arstechnica.com/security/2026/01/overrun-with-ai-slop-curl-scraps-bug-bounties-to-ensure-intact-mental-health/
View on infosec.exchange
4
0
7
0
Thread context 2 posts in path
Parent @gunther@wetdry.world Open
on wetdry.world
Open ancestor post
Current reply
dangoodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
Dan Goodin
Dan Goodin
@dangoodin@infosec.exchange

Reporter covering security at Ars Technica. DM me on Signal: DanArs.82.

infosec.exchange
@dangoodin@infosec.exchange · Jan 13, 2026
@gunther@wetdry.world It's explained pretty thoroughly in the article and in Moxie's blog posts, which the article is based on. If after reading them you still don't know what E2EE in this context means, please LMK and I'll answer questions.
View full thread on infosec.exchange
0
0
0
0
313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: imap.elektrine.com:993

POP3: pop.elektrine.com:995

SMTP: smtp.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 09:17:07 UTC