Controlling your smart phone's ability to leak information is a high priority for me. That's why I was so pleased to find Bouncer. Have a look.

makeuseof.com/tag/grant-tempor

Now if I could only get my contacts to stop using Whatsapp and use Signal instead. 😑

Signal >> Blog >> Setback in the outback signal.org/blog/setback-in-the

20 Years after OpenSSH is created.... better late than never....

Windows Server 2019 Officially Supports OpenSSH For the First Time

Windows Server 2019 Officially Supports OpenSSH For the First Time rss.slashdot.org/~r/Slashdot/s

Edge goes Chromium, and open source wins the browser wars | ZDNet

Decades after starting the web browser wars, Microsoft has given up its proprietary Edge web browser in favor of its open-source based rival Chromium.

zd.net/2UqczWX

US Pol, Downfall II Show more

Am I the only one that hopes that crypto-currency mining dies to save the planet from ridiculous wastes of energy usage?

FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.

firehol.org/

#Mastalab reached the top 10 in Google PlayTrending (France) for social apps.
I guess some people left Twitter and Tumblr.
Welcome on #Mastodon, a network without tracking.

To the Tumblr refugees: welcome!

Having been on the Internet for over thirty years, I have one piece of advice for creative folks working online:

Control Your Platform.

Don't build a business around Facebook, Tumbler, G+, Geocities, MySpace, AltaVista, or any of these other third parties that claim to offer quick and easy results.

They all go away. Every one of them.

Build your own site. Use third parties to steer people to your site.

Third parties are the devil--useful devils, but devils.

The Hinternet Show more

This is quite an interesting cybercrime campaign.

"The ad fraud scheme that utilizes the Kovter botnet runs a hidden Chromium Embedded Framework (CEF) browser on the infected machine that the user cannot see. A C2 server tells the infected machine to visit counterfeit websites. When the counterfeit webpage is loaded in the hidden browser, requests are made for ads to be placed on these counterfeit pages. The infected machine receives the ads and loads them into the hidden browser."

Holiday Shopping Safety Tips: LastPass 2018 Online Retailer Security List

Keep your information safe this holiday season! LastPass ranks 2018’s top 10 online retailers from most to least secure and shares what to lookout for.

blog.lastpass.com/2018/11/2018

Many free mobile VPN apps are based in China or have Chinese ownership | ZDNet

Chinese affiliation raises a sign of alarm in light of China's recent clampdown of "unauthorized" VPN services.

zdnet.com/article/many-free-mo

Shoutout to #Debian for giving the world an amazing non-corporate community distro.

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.