Skip to main content

Educator, instructional technologist, tinkerer, musicmaker, hauler of bootstraps

Grant Potter

Tactics, Techniques, and Procedures

  • He identified peripheral web servers via Google and Linkedin searches
  • Used known WordPress flaws and custom bugs to compromise PHP sites
  • Linux authentication mechanisms were altered to capture credentials
  • Nmap was used to identify exposed network services internally
  • Corporate Wikis revealed administrative workflows and VPN details
  • Ticketing, bug tracking, and version control systems provided secrets (e.g. cryptographic keys, seeds, hashes, credentials, and source code)
  • Cookies from weak non-production instances (e.g. staging) were valid in production as cryptographic materials were the same — bypassing 2FA
  • Client certificates (exposed by email, ticketing, or lifted from filesystems) were combined with known credentials to access corporate VPNs
  • Engineering credentials were used to commit backdoors to version control which were self-approved and later deployed into production

Grant Potter

Grant Potter

Grant Potter

The Ultimate Browser-Based Music Production Guide via @EBnet

Grant Potter Open cultural production and the online gift economy: The case of Blender

Grant Potter

Pizza in full production at our bayside oven

Grant Potter

"the tampering is done during the fabrication phase of the chip's production, long after the chip's design is finalized"

Grant Potter

A interactive TwilightZone movie in production from Bioshock developers

Grant Potter

cc: @mgershovich How the Computer Got Its Revenge on the Soviet Union

"The results of top-down computerization were devastating. New computer systems accumulated ever-increasing amounts of raw data and generated terrifying heaps of paperwork. In the early 1970s, roughly 4 billion documents per year circulated through the Soviet economy. By the mid-1980s, after Herculean efforts to computerize the bureaucratic apparatus, this figure rose by a factor of 200 to about 800 billion documents, or 3,000 documents for every Soviet citizen. All this information still had to pass through narrow channels of centralized, hierarchical distribution, squeezed by institutional barriers and secrecy restrictions. Management became totally unwieldy. To get an approval for the production of an ordinary flat iron, for example, a factory manager had to collect more than 60 signatures. Technological innovation became a bureaucratic nightmare."

Grant Potter

Weekly Roundup: Feb 15 - Feb 22

2 min read

I love the 'Week in Review' summaries I am seeing at blogs like:, and so I am going to give it a shot as a method of ensuring I get to my blog more often.  I'm going to start with a few things I have bookmarked this week and hopefully work towards regular updates on work-related items I have in the mix.

How Did They Make That? 

  • Many students tell me that in order to get started with digital humanities, they’d like to have some idea of what they might do and what technical skills they might need in order to do it. Here’s a set of digital humanities projects that might help you to get a handle on the kinds of tools and technologies available for you to use. 

How I Taught My Computer to Write Its Own Music

  • I wanted to build the ideal collaborator. Was I ever surprised.

  • First, students owned their means of production. They weren’t writing in discussion forums in order to get 2 points for posting to the weekly prompt. They wrote to communicate with audiences within the class and beyond. Second, everyone’s thinking could be found in the same place, by looking at hashtags and our syndication engines on Finally, this design allows our learning to be permeable to the outside world. Students could write for audiences they cared about: fellow librarians or English teachers or education technologists working in developing countries.

  • beauty, freedom, technology and morality get dissected by a team of thinkers. 

  • Burroughs radio documentary narrated by Iggy Pop.