Skip to content

Instantly share code, notes, and snippets.

View Enegnei's full-sized avatar
✍️
Revising

Janine (J9) Enegnei

✍️
Revising
View GitHub Profile
@Enegnei
Enegnei / Threat-Model-Errors.md
Last active September 26, 2021 17:52
A list of several major errors in the BTC Threat Model

2.1.2 An attacker could use a quantum computer to guess everyone's private keys.”

It is very unlikely that quantum computing or any other field of scientific research will result in such a drastic rewriting of our understanding of the basic laws of physics.”

This is probably one of the easiest threats where he could have provided statistical analysis data, as private key collision is a very popular concern and there are numerous technical forums which have addressed it over the years.

He incorrectly states that “the private key is so large that it would take more energy than is produced by the sun in its entire lifetime to power a computer capable of guessing it.” This demonstrates a very poor understanding of not only Bitcoin, but cryptography and [quantum computing](https://www.ibm.com/communities/analytics/riskmanagement-blog/quantum-risk-management-schrodingers-dead

@Enegnei
Enegnei / Revision-Controlled_Journalism_V2.md
Last active March 6, 2022 06:18
Revision-Controlled Journalism - VERSION 2

Revision-Controlled Journalism

Janine Römer | einzelgaengerin@protonmail.ch

VERSION 2 – February 1st 2018

A form of online journalism which utilizes version control systems (VCS) for the purposes of contemporaneous time-stamping and tracking changes to a story.

Ideally, this model would be implemented using open-source intelligence (OSINT), open-source software (OSS), and “copyleft” or Creative Commons (CC) licensing within an open participatory network.

THE 'FAKE NEWS' PROBLEM

@Enegnei
Enegnei / Revision-Controlled_Journalism.md
Last active June 28, 2022 16:24
Revision-Controlled Journalism - VERSION 1

Revision-Controlled Journalism

Janine Römer | einzelgaengerin@protonmail.ch

VERSION 1 – July 22nd 2016

The most familiar form of intelligence – so familiar that it is usually not recognized as intelligence – is open-source intelligence: information obtained from sources that are not attempting to conceal it. Open-source intelligence is almost the only form of intelligence practiced by scholars, reporters, and business people, but it also plays a major role in national intelligence. In the national case, typical open sources are newspapers, radio broadcasts, foreign government publications, propaganda, maps, and phone books. In industrial intelligence, advertisements and product literature are major sources.

Older open sources have now been joined by the Internet and the World Wide Web. Browsing the Web is practicing open-source intelligence. Google and more specialized search engines give their users access to information on an unprecedented scale.

  • [*Privacy on the Line: The Po
@Enegnei
Enegnei / HTTPShame.md
Last active November 22, 2023 17:05
A shame-list of popular websites which have not yet deployed HTTPS certificates

HTTPS vs HTTP

HTTPShame

A shame-list of popular or important websites which have not yet deployed HTTPS certificates by default.

Sites which may involve the transmission of very sensitive data, such as health or banking information, are marked with an ❗ to signal they should deploy HTTPS-by-default as soon as possible. If you are a popular website (such as those on the Alexa Top 500 Global Sites) which finds itself on this list - and you want to be removed - you can visit Let's Encrypt about transitioning to HTTPS. It's easy, free, and will help you learn how to protect your customers/ readers!

List now outdated, removed until further notice.

Q: What is HTTPS?

Keybase proof

I hereby claim:

  • I am Enegnei on github.
  • I am j9roem (https://keybase.io/j9roem) on keybase.
  • I have a public key whose fingerprint is 9A2D 6A2A D7AF AC73 9140 F6BC 468D C5D7 814C C13F

To claim this, I am signing this object: