
This forces my team to find creative ways to keep them working while also taking measures to isolate them as much as possible. I also use them to teach old exploits that have been patched in more recent versions, walking people through how it worked and why it existed.
I am interested in learning more about this. I know a fair bit about networks but exploit history and modern attack / defense strategies and server hardening are not my main specialty. Do you have any good links or resources that you can share?
He bought it because he couldn’t stop being an arrogant edgelord keyboard shit-talker, and he accidentally made himself personally legally liable doing so. The Twitter board called his bluff, seeing the most amazing opportunity to rid themselves of an expensive and slowly dying company, and Musk had already pissed off the SEC (or one of the other financial government services) enough that he was at risk of having his finances in other companies audited.
So he was forced to buy it because he’s an impulsive troll. Everything else since then is pretty incidental, and unsurprisingly dripping with hypocrisy like this.