Pinned toot

🏆 Achievement unlocked: survived my first Mastodon drama 🙌🏻

Our lead developer was recently laid off from his job, your support via Patreon, Open Collective and other platforms means a lot during this difficult time.

We've come too far to give up now, progress may be slower for the next few weeks.

🏆 Achievement unlocked: survived my first Mastodon drama 🙌🏻

How to tell a true friend: they strip the tracking identifiers and amp junk from a url before sharing it with you.

I came up with a single pass O(n) sort algorithm I call StalinSort. You iterate down the list of elements checking if they're in order. Any element which is out of order is eliminated. At the end you have a sorted list.

Also: Any ideas how to improve that issue? I'm drawing either blanks, ways not suited for non-techy users, or time-intensive admin work 😕

While I enjoy the lack of the account bullshit on here, it certainly makes it harder to find certain profiles (esp. if they've yet to proove ownership of their websites etc.) and makes it easier for imposters. E.g. try to find the correct accounts of (countless name changes and outdated legacy profiles on different instances are NOT helping, and and tell me how long it took ya. And count the number of fake "offical" profiles.

Yo, people (and 🤖🤖🤖)! What are your favourite to follow on ? Show some love and recommend your pick for "Most Awesomest /#photographer/#painter/#digitalartist" etc.

@ScottMortimer @chidgey @jerry @seeyouindisneyland @crowd42

Wasn't "military-grade encryption" ROT-13 at some times?
I'm pretty sure Julius Caesar used it for military communications...

@chidgey

@jerry @seeyouindisneyland
U
Military grade encryption is usually just AES-256. I always wondered why people thought there was some secret sauce that was more

"Military grade encryption" is still the gold standard if you want to know if a vendor is bullshitting around and has no clue about security. 🙄

NordVPN Hacked, cover up 

NordVPN breach was worse than I thought.

'TechCrunch took NordVPN to task on the somewhat dismissive tone of its breach disclosure, noting that the company suffered a significant breach that went undetected for more than a year.

Kenneth White, director of the Open Crypto Audit Project, said on Twitter that based on the dumped Pastebin logs detailing the extent of the intrusion, “the attacker had full remote admin on their Finland node containers.” '

krebsonsecurity.com/2019/10/av

"Kali Linux is the glass slipper for our generation. You slip one on when you meet a target. You dance all night, and then you throw it away. The completely broken Kali VM, I mean, not the target." - Marla Singer, Fight Club (1999)

@chartier The current standards are a shitshow. So:

- USB Type C is just the physical connector
- USB 3.1 gen 2 is the current fastest version of the USB protocol and uses the Type C connector
- Thunderbolt 3 is an entirely separate protocol from USB 3.1 gen 2 that _also_ uses the Type C connector

USB 4 merges the two protocols, so USB 4 is a superset of TB3 (still using the Type C connector).

(then there's also USB 3.2 Gen 2x2, which is a protocol that is also over the Type C connector, but is _not_ Thunderbolt)

So USB4 will be substantially better than the current situation, but still not great because of old devices/cables and backwards compatibility needs.
Show more
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.