Note that DNS logging has PROCESS ATTRIBUTION! This surpasses even many commercial EDR capabilities! You will need to configure your SIEM to map the ProcessCreate GUIDs to the network events, but worst-case you can do it manually with copy/search.
I really like this local-first idea. Keep the benefits of sharing and collaboration without losing ownership and control.
The inception bar: a new phishing method
I have two states:
- I CAN CODE ANYTHING
- what is a computer
This is so unacceptable! Alexa users never knowingly consented to their personal recordings being accessed by 100’s of 3rd parties unknown! Is it time to get rid of your Alexa? https://twitter.com/privacymatters/status/1122416238603526144
Hey @[email protected], looks like another one of your ideas is popping up in the real world this spring.
I'm just going to repost this in case anyone hasn't already read it.
I was somewhat skeptical about the findings at first but the response on Twitter has me leaning towards the side of @[email protected], I find it hard to see innocent parties acting that way.
If a certain investigative reporter could refrain from outing the identity of Register article sources, that would be great.
We cannot comment further due to privacy concerns. But, we see you. And what you're doing is, as we say in Blighty, just. not. cricket.
Dear Ruby devs and game devs. I have a crazy announcement I want to share. Please boost.
Last week I released A Dark Room to the Nintendo Switch. Within the game, I also shipped a Ruby interpreter and a code editor as an Easter Egg.
*This Easter Egg effectively turns every consumer spec-ed Nintendo Switch into a Ruby Machine.*
1. Download A Dark Room from the US/EU.
2. Connect a USB keyboard and press the “~” key.
3. Follow the onscreen instructions.
Metasploit RCE. No, not a module. RCE in Metasploit itself.
Go patch if you haven’t already.
Maybe he just objects to the constant passive surveillance by an unaccountable private corporation operating almost entirely on public funds and resources. https://twitter.com/mikesisak/status/1121070464384819200
"Internet freedom is in decline around the world, and being part of a force for good that allows people to have private access to the open Web is hugely important to me. Millions of people around the world rely on Tor Browser and onion services for private and secure communication in their day-to-day lives." - Steph, communications director of the Tor Project https://internethealthreport.org/2019/in-defense-of-anonymity/
Another interesting bit of research on cryptocurrency theft.
The latest XKCD really hits on the reason I dislike the shift towards extreme dependency usage.
Podcast wars! NYT and Spotify prohibiting Luminary from using the open RSS feeds for The Daily and Reply All is...something else. Big @[email protected] story here: https://www.theverge.com/2019/4/22/18510897/luminary-podcast-app-launch-the-daily-gimlet-media-spotify
Are people really so attached to the OSI Model that even suggesting alternative teaching models is offensive?
Any OSI evangelists on the #fediverse who can shed some light on why OSI is better than any alternative way of teaching protocol layers?
Hardware & Software Development • Rapid Prototyping • Embedded Systems
Social.Rights.Ninja is a small Mastodon instance for those looking for a quiet home-base from which to explore the fediverse. Please email [email protected] for information on getting an invite.