Apple sued because two-factor authentication... oh, I give up.
Well, it finally happened to me: My very own creepy Facebook moment.
But I don't even use Facebook.
TL;DR: Facebook account I opened 8.5 years ago and never used receives "recommendation", out of the blue, to check out a small store I only just learned existed and started patronizing.
(That account: No phone number, no friends, no profile info, sort-of-fake name, dedicated email address. Me: No smartphone, didn't pay by credit card.)
Episode 50 – Tabletop D&D with Tim De Block, Ed Rojas, Daniel Ebbutt, and Kyle Andrus
It's that time again! Yes, another Tabletop D&D episode is upon us! This time I asked Timothy de Block from the Exploring Information Security podcast to join me, along with a few interesting characters. Let's just say this particular episode is not for the faint of heart, and w
@maxeddy they had to take a parting shot.
runc container breakout PoC
(via Frank Denis on birdsite)
@loke in any event, you’re right. We should try to find a fundamentally more secure method than needing to look inside encrypted network flows.
In other news, exactly what is wrong with EU parliament these days? (Re #copyrightdirective)
Please *contact me*. All I need is the domain name, which EU Member State it's located in, and the rough topic of the instance. Approximate user count welcome, but not necessary.
Please help. This is important.
@loke it’s a good question, and it does make sense to segment workstations from other parts of the network, but even so, regardless of placement, there is an implicit level of trust placed on the integrity of those workstations. Qubes is a great idea, and I hope it becomes useful one day. MS is working on a similar model, which will likely be more usable in enterprises using hyperv
So I was listening to Defensive Security Podcast today, and they were talking about the problem of Enterprise wanting to MitM traffic, which can be problematic sometimes.
Isn't the root cause that end-users have access to the corporate network in the first place. Shouldn't users be outside, and always assumed to be compromised?
Or let users access the Internet via secured VM's (a bit like what Qubes does).
Speaking which, I didn't realise that infosec.exchange was managed by @jerry
@Re4mstr load. They have a huge number of accounts, and had a recent flux of porn accounts.
Brief look at #logs - SNARE, BSD, LEEF https://medium.com/@hannahsuarez/brief-look-at-logs-snare-vs-bsd-vs-leef-9bc9ce7e2672
@fallenhitokiri while true, I have to say the pictures out of the Xs are noticeably nicer than any phone I’ve used before.maybe make them just a bit thicker. Would also not need the lens bump then.
@JohnsNotHere I’ve made some valiant attempts...