- Jan 2021
-
forums.theregister.com forums.theregister.com
-
By design, snap apps have no access to /etc. They live in their own little world, but instead of a normal chroot, they are splatted all over the standard Linux filesystem layout. With other bits mounted hither and thither. Its a mess, and subject to change with each release.
-
-
www.theregister.com www.theregister.com
-
"in the Ubuntu 20.04 package base, the Chromium package is indeed empty and acting, without your consent, as a backdoor by connecting your computer to the Ubuntu Store. Applications in this store cannot be patched, or pinned. You can't audit them, hold them, modify them or even point snap to a different store. You've as much empowerment with this as if you were using proprietary software, i.e. none."
-
-
-
theintercept.com theintercept.com
-
At least one Zoom leaker has already been unmasked: a member of the New York State Assembly who apparently filmed his “self-view” while recording a dispute within the Democratic assembly conference over the renomination of the speaker. That may sound careless, but a feature developed by Zoom will allow future leakers to be exposed even without that sort of misstep.
-
-
www.currentaffairs.org www.currentaffairs.org
-
I remember reading Matt Bruenig when I was in college, and he was like, “Well, actually Social Security was the most effective pathway to bring people out of poverty.” I wrote a story in 2017 called “Why Education Is Not the Key to a Good Income,” and it was looking at this growing body of research that showed it was not your level of education that determined your chances of rising economic mobility. It was these other factors—like what kind of industries were in your community, union density, some of it was marriage.
makes sense... the best way out of poverty isn't education... it's money.
-
-
atomiks.github.io atomiks.github.ioThemes1
-
The CSS automatically gets injected into <head> with the CDN (tippy-bundle). With CSP enabled, you may need to separately link dist/tippy.css and use dist/tippy.umd.min.js instead.
-
-
atomiks.github.io atomiks.github.io
-
Ensure HTML strings containing user data are sanitized properly to prevent XSS attacks.
-
-
www.npmjs.com www.npmjs.com
-
-
Think first: why do you want to use it in the browser? Remember, servers must never trust browsers. You can't sanitize HTML for saving on the server anywhere else but on the server.
-
-
www.npmjs.com www.npmjs.com
-
-
utilizing the fact that the same origin policy is not enforced within server-to-server communication
-
-
github.com github.com
-
blog.logrocket.com blog.logrocket.com
-
JSONP is a relic of the past and shouldn’t be used due to numerous limitations (e.g., being able to send GET requests only) and many security concerns (e.g., the server can respond with whatever JavaScript code it wants — not necessarily the one we expect — which then has access to everything in the context of the window, including localStorage and cookies).
-
-
www.howtogeek.com www.howtogeek.com
-
The application is executed in an encapsulated, ring-fenced way, so its files can’t interfere with those on your computer. You can even install multiple versions of the same application, and they won’t cross-pollinate or fight amongst themselves.
-
-
discourse.ubuntu.com discourse.ubuntu.com
-
Many people are also very wary of PPAs because they can contain anything. While a PPA might say it contains “Music Player”, the owner of the PPA can put anything in it. The deb installed from a PPA has root on your system when installed, so can do anything - good or bad.
-
but that doesn’t mean that confining applications is not a benefit also to FOSS applications, security is an issue that needs to be addressed with many layers of measures no mater what licensing approach you use to license the software
-
However there’s more benefit of confining proprietary closed source applications, because they are to audit to the same level
-
The benefits for developers do reflect on benefits for users, with more software delivered faster and more securely.
-
But in my apt/deb world, where I use official repositories from my distro, where is the threat from 3rd party ? They are eventually « curated » in partner repository, or in universe
-
Adding layer of settings and complexity for the end user might also bring bad practices to keep a comfortable use of app’s by installing snap without confinement…
Tags
- PPAs
- delivering software/changes faster
- proprietary software
- benefit to both developer and to user
- not necessarily the case
- better for some but worse for others
- bypassing security constraints because they get in the way
- not
- security
- software licensing
- confinement (security)
- curation
- unintended consequence
- benefiting one party benefits another
- the benefits of both
Annotators
URL
-
-
github.com github.com
-
As you already noticed, the extension does not go in an manipulate the hrefs/urls in the DOM itself. While it may seem scary to you that an extension may manipulate a URL you're navigating to in-flight, I think it's far scarier to imagine an extension reading and manipulating all of the HTML on all of the pages you go to (bank accounts, utilities, crypto, etc) in order to provide a smidgeon of privacy for the small % of times you happen to click a link with some UTM params.
-
-
material-ui.com material-ui.com
-
When you use target="_blank" with Links, it is recommended to always set rel="noopener" or rel="noreferrer" when linking to third party content. rel="noopener" prevents the new page from being able to access the window.opener property and ensures it runs in a separate process. Without this, the target page can potentially redirect your page to a malicious URL. rel="noreferrer" has the same effect, but also prevents the Referer header from being sent to the new page. ⚠️ Removing the referrer header will affect analytics.
Tags
Annotators
URL
-
- Dec 2020
-
github.com github.com
-
The only solution that I can see is to ensure that each user gets their own set of stores for each server-rendered page. We can achieve this with the context API, and expose the stores like so: <script> import { stores } from '@sapper/app'; const { page, preloading, session } = stores(); </script> Calling stores() outside component initialisation would be an error.
Good solution.
-
One way to do that is to export them from @sapper/app directly, and rely on the fact that we can reset them immediately before server rendering to ensure that session data isn't accidentally leaked between two users accessing the same server.
-
-
github.com github.com
-
${JSON.stringify(state)}
-
XSS mitigation
-
Strings generated by devalue can be safely deserialized with eval or new Function
-
-
-
This would be cumbersome, and would encourage developers to populate stores from inside components, which makes accidental data leakage significantly more likely.
-
Just realised this doesn't actually work. If store is just something exported by the app, there's no way to prevent leakage. Instead, it needs to be tied to rendering, which means we need to use the context API. Sapper needs to provide a top level component that sets the store as context for the rest of the app. You would therefore only be able to access it during initialisation, which means you couldn't do it inside a setTimeout and get someone else's session by accident:
-
-
github.com github.com
-
This is an opportunity to fix a bug: if you're on a page that redirects to a login page if there's no user object, or otherwise preloads data specific to that user, then logging out won't automatically update the page — you could easily end up with a page like HOME ABOUT LOG IN ----------------------------------------------------------------------------------------- Secret, user-specific data that shouldn't be visible alongside a 'log in' button:
-
-
-
Go is introducing publicly-visible API changes related to these issues in an upcoming major release, which risks making the vulnerabilities public without explicit public disclosure.
Whaaat ?!
-
-
jamstack.org jamstack.org
-
The Jamstack removes multiple moving parts and systems from the hosting infrastructure resulting in fewer servers and systems to harden against attack.
-
-
marked.js.org marked.js.org
-
The only completely secure system is the one that doesn't exist in the first place.
-
-
www.theguardian.com www.theguardian.com
-
editor, P. B. S. policy. (2020, December 9). Covid-driven recession likely to push 2m UK families into poverty. The Guardian. https://www.theguardian.com/society/2020/dec/09/covid-driven-recession-likely-to-push-2m-uk-families-into-poverty
-
-
psyarxiv.com psyarxiv.com
-
Wiwad, D., Mercier, B., Piff, P. K., Shariff, A., & Aknin, L. (2020). Recognizing the Impact of Covid-19 on the Poor Alters Attitudes Towards Poverty and Inequality. PsyArXiv. https://doi.org/10.31234/osf.io/geyt4
-
- Nov 2020
-
aviatrix.com aviatrix.com
-
How can I create Internet ingress and egress security patterns for AWS
[[How can I create Internet ingress and egress security patterns]]
-
-
img1.wsimg.com img1.wsimg.com
-
knightcolumbia.org knightcolumbia.org
-
to be listed on Mastodon’s official site, an instance has to agree to follow the Mastodon Server Covenant which lays out commitments to “actively moderat[e] against racism, sexism, homophobia and transphobia”, have daily backups, grant more than one person emergency access, and notify people three months in advance of potential closure. These indirect methods are meant to ensure that most people who encounter a platform have a safe experience, even without the advantages of centralization.
Some of these baseline protections are certainly a good idea. The idea of advance notice of shut down and back ups are particularly valuable.
I'd not know of the Mastodon Server Covenant before.
-
-
Local file Local file
-
-
hypothes.is hypothes.is
-
@hypothes.is
be careful : because you store the page title, when we make annotation on a personal website that stores personal informations in title, hypothes.is users can retieve those informations.
for example, here I can see that jbarnett mail is jeankap@gmail.com.
and i can see his mail's title.
I will find a report option that would be better than this current annotation.
Tags
Annotators
URL
-
-
github.com github.com
-
In our estimations, Trusted Types might effectively kill XSS for serverless applications.
-
-
github.com github.com
-
This is addressing a security issue; and the associated threat model is "as an attacker, I know that you are going to do FROM ubuntu and then RUN apt-get update in your build, so I'm going to trick you into pulling an image that _pretents_ to be the result of ubuntu + apt-get update so that next time you build, you will end up using my fake image as a cache, instead of the legit one." With that in mind, we can start thinking about an alternate solution that doesn't compromise security.
-
So let's say we pull down evil/foo which is FROM ubuntu followed by RUN apt-get update except with a small surprise included in the image. Subsequent builds using those same commands will be compromised.
-
at least in the meantime allow users to bypass the security protections in situations where they are confident of the source of the layers
-
-
devblogs.microsoft.com devblogs.microsoft.com
-
asp.net,security,authorization
-
-
devblogs.microsoft.com devblogs.microsoft.com
-
github.com github.com
-
If your Svelte components contain <style> tags, by default the compiler will add JavaScript that injects those styles into the page when the component is rendered. That's not ideal, because it adds weight to your JavaScript, prevents styles from being fetched in parallel with your code, and can even cause CSP violations. A better option is to extract the CSS into a separate file. Using the emitCss option as shown below would cause a virtual CSS file to be emitted for each Svelte component. The resulting file is then imported by the component, thus following the standard Webpack compilation flow.
-
-
opensource.com opensource.com
-
Now let me get back to your question. The FBI presents its conflict with Apple over locked phones as a case as of privacy versus security. Yes, smartphones carry a lot of personal data—photos, texts, email, and the like. But they also carry business and account information; keeping that secure is really important. The problem is that if you make it easier for law enforcement to access a locked device, you also make it easier for a bad actor—a criminal, a hacker, a determined nation-state—to do so as well. And that's why this is a security vs. security issue.
The debate should not be framed as privacy-vs-security because when you make it easier for law enforcement to access a locked device, you also make it easier for bad actors to do so as well. Thus it is a security-vs-security issue.
-
-
www.schneier.com www.schneier.com
-
Barr makes the point that this is about “consumer cybersecurity” and not “nuclear launch codes.” This is true, but it ignores the huge amount of national security-related communications between those two poles. The same consumer communications and computing devices are used by our lawmakers, CEOs, legislators, law enforcement officers, nuclear power plant operators, election officials and so on. There’s no longer a difference between consumer tech and government tech—it’s all the same tech.
The US government's defence for wanting to introduce backdoors into consumer encryption is that in doing so they would not be weakening the encryption for, say, nuclear launch codes.
Schneier holds that this distinction between government and consumer tech no longer exists. Weakening consumer tech amounts to weakening government tech. Therefore it's not worth doing.
-
- Oct 2020
-
docs.gitlab.com docs.gitlab.com
-
Malicious code pushed to your .gitlab-ci.yml file could compromise your variables and send them to a third party server regardless of the masked setting. If the pipeline runs on a protected branch or protected tag, it could also compromise protected variables.
Tags
Annotators
URL
-
-
api.rubyonrails.org api.rubyonrails.org
-
www.smh.com.au www.smh.com.au
-
Australia's Cyber Security Strategy: $1.66 billion dollar cyber security package = AFP gets $88 million; $66 million to critical infrastructure organisations to assess their networks for vulnerabilities; ASD $1.35 billion (over a decade) to recruit 500 officers.
Reasons Dutton gives for package:
- child exploitation
- criminals scamming, ransomware
- foreign governments taking health data and potential attacks to critical infrastructure
What is defined as critical infrastructure is expanded and subject to obligations to improve their defences.
Supporting cyber resilience of SMEs through information, training, and services to make them more secure.
-
-
australiancybersecuritymagazine.com.au australiancybersecuritymagazine.com.au
-
The Cyber Test Range is the largest commercial cyber range in Australia, providing safe virtual environment to practice handling real-world cyber warfare scenarios, deliver world class training and evaluation of the latest cyber threats, cyber technologies and cyber talent.
-
-
www.nbcnews.com www.nbcnews.com
-
8 million Americans slipped into poverty amid coronavirus pandemic, new study says. (n.d.). NBC News. Retrieved October 20, 2020 from https://www.nbcnews.com/news/us-news/8-million-americans-slipped-poverty-amid-coronavirus-pandemic-new-study-n1243762?cid=sm_npd_nn_tw_ma
-
-
disqus.com disqus.com
-
Could you please explain why it is a vulnerability for an attacker to know the user names on a system? Currently External Identity Providers are wildly popular, meaning that user names are personal emails.My amazon account is my email address, my Azure account is my email address and both sites manage highly valuable information that could take a whole company out of business... and yet, they show no concern on hiding user names...
Good question: Why do the big players like Azure not seem to worry? Microsoft, Amazon, Google, etc. too probably. In fact, any email provider. So once someone knows your email address, you are (more) vulnerable to someone trying to hack your account. Makes me wonder if the severity of this problem is overrated.
Irony: He (using his full real name) posts:
- Information about which account ("my Azure account is my email address"), and
- How high-value of a target he would be ("both sites manage highly valuable information that could take a whole company out of business...")
thus making himself more of a target. (I hope he does not get targetted though.)
-
Another thing you can do is to add pain to the second part of it. Attackers want the list of valid usernames, so they can then try to guess or brute force the password. You can put protections in place with that as well, whether they are lockouts or multi-factor authentication, so even if they have a valid username, it's much harder to gain access.
-
That is certainly a good use-case. One thing you can do is to require something other than a user-chosen string as a username, something like an email address, which should be unique. Another thing you could do, and I admit this is not user-friendly at all, to let them sign up with that user name, but send the user an email letting them know that the username is already used. It still indicates a valid username, but adds a lot of overhead to the process of enumeration.
-
-
blog.rapid7.com blog.rapid7.com
-
How would you remediate this? One way could be to have the application pad the responses with a random amount of time, throwing off the noticeable difference.
-
Sometimes, user enumeration is not as simple as a server responding with text on the screen. It can also be based on how long it takes a server to respond. A server may take one amount of time to respond for a valid username and a very different (usually longer) amount of time for an invalid username.
-
-
twitter.com twitter.com
-
David Rothschild on Twitter. (n.d.). Twitter. Retrieved October 17, 2020, from https://twitter.com/DavMicRot/status/1316429651988877312
-
-
github.com github.com
-
By default all content inside template strings is escaped. This is great for strings, but not ideal if you want to insert HTML that's been returned from another function (for example: a markdown renderer). Use nanohtml/raw for to interpolate HTML directly.
-
-
www.onwebsecurity.com www.onwebsecurity.com
-
When processing untrusted user input for (web) applications, filter the input, and encode the output.
-
-
www.coursera.org www.coursera.org
-
The default groups, that we talked about before, like domain users and domain admins are security groups. They're used to grant or deny access to IT resources.
-
-
www.thelancet.com www.thelancet.com
-
Horton, R. (2020). Offline:Reasons for hope. Lancet, 396
-
-
covid-19.iza.org covid-19.iza.org
-
IZA – Institute of Labor Economics. ‘COVID-19 and the Labor Market’. Accessed 6 October 2020. https://covid-19.iza.org/publications/dp13650/.
Tags
- lockdown
- COVID-19
- demographic market
- researchers
- is:report
- Hispanics
- American Community Survey
- social insurance
- immigrants
- frontline workers
- disadvantaged minorities
- microdata
- policy makers
- Department of Homeland Security (DHS)
- men
- labour market
- essential workers
- less educated
- lang:en
- lower wages
- safety net policy
Annotators
URL
-
-
developer.mozilla.org developer.mozilla.org
-
strict-origin: Only send the origin of the document as the referrer when the protocol security level stays the same (e.g. HTTPS→HTTPS), but don't send it to a less secure destination (e.g. HTTPS→HTTP).
-
- Sep 2020
-
psyarxiv.com psyarxiv.com
-
Garrett, P. M., White, J. P., Lewandowsky, S., Kashima, Y., Perfors, A., Little, D. R., Geard, N., Mitchell, L., Tomko, M., & Dennis, S. (2020). The acceptability and uptake of smartphone tracking for COVID-19 in Australia [Preprint]. PsyArXiv. https://doi.org/10.31234/osf.io/7tme6
-
-
www.thelancet.com www.thelancet.com
-
Horton, R. (2020). Offline: Remembering the scientists. The Lancet, 396(10254), 806. https://doi.org/10.1016/S0140-6736(20)31951-6
-
-
svelte.dev svelte.dev
-
What is another personal fact that an attacker could easily find with Google?
-
-
onezero.medium.com onezero.medium.com
-
There are clever ways around trackers
I also recommend switching to FIrefox, getting the Facebook container extension and Privacy Badger extension!
-
These creeping changes help us forget how important our privacy is and miss that it’s being eroded.
This is important we are normalizing the fact that our privacy is being taken slowly, update after update
-
-
www.unitedforalice.org www.unitedforalice.org
- Aug 2020
-
soundcloud.com soundcloud.com
-
EaP Civil Society Forum. (n.d.). SoundCloud. Retrieved August 28, 2020, from https://soundcloud.com/eastern-partnership-civil-society-forum
-
-
osf.io osf.io
-
Love, D., Allison, E. H., Asche, F., Belton, B., Cottrell, R. S., Froehlich, H. E., Gephart, J. A., Hicks, C., Little, D. C., Nussbaumer, E. M., da Silva, P. P., Poulain, F., Rubio, A., Stoll, J. S., Tlusty, M. F., Thorne-Lyman, A. L., Troell, M., & Zhang, W. (2020). Emerging COVID-19 impacts, responses, and lessons for building resilience in the seafood system [Preprint]. SocArXiv. https://doi.org/10.31235/osf.io/x8aew
-
-
www.youtube.com www.youtube.com
-
Webinars in English 🇺🇸—YouTube. (n.d.). Retrieved 24 August 2020, from https://www.youtube.com/playlist?list=PL0n8am2uBRCBUZI5ftm2jQ63tlYrtY4_I
-
-
www.nber.org www.nber.org
-
Vu, Jonathan T, Benjamin K Kaplan, Shomesh Chaudhuri, Monique K Mansoura, and Andrew W Lo. ‘Financing Vaccines for Global Health Security’. Working Paper. Working Paper Series. National Bureau of Economic Research, May 2020. https://doi.org/10.3386/w27212.
-
- Jul 2020
-
amp.dev amp.dev
-
While stylesheets can be reworked relatively easily with AMP by inlining the CSS, the same is not true for JavaScript. The tag 'script' is disallowed except in specific forms. In general, scripts in AMP are only allowed if they follow two major requirements: All JavaScript must be asynchronous (i.e., include the async attribute in the script tag). The JavaScript is for the AMP library and for any AMP components on the page. This effectively rules out the use of all user-generated/third-party JavaScript in AMP except as noted below.
-
-
amp.dev amp.dev
-
If you have worked with emails before, the idea of placing a script into an email may set off alarm bells in your head! Rest assured, email providers who support AMP emails enforce fierce security checks that only allow vetted AMP scripts to run in their clients. This enables dynamic and interactive features to run directly in the recipients mailboxes with no security vulnerabilities! Read more about the required markup for AMP Emails here.
-
-
www.thelancet.com www.thelancet.com
-
Barlow, Pepita, Rachel Loopstra, Valerie Tarasuk, and Aaron Reeves. “Liberal Trade Policy and Food Insecurity across the Income Distribution: An Observational Analysis in 132 Countries, 2014–17.” The Lancet Global Health 8, no. 8 (August 1, 2020): e1090–97. https://doi.org/10.1016/S2214-109X(20)30263-1.
-
-
www.youtube.com www.youtube.com
-
Centre for Effective Altruism. (2020, June 13 & 14). EAGxVirtual 2020 Virtual Conference. https://www.youtube.com/playlist?list=PLwp9xeoX5p8NfF4UmWcwV0fQlSU_zpHqc
-
-
www.youtube.com www.youtube.com
-
Responses to Covid-19: Mapping intersections between security and health. (2020, June 4). War Studies KCL. https://www.youtube.com/watch?v=k2ljGyY6-XQ
-
-
github.com github.com
-
Determine if who is using my computer is me by training a ML model with data of how I use my computer. This is a project for the Intrusion Detection Systems course at Columbia University.
Tags
Annotators
URL
-
-
firebase.google.com firebase.google.com
-
It's possible for a document to match more than one match statement. In the case where multiple allow expressions match a request, the access is allowed if any of the conditions is true
overlapping match statements
-
If you want rules to apply to an arbitrarily deep hierarchy, use the recursive wildcard syntax, {name=**}
-
Security rules apply only at the matched path, so the access controls defined on the cities collection do not apply to the landmarks subcollection. Instead, write explicit rules to control access to subcollections
-
-
-
Does a non- negligible failure rate affect the security of TLS?
-
-
firebase.google.com firebase.google.com
-
only the @firebase/testing Node.js module supports mocking auth in Security Rules, making unit tests much easier
Tags
Annotators
URL
-
- Jun 2020
-
arstechnica.com arstechnica.com
-
Plenty of journalists, attorneys, and activists are equally if not more threatened by so-called evil maid attacks, in which a housekeeper or other stranger has the ability to tamper with firmware during brief physical access to a computer.
-
-
www.nassiben.com www.nassiben.comLamphone1
-
www.un.org www.un.org
-
United Nations (2020, June 9). We need to act now to avoid the worst impacts of our efforts to control the pandemic. https://www.un.org/en/coronavirus/we-need-act-now-avoid-worst-impacts-our-efforts-control-pandemic
-
-
www.ingsa.org www.ingsa.org
-
Could the next generation of researchers be lost in the aftermath of Covid-19? – INGSA. (n.d.). Retrieved June 6, 2020, from https://www.ingsa.org/covidtag/covid-19-featured/ecr-future/
-
-
www.nature.com www.nature.com
-
Zastrow, M. (2020). Coronavirus contact-tracing apps: Can they slow the spread of COVID-19? Nature. https://doi.org/10.1038/d41586-020-01514-2
-
-
blogs.sap.com blogs.sap.com
-
Mueller, J. (2020 May 19). COVID-19: What the Technical Foundation of the Corona-Warn-App in Germany looks like | SAP Blogs. https://blogs.sap.com/2020/05/19/covid-19-how-the-technical-foundation-of-the-corona-warn-app-in-germany-looks-like/
-
-
docs.gitlab.com docs.gitlab.com
-
See the documentation for HTML::Pipeline’s SanitizationFilter class for the list of allowed HTML tags and attributes. In addition to the default SanitizationFilter allowlist, GitLab allows span, abbr, details and summary elements.
-
-
signal.org signal.org
-
As billions of conversations transition online over the coming weeks and months, the widespread adoption of end-to-end encryption has never been more vital to national security and to the privacy of citizens in countries around the world.
-
Proponents of this bill are quick to claim that end-to-end encryption isn’t the target. These arguments are disingenuous both because of the way that the bill is structured and the people who are involved.
-
For a political body that devotes a lot of attention to national security, the implicit threat of revoking Section 230 protection from organizations that implement end-to-end encryption is both troubling and confusing. Signal is recommended by the United States military. It is routinely used by senators and their staff. American allies in the EU Commission are Signal users too. End-to-end encryption is fundamental to the safety, security, and privacy of conversations worldwide.
-
The EARN IT act turns Section 230 protection into a hypocritical bargaining chip. At a high level, what the bill proposes is a system where companies have to earn Section 230 protection by following a set of designed-by-committee “best practices” that are extraordinarily unlikely to allow end-to-end encryption. Anyone who doesn’t comply with these recommendations will lose their Section 230 protection.
-
-
-
Matrix provides state-of-the-art end-to-end-encryption via the Olm and Megolm cryptographic ratchets. This ensures that only the intended recipients can ever decrypt your messages, while warning if any unexpected devices are added to the conversation.
Tags
Annotators
URL
-
-
-
More than two billion users exchange an unimaginable volume of end-to-end encrypted messages on WhatsApp each day. And unless an endpoint (phone) is compromised, or those chats are backed-up into accessible cloud platforms, neither owner Facebook nor law enforcement has a copy of those encryption keys.
-
-
www.forbes.com www.forbes.com
-
The industry argues that encryption backdoors will result in a weakening of end device security, making it more likely they will be compromised.
-
As uber-secure messaging platform Signal has warned, “Signal is recommended by the United States military. It is routinely used by senators and their staff. American allies in the EU Commission are Signal users too. End-to-end encryption is fundamental to the safety, security, and privacy of conversations worldwide.”
-
“End-to-end encryption,” NSA says, “is encrypted all the way from sender to recipient(s) without being intelligible to servers or other services along the way... Only the originator of the message and the intended recipients should be able to see the unencrypted content. Strong end-to-end encryption is dependent on keys being distributed carefully.” So, no backdoors then.
-
On April 24, the U.S. National Security Agency published an advisory document on the security of popular messaging and video conferencing platforms. The NSA document “provides a snapshot of best practices,” it says, “coordinated with the Department of Homeland Security.” The NSA goes on to say that it “provides simple, actionable, considerations for individual government users—allowing its workforce to operate remotely using personal devices when deemed to be in the best interests of the health and welfare of its workforce and the nation.” Again somewhat awkwardly, the NSA awarded top marks to WhatsApp, Wickr and Signal, the three platforms that are the strongest advocates of end-to-end message encryption. Just to emphasize the point, the first criteria against which NSA marked the various platforms was, you guessed it, end-to-end encryption.
-
And while all major tech platforms deploying end-to-end encryption argue against weakening their security, Facebook has become the champion-in-chief fighting against government moves, supported by Apple and others.
-
EFF describes this as “a major threat,” warning that “the privacy and security of all users will suffer if U.S. law enforcement achieves its dream of breaking encryption.”
-
Once the platforms introduce backdoors, those arguing against such a move say, bad guys will inevitably steal the keys. Lawmakers have been clever. No mention of backdoors at all in the proposed legislation or the need to break encryption. If you transmit illegal or dangerous content, they argue, you will be held responsible. You decide how to do that. Clearly there are no options to some form of backdoor.
-
While this debate has been raging for a year, the current “EARN-IT’ bill working its way through the U.S. legislative process is the biggest test yet for the survival of end-to-end encryption in its current form. In short, this would enforce best practices on the industry to “prevent, reduce and respond to” illicit material. There is no way they can do that without breaking their own encryption. QED.
-
Governments led by the U.S., U.K. and Australia are battling the industry to open up “warrant-proof” encryption to law enforcement agencies. The industry argues this will weaken security for all users around the world. The debate has polarized opinion and is intensifying.
-
-
www.forbes.com www.forbes.com
-
One thing that would certainly be a game-changer would be some form of standardized RCS end-to-end encryption that allows secure messages to be sent outside Google Messages.
-
You should not use a messaging platform that is not end-to-end encrypted, it really is as simple as that.
-
Such is the security of this architecture, that it has prompted law enforcement agencies around the world to complain that they now cannot access a user’s messages, even with a warrant. There is no backdoor—the only option is to compromise one of the endpoints and access messages in their decrypted state.
-
The answer, of course, is end-to-end encryption. The way this works is to remove any “man-in-the-middle” vulnerabilities by encrypting messages from endpoint to endpoint, with only the sender and recipient holding the decryption key. This level of messaging security was pushed into the mass-market by WhatsApp, and has now become a standard feature of every other decent platform.
-
The issue, though—and it’s a big one, is that the SMS infrastructure is inherently insecure, lending itself to so-called “man-in-the-middle attacks.” Messages run through network data centres, everything can be seen—security is basic at best, and you are vulnerable to local carrier interception when travelling.
-
-
www.forbes.com www.forbes.com
-
Despite its opposition, EARN-IT is the clearest threat yet to end-to-end encryption, given this clever twist in pushing the onus onto the platforms to avoid transmitting illegal content, rather than mandating a lawful interception approach.
-
Putting that risk more simply, the EARN-IT bill is cleverly leaving it to the tech platforms to keep themselves safe—there would be little option other than some form of access to encrypted content, even though it would not be specified in law. Sophos describes this as “the backdoor virus that law enforcement agencies have been trying to inflict on encryption for years.”
-
On the encryption front, HRW echoes others that have argued vehemently against the proposals—that weakened encryption will “endanger all people who rely on encryption for safety and security—once one government enjoys special access, so too will rights-abusing governments and criminal hackers.” Universal access to encryption “enables everyone, from children attending school online to journalists and whistleblowers, to exercise their rights without fear of retribution.”
-
Lawmakers and security agencies want legally warranted access to encrypted data. That can’t happen without some form of backdoor in those end-to-end systems.
-
-
www.quora.com www.quora.com
-
-
Just like Blackberry, WhatsApp has claimed that they are end to end encrypted but in fact that is not trueWhatsApp (and Blackberry) decrypt all your texts on their servers and they can read everything you say to anyone and everyoneThey (and Blackberry) then re-encrypt your messages, to send them to the recipient, so that your messages look like they were encrypted the entire time, when in fact they were not
-
The only messaging app that has been proven, by an independent authoritative agency, is Apple’s Messages app (which uses Apple’s iMessage protocol that is truly end to end encrypted, Apple cannot read any of your texts which means that no one can read any of your texts)
-
-
-
When you make a call using Signal, it will generate a two-word secret code on both the profiles. You will speak the first word and the recipient will check it. Then he will speak the second word and you can check it on your end. If both the words match, the call has not been intercepted and connected to the correct profile
-
-
www.forbes.com www.forbes.com
-
If the EU is set to mandate encryption backdoors to enable law enforcement to pursue bad actors on social media, and at the same time intends to continue to pursue the platforms for alleged bad practices, then entrusting their diplomatic comms to those platforms, while forcing them to have the tools in place to break encryption as needed would seem a bad idea.
-
First, the recognition that sensitive information needs to be transmitted securely over instant messaging platforms plays into the hands of the privacy advocates who are against backdoors in the end-to-end encryption used on WhatsApp, Signal, Wickr, iMessage and others. The core argument from the privacy lobby is that a backdoor will almost certainly be exploited by bad actors. Clearly, the EU (and others) would not risk their own comms with such a vulnerability.
-
Although WhatsApp has become the messaging platform of choice for many politicians and civil servants worldwide, there have been enough stories of potential vulnerabilities and hacks to spook people into adopting something else.
-
-
www.bloomberg.com www.bloomberg.com
-
“End-to-end encryption” sounds nice — but if anyone can get into your phone’s operating system, they will be able to read your messages without having to decrypt them.
-
-
telegra.ph telegra.ph
-
Security agencies use anti-terror efforts to justify planting backdoors. The problem is that such backdoors can also be used by criminals and authoritarian governments. No wonder dictators seem to love WhatsApp: its lack of security allows them to spy on their own people, so WhatsApp continues to be freely available in places like Russia or Iran, where Telegram is banned by the authorities
-
-
- May 2020
-
stackoverflow.com stackoverflow.com
-
This is also useful for anyone that doesn't normally have root access but would like to easily become root on your host.
-
-
stackoverflow.com stackoverflow.com
-
using SSH is likely the best approach because personal access tokens have account level access
personal access tokens have account level access ... which is more access (possibly access to 10s of unrelated projects or even groups) than we'd like to give to our deploy script!
-
-
docs.gitlab.com docs.gitlab.com
-
Before enabling this, you should ensure jobs are visible to team members only. You should also erase all generated job logs before making them visible again.
Tags
Annotators
URL
-
-
gitlab.com gitlab.com
-
Available documentation suggests that ED25519 is more secure.
Tags
Annotators
URL
-
-
leanpub.com leanpub.com
-
There is a serious weakness in DSA (which extends to ECDSA) that has been exploited in several real world systems (including Android Bitcoin wallets and the PS3); the signature algorithm relies on quality randomness (bits that are indistinguishable from random); once the PRNG enters a predictable state, signatures may leak private keys. Systems that use ECDSA must be aware of this issue, and pay particular attention to their PRNG.
Tags
Annotators
URL
-
-
www.ganttlab.com www.ganttlab.com
-
GanttLab does not store any information: everything runs in your browser. Under the hood, we use localForage to remember the state of the application, which enables great user experience without any security risk. Secured API requests are initiated in your computer's browser, hence coming straight from your local network. Those requests are going directly to the data source you selected (your GitHub or GitLab account) without ever transiting through any other server.
-
-
www.ganttlab.com www.ganttlab.com
-
GanttLab does not store any information: everything runs in your browser. Under the hood, we use localForage to remember the state of the application, which enables great user experience without any security risk. Secured API requests are initiated in your computer's browser, hence coming straight from your local network. Those requests are going directly to the data source you selected (your GitHub or GitLab account) without ever transiting through any other server.
-
-
docs.docker.com docs.docker.com
-
Image consumers can enable DCT to ensure that images they use were signed. If a consumer enables DCT, they can only pull, run, or build with trusted images. Enabling DCT is a bit like applying a “filter” to your registry. Consumers “see” only signed image tags and the less desirable, unsigned image tags are “invisible” to them.
-
-
-
In terms of their border dispute, India and China are struggling with what game theorists refer to as a “commitment problem.” Meaning A commitment problem arises when two states, who would be better off in the present if they consented to a mutually beneficial agreement, are unable to resolve their disputes due to different expectations of future strengths, and a consequent inability to commit to future bargaining power or a division of benefits.
-
-
letsencrypt.org letsencrypt.org
-
Allowing port 80 doesn’t introduce a larger attack surface on your server, because requests on port 80 are generally served by the same software that runs on port 443.
-
-
codeguard.zendesk.com codeguard.zendesk.com
-
CodeGuard relies upon industry best practices to protect customers’ data. All backups and passwords are encrypted, secure connections (SFTP/SSH/SSL) are utilized if possible, and annual vulnerability testing is conducted by an independent agency. To-date, there has not been a data breach or successful hack or attack upon CodeGuard.
-
-
2020.kent.wordcamp.org 2020.kent.wordcamp.org
-
Certified Ethical Hacker
-
-
csp.withgoogle.com csp.withgoogle.com
-
However, it's possible to enforce both a whitelist and nonces with 'strict-dynamic' by setting two policies:
-
-
edtechmagazine.com edtechmagazine.com
-
Castelo, M. (2020 April 15). 4 Cyberhygiene Practices for Secure Remote Learning. EdTech. edtechmagazine.com/k12/article/2020/04/4-cyberhygiene-practices-secure-remote-learning
-
-
www.thelancet.com www.thelancet.com
-
Horton, R. (2020). Offline: Independent science advice for COVID-19—at last. The Lancet, 395(10235), 1472. https://doi.org/10.1016/S0140-6736(20)31098-9
-
-
aws.amazon.com aws.amazon.com
-
Amazon Macie is a security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS.
-
-
www.w3.org www.w3.org
-
sadness.js will not load, however, as document.write() produces script elements which are "parser-inserted".
Tags
Annotators
URL
-
-
developer.chrome.com developer.chrome.comjudell1
-
If a user clicks on that button, the onclick script will not execute. This is because the script did not immediately execute and code not interpreted until the click event occurs is not considered part of the content script, so the CSP of the page (not of the extension) restricts its behavior. And since that CSP does not specify unsafe-inline, the inline event handler is blocked.
-
-
www.iubenda.com www.iubenda.com
-
-
Remember that nonces must be regenerated for every page request and they must be unguessable.
-
-
www.givelify.com www.givelify.com
Tags
Annotators
URL
-
-
-
I will need to find a workaround for one of my private extensions that controls devices in my home network, and its source code cannot be uploaded to Mozilla because of my and my family's privacy.
-
While there are security benefits to disallowing unsigned extensions by default, it is not clear why there is no option to turn off this behavior, perhaps by making it configurable only with administrator rights.
-
It would be best to offer an official way to allow installing local, unsigned extensions, and make the option configurable only by root, while also showing appropiate warnings about the potential risks of installing unsigned extensions.
-
They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
-
I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
-
I do not understand what is the threat model of not allowing the root user to configure Firefox, since malware could just replace the entire Firefox binary.
-
I appreciate the vigilance, but it would be even better to actually publish a technical reasoning for why do you folks believe Firefox is above the device owner, and the root user, and why there should be no possibility through any means and configuration protections to enable users to run their own code in the release version of Firefox.
-
I will need to find a workaround for one of my private extensions that controls devices in my home network, and its source code cannot be uploaded to Mozilla because of my and my family's privacy.
-
We must consider introducing sensible default options in Firefox, while also educating users and allowing them to override certain features, instead of placing marginal security benefits above user liberties and free choice.
Tags
- security: threat model
- answer the "why?"
- allowing security constraints to be bypassed by users
- malware
- good point
- balance
- compromise
- security
- don't take away individuals' power
- balance of power
- empowering people
- privacy
- trade-offs
- security policy
- freedom
- empowering individual users
- conflict
- marginal benefits
- good idea
- self-distributed app/extension
- bypassing technical constraints
- software freedom
- good example
- the owner of a device/computer should have freedom to use it however they wish
- digital rights
- secure by default
Annotators
URL
-
-
extensionworkshop.com extensionworkshop.com
-
potentially dangerous APIs may only be used in ways that are demonstrably safe, and code within add-ons that cannot be verified as behaving safely and correctly may need to be refactored
-
Add-ons are not allowed to contain obfuscated code, nor code that hides the purpose of the functionality involved. If external resources are used in combination with add-on code, the functionality of the code must not be obscured.
-
-
github.com github.com
-
I'm really tired with mozilla,everything good about them is going away,I don't think they are security or privacy focused anymore and waterfox is a nice alternative to firefox.
-
Mozilla can still block distribution of the extension, even when not distributed via ADO. It is not possible for us to provide Mozilla the unminified JavaScript source files for Google’s and Microsoft’s translation widgets. This is a risk because Mozilla can demand such.
-
Mozilla does not permit extensions distributed through https://addons.mozilla.org/ to load external scripts. Mozilla does allow extensions to be externally distributed, but https://addons.mozilla.org/ is how most people discover extensions. The are still concerns: Google and Microsoft do not grant permission for others to distribute their "widget" scripts. Google's and Microsoft's "widget" scripts are minified. This prevents Mozilla's reviewers from being able to easily evaluate the code that is being distributed. Mozilla can reject an extension for this. Even if an extension author self-distributes, Mozilla can request the source code for the extension and halt its distribution for the same reason.
Maybe not technically a catch-22/chicken-and-egg problem, but what is a better name for this logical/dependency problem?
Tags
- app store: restrictions/policies
- problems
- self-hosting JavaScript/etc. assets instead of loading from external host
- privacy-focused
- security: unobfuscated source code
- app store
- annoying restrictions
- catch-22/chicken-and-egg problem
- security
- depending on assets from an external host
- Mozilla
- unsubstantiated claim
Annotators
URL
-
-
muldoon.cloud muldoon.cloud
-
If you delegate all your IT security to the InfoSec, they will come up with draconian rules
Try to do some of your own security before delegating everything to InfoSec that will come with draconian restrictions
-
- Apr 2020
-
safetyholic.com safetyholic.com
-
Don’t share any private, identifiable information on social media It may be fun to talk about your pets with your friends on Instagram or Twitter, but if Fluffy is the answer to your security question, then you shouldn’t share that with the world. This may seem quite obvious, but sometimes you get wrapped up in an online conversation, and it is quite easy to let things slip out. You may also want to keep quiet about your past home or current home locations or sharing anything that is very unique and identifiable. It could help someone fake your identity.
-
Don’t share vacation plans on social media Sharing a status of your big trip to the park on Saturday may be a good idea if you are looking to have a big turnout of friends to join you, but not when it comes to home and personal safety. For starters, you have just broadcasted where you are going to be at a certain time, which can be pretty dangerous if you have a stalker or a crazy ex. Secondly, you are telling the time when you won’t be home, which can make you vulnerable to being robbed. This is also true if you are sharing selfies of yourself on the beach with a caption that states “The next 2 weeks are going to be awesome!” You have just basically told anyone who has the option to view your photo and even their friends that you are far away from home and for how long.
-
-
www.troyhunt.com www.troyhunt.com
-
I've written before about the attitude of people with titles like "Marketing Manager" where there can be a myopic focus on usability whilst serious security incidents remain "a hypothetical risk".
-
There will be those within organisations that won't be too keen on the approaches above due to the friction it presents to some users.
-
This has a usability impact. From a purely "secure all the things" standpoint, you should absolutely take the above approach but there will inevitably be organisations that are reluctant to potentially lose the registration as a result of pushing back
-
I'm providing this data in a way that will not disadvantage those who used the passwords I'm providing.
-
-
stackoverflow.com stackoverflow.com
-
The Authenticity Token is a countermeasure to Cross-Site Request Forgery (CSRF). What is CSRF, you ask? It's a way that an attacker can potentially hijack sessions without even knowing session tokens.
-
Rails does not issue the same stored token with every form. Neither does it generate and store a different token every time. It generates and stores a cryptographic hash in a session and issues new cryptographic tokens, which can be matched against the stored one, every time a page is rendered.
-
Since the authenticity token is stored in the session, the client cannot know its value. This prevents people from submitting forms to a Rails app without viewing the form within that app itself. Imagine that you are using service A, you logged into the service and everything is ok. Now imagine that you went to use service B, and you saw a picture you like, and pressed on the picture to view a larger size of it. Now, if some evil code was there at service B, it might send a request to service A (which you are logged into), and ask to delete your account, by sending a request to http://serviceA.com/close_account. This is what is known as CSRF (Cross Site Request Forgery). If service A is using authenticity tokens, this attack vector is no longer applicable, since the request from service B would not contain the correct authenticity token, and will not be allowed to continue.
-
-
makandracards.com makandracards.com
-
A common mistake is to see those escaped angle brackets, and "improve" the helper by making everything html_safe:
-
-
security.stackexchange.com security.stackexchange.com
-
You don't "sanitize your output" you encode it for proper context within the application it is being presented. You encode the output for HTML, HTML Attribute, URL, JavaScript
-
When you output the data, you know the use case of the data. This knowledge allows you to safely sanitize the output data accordingly.
-
I would call this output encoding instead of sanitization
-
-
wpvip.com wpvip.com
-
1- Validation: you “validate”, ie deem valid or invalid, data at input time. For instance if asked for a zipcode user enters “zzz43”, that’s invalid. At this point, you can reject or… sanitize. 2- sanitization: you make data “sane” before storing it. For instance if you want a zipcode, you can remove any character that’s not [0-9] 3- escaping: at output time, you ensure data printed will never corrupt display and/or be used in an evil way (escaping HTML etc…)
-
-
-
download.oracle.com download.oracle.com
-
What Is Input Validation and Sanitization? Validation checks if the input meets a set of criteria (such as a string contains no standalone single quotation marks). Sanitization modifies the input to ensure that it is valid (such as doubling single quotes).
-
-
guides.rubyonrails.org guides.rubyonrails.org
-
-
In December 2006, 34,000 actual user names and passwords were stolen in a MySpace phishing attack. The idea of the attack was to create a profile page named "login_home_index_html", so the URL looked very convincing. Specially-crafted HTML and CSS was used to hide the genuine MySpace content from the page and instead display its own login form.
-
-
guides.rubyonrails.org guides.rubyonrails.org
-
Don't try to correct user input by blacklists: This will make the attack work: "<sc<script>ript>".gsub("<script>", "")
-
When sanitizing, protecting or verifying something, prefer whitelists over blacklists.
-
-
www.brucebnews.com www.brucebnews.com
-
Before we get to passwords, surely you already have in mind that Google knows everything about you. It knows what websites you’ve visited, it knows where you’ve been in the real world thanks to Android and Google Maps, it knows who your friends are thanks to Google Photos. All of that information is readily available if you log in to your Google account. You already have good reason to treat the password for your Google account as if it’s a state secret.
-
You already have good reason to treat the password for your Google account as if it’s a state secret. But now the stakes are higher. You’re trusting Google with the passwords that protect the rest of your life – your bank, your shopping, your travel, your private life. If someone learns or guesses your Google account password, you are completely compromised. The password has to be complex and unique. You have to treat your Google account password with the same care as a LastPass user. Perhaps more so, because it’s easier to reset a Google account password. If your passwords are saved in Chrome, you should strongly consider using two-factor authentication to log into your Google account. I’ll talk about that in the next article.
-
-
en.wikipedia.org en.wikipedia.org
-
Computer security[edit] A mistake in just one component can compromise the entire system.
-
-
github.com github.com
-
One of the drawbacks of waiting until someone signs in again to check their password is that a user may simply stay signed in for a long time without signing out. I suppose that could be an argument in favor of limiting the maximum duration of a session or remember-me token, but as far as user experience, I always find it annoying when I was signed in and a website arbitrarily signs me out without telling me why.
-
-
www.cnet.com www.cnet.com
-
blog.f-secure.com blog.f-secure.com
-
When you use multiple email addresses, less data is connected directly to you. When breaches happen, the damage is limited. One can be used when you are not sure of the security issues, one for casual profiles and one for serious business. It’s up to you how many you have and what you use them for.
-
-
blog.f-secure.com blog.f-secure.com
-
It is possible the attacker gained access to your account through breaking your security questions. This is possible if you used answers that can be guessed based on your social media profiles or personal information.
-
-
security.googleblog.com security.googleblog.com
-
At the same time, we need to ensure that no information about other unsafe usernames or passwords leaks in the process, and that brute force guessing is not an option. Password Checkup addresses all of these requirements by using multiple rounds of hashing, k-anonymity, and private set intersection with blinding.
-