ashar

joined 2 years ago
MODERATOR OF
[–] ashar 1 points 8 months ago (2 children)

Your premise that anyone suspected of being associated with Hamas should be killed is against the Geneva conventions. You are supporting war crimes.

[–] ashar 2 points 8 months ago (4 children)

A trail does review evidence whereas here we just had a summary execution.

Your link to them UN press release says this:

"OIOS was not able to independently authenticate information used by Israel to support the allegations."

[–] ashar 2 points 8 months ago (6 children)

Ah yes, beleive a state that is on trial in both the courts in The Hague (war crimes, crimes against humanity and genocide).

[–] ashar 2 points 8 months ago

We sent aid and bombs. The bombs got through but not the aid. We are working on it.

/s

[–] ashar 7 points 8 months ago (8 children)

The guy was delivering food to a starving population. The occupation could have captured him since they have a military presence and control in the area.

[–] ashar 3 points 8 months ago

and the MFA we all have

[–] ashar 3 points 8 months ago (1 children)

It's the government's pet religious authority. They will produce any opinion that the government wants. Is there a name for these kind of scholars in Islamic history?

[–] ashar 9 points 8 months ago

Your field of study is not directly relevant here (unless you work to figure out the death toll, maybe). However scholars that do study genocide do now seem to agree that the killing of Palestinians by Israel is a genocide.

[–] ashar 2 points 9 months ago

The last civil war didn't quite totally destroy the country. Let us try again.

[–] ashar 35 points 9 months ago (1 children)

The 40,000 killed statistic is reliable in that the killed persons name, identity number etc are reported to MoH officials and recorded by them, and the dead are seen by the officials. However the figure is a small subset of the actual number dead. 200,000 to 300,000 dead in Gaza in the past year is a conservative estimate.

[–] ashar 2 points 9 months ago

The Economist had a good (probably unintentional) illustration of this.

[–] ashar 1 points 9 months ago (1 children)

The killing according to the Gaza Ministry of Health statistics seems to be slowing down, but this is because the MoH is maintaining a very high bar for recording the deaths. The attacks on the population is continuing at what seems to be the same rate.

from: https://www.dropsitenews.com/p/how-gaza-health-ministry-counts-dead "The Ministry of Health is committed to registering only those who reach its hospitals or other emergency medical care facilities in the Gaza Strip. Consequently, the number of martyrs announced by the ministry does not necessarily represent the total number of casualties but only those that have been officially documented."

Given that state of the hospitals is dire (they have all been bombed and attacked), the slow down in recording of deaths correlates with and is due to the destruction of the MoH and general civilian infrastructure. The reduction in rate of killing recorded does not align with the rate of actual killing.

4
submitted 9 months ago* (last edited 9 months ago) by ashar to c/security_cpe
 

Schedule

Live Stream Track 1

The Track 2 audio is difficult to understand and the video shows the presentation very badly. Live Stream Track 2

Live Stream Track 3

2
BSides Oslo 2024 (bsidesoslo.no)
submitted 9 months ago by ashar to c/security_cpe
 

This lecture given onsite at MIT Lincoln Laboratory on 25 April 1985 coveres many salient points still relevent today.

Rear Admiral Grace Hopper's famous MIT Lecture

Grace Brewster Hopper (née Murray; December 9, 1906 – January 1, 1992) was an American computer scientist, mathematician, and United States Navy rear admiral.[1] She was a pioneer of computer programming. Hopper was the first to devise the theory of machine-independent programming languages, and used this theory to develop the FLOW-MATIC programming language and COBOL, an early high-level programming language still in use today. She was also one of the first programmers on the Harvard Mark I computer. She is credited with writing the first computer manual, "A Manual of Operation for the Automatic Sequence Controlled Calculator."

Before joining the Navy, Hopper earned a Ph.D. in both mathematics and mathematical physics from Yale University and was a professor of mathematics at Vassar College. She left her position at Vassar to join the United States Navy Reserve during World War II. Hopper began her computing career in 1944 as a member of the Harvard Mark I team, led by Howard H. Aiken. In 1949, she joined the Eckert–Mauchly Computer Corporation and was part of the team that developed the UNIVAC I computer. At Eckert–Mauchly she managed the development of one of the first COBOL compilers.

1
HOU.SEC.CON. 2024 (www.houstonseccon.com)
submitted 9 months ago by ashar to c/security_cpe
3
submitted 9 months ago* (last edited 9 months ago) by ashar to c/security_cpe
 

Podcast

Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!

Guest: Dan Nutting, Manager - Cyber Defense, Google Cloud

Topics:

What is the Defender’s Advantage and why did Mandiant decide to put this out there?

This is the second edition. What is different about DA-II?

Why do so few defenders actually realize their Defender’s Advantage?

The book talks about the importance of being "intelligence-led" in cyber defense. Can you elaborate on what this means and how organizations can practically implement this approach?

Detection engineering is presented as a continuous cycle of adaptation. How can organizations ensure their detection capabilities remain effective and avoid fatigue in their SOC?

Many organizations don’t seem to want to make detections at all, what do we tell them?

What is this thing called “Mission Control”- it sounds really cool, can you explain it?

Resources:

Defender’s Advantage book

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense supplemental paper

3
submitted 10 months ago* (last edited 10 months ago) by ashar to c/security_cpe
 

Podcast

Transcript

Join G. Mark Hardy in Torremolinos, Spain, for a deep dive into the security of Generative AI. This episode of CISO Tradecraft explores the basics of generative AI, including large language models like ChatGPT, and discusses the key risks and mitigation strategies for securing AI tools in the workplace. G. Mark provides real-world examples, insights into the industry's major players, and practical steps for CISOs to balance innovation with security. Discover how to protect sensitive data, manage AI-driven hallucinations, and ensure compliance through effective governance and ethical guidelines. Plus, get a glimpse into the future of AI vulnerabilities and solutions in the ever-evolving tech landsc

2
submitted 10 months ago by ashar to c/security_cpe
2
submitted 10 months ago by ashar to c/security_cpe
5
SEC-T 2024 (infosec.pub)
submitted 10 months ago* (last edited 10 months ago) by ashar to c/security_cpe
2
submitted 11 months ago* (last edited 11 months ago) by ashar to c/security_cpe
view more: ‹ prev next ›