Hopping on a plane to . Fingers crossed the connection works once I touch down!😐

The more Mastodon clients get uploaded to iTunes/Google store (also need them uploaded to the Fire store, F-Driod, Samsung Apps)... make sure to also use "Twitter-like" in the description.

A few more Masto clients and there will be like 2x as many mastodon clients on the stores than there are twitter clients.

As people change phones and search the stores for Twitter they'll wonder why there are so many #Mastodon things in the stores.

vaguely confirm require in locally sold products. No reason to believe that backdoors on global products are provided. The price of selling to the world's biggest population I guess?
theinquirer.net/inquirer/news/

flawlessly peeled four boiled eggs. That's my lifetime supply of luck burned then.

Kinda wish I'd used it on something more worthwhile but what can you do? 🤷

Any Newegg customers between mid August and now should contact their banks as the payment portal was compromised with malicious code to exfiltrate credit card data.
techcrunch.com/2018/09/19/newe

Western Digital Network Attached Storage devices fall victim to unauthenticated admin login attack leading to Remote Code Execution . Researchers at disclosed publicly 180 days after notifying WD with no response. Not the first time a security researcher has been met with radio silence from WD. A previous vulnerability was also dropped publicly after WD failed to response within 180 days.
thehackernews.com/2018/09/wd-m

How you think you discuss vs how you actually discuss it. 😂

turn their attention to credential stuffing attacks aimed at financial institutions which, funnily enough becomes a denial of service . Billions of requests sent over the course of days. classified three different botnet activities ranging from large volume from few sources to low volume from many sources. The latter is significantly harder to defend against than the former.
bleepingcomputer.com/news/secu

Also, i saw this on twitter today and may make it the official logo of infosec.exchange

Recap: Secure your SSH access

– allow only whitelisted IP addresses to connect
– use a non-root account for access and disable root
– use keys instead of passwords
– only use modern algorithms
– enable 2FA for SSH
– back up your configuration
– (use dedicated hardware to store your keys)

infosec-handbook.eu/blog/wss1-

#webserversecurity #security #infosec #cybersecurity #ssh #hardening #2fa #firewall #pam

@jerry @aussierockman this chart of support lifetimes for iOS and flagship Android models is useful: currently averaging ~33 months after release for Pixel phones, and ~50 for iPhones. I was just about to get a Pixel, but this post actually swayed me to iPhone

androidpolice.com/2017/11/02/a

It's dawned on me that makers design their devices to degrade quicker, be constructed of cheaper materials and have a short end of life support for updates. The sole purpose is for you to see the device has become outdated and compel you to upgrade within 2 years. It's become the norm that owning anything beneath an X is considered a relic and you "need to keep up with the times". Well the times need to change to permit older devices to remain current beyond 3 years.

So get this guys and gals. $1 hand solderable (1 GHz Arm A8) with 512 GB support is the enthusiast dream. No support out of the box but that can be done with other hardware. Rivals the and Pi.
hardware.slashdot.org/story/18

Reading online news, 2008:
- go to website
- read news

Reading online news, 2018:
- go to website
- no, don’t share location
- hell no, don’t send me notifications
- consent to cookie warning
- consent to policies
- no, don’t open in app
- no, don’t want the newsletter
- skip inspirational quote
- close full page ad
- read news

keep having to tell myself it's fine to follow a million accounts and that worrying about ratios means worrying about finding too many nice and interesting people. this is some intense deprogramming y'all

Today is #DayAgainstDRM. Why is #DRM so bad? Find out here: drm.info/ and here: fckdrm.com/

What can you do against it? Don't buy DRM'd products. Also, find out how to take action: defectivebydesign.org/action

#NoDRM #DRMfree #FCKDRM

by Israeli intelligence group, discovered in and devices of 45 different countries. Either the users have been infected by foreign entities or the governments of the respective countries are undertaking illegal . Some of the countries are listed as having questionable human rights policies.
yro.slashdot.org/story/18/09/1

Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.