34 Matching Annotations
  1. Oct 2023
    1. In many ways, computing security has regressed since the Air Force report on Multics was written in June 1974.
  2. May 2023
  3. Apr 2023
    1. By default SMTP offers very little protection against interception. Traffic may be encrypted between servers but there are no guarantees.

      And how likely is it that the attacker actually owns one of the servers that is a hop on the way from mail sender to mail recipient?? Seems extremely unlikely.

    2. email as a transmission mechanism isn't secure.
  4. Dec 2022
    1. This is a terrible idea. At least if there's no way to opt out of it! And esp. if it doesn't auto log out the original user after some timeout.

      Why? Because I may no longer remember which device/connection I used originally or may no longer have access to that device or connection.

      What if that computer dies? I can't use my new computer to connect to admin UI without doing a factory reset of router?? Or I have to clone MAC address?

      In my case, I originally set up via ethernet cable, but after I disconnected and connected to wifi, the same device could not log in, getting this error instead! (because different interface has different mac address)

  5. Sep 2022
    1. Snail mail can be too slow, and email isn't secure. So that leaves us with the decades-old, but still reliable, fax.

      email is secure enough. Why do people keep perpetuating this myth?

  6. Aug 2022
  7. Jul 2022
    1. # ActiveStorage defaults to security via obscurity approach to serving links # If this is acceptable for your use case then this authenticable test can be # removed. If not then code should be added to only serve files appropriately. # https://edgeguides.rubyonrails.org/active_storage_overview.html#proxy-mode def authenticated? raise StandardError.new "No authentication is configured for ActiveStorage" end
  8. Mar 2022
  9. www.ventoy.net www.ventoy.net
    1. still need to do as follows for the first time

      How to enroll key from disk into MOK manager (MOK = Machine Owner Key)

  10. Feb 2022
    1. Sending secure email is one of the questions we hear more and more. This is a result of an increasing number of email security risks, hacks and other threats. So you're not the only person wondering, "How to send secure email in Gmail? (or any other public email service for that matter?") You'll find the answer in this article. This article concludes with a link to a free encrypted email service First check whether you meet the conditions.

      How to send secure email (in Outlook)? Sending secure email is one of the questions we hear more and more. This is a result of an increasing number of email security risks, hacks and other threats. So you're not the only person wondering, "How to send secure email in Gmail? (or any other public email service for that matter?") You'll find the answer in this article. This article concludes with a link to a free encrypted email service First check whether you meet the conditions.

  11. Sep 2021
  12. Jul 2021
  13. May 2021
    1. Lawrence Gostin. (2021, April 30). Insightful talk by @doctorsoumya @P4HR webinar on #VaccinePassports @WHO is developing smart Int’l Vaccine Certificates Proof of vac Confidential & Secure Open Access Interoperable But @WHO doesn’t support requiring vacs for int’l travel until the world is more equal [Tweet]. @lawrencegostin. https://twitter.com/lawrencegostin/status/1388215713328943104

  14. Feb 2021
    1. Disable Secure Boot. Security technologies included in UEFI such as Secure Boot can be a blocker and prevent the system from booting external storage sources. Disabling Secure Boot, temporarily—normally accessible under the security menu or tab—will often resolve this.
  15. Jan 2021
  16. Dec 2020
  17. Jun 2020
    1. 5 Best Live Streaming Platforms for Private Live Stream

      These private events for a family, employees of a company, or a class of students, importantly need to be secure. Making use of private live streaming solutions you can ensure that your live stream is secure and is available to the right audience.

    1. Data that is sent over the network is compressed (optionally) and encrypted (always). When receiving data it must be decrypted and then (if compressed) decompressed.
    1. e present a protocol for secure online com-munication, called “off-the-record messaging”, which hasproperties better-suited for casual conversation than do sys-tems like PGP or S/MIME.
    1. First, the recognition that sensitive information needs to be transmitted securely over instant messaging platforms plays into the hands of the privacy advocates who are against backdoors in the end-to-end encryption used on WhatsApp, Signal, Wickr, iMessage and others. The core argument from the privacy lobby is that a backdoor will almost certainly be exploited by bad actors. Clearly, the EU (and others) would not risk their own comms with such a vulnerability.
  18. May 2020
    1. About Internet Security Research Group Mission Our mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.
    1. While there are security benefits to disallowing unsigned extensions by default, it is not clear why there is no option to turn off this behavior, perhaps by making it configurable only with administrator rights.
  19. Apr 2020
    1. Personal VPN to Bypass Internet Censorship, VPN Blocking and Bandwidth Throttling Khalid Alnajjar April 8, 2018 Security Leave a CommentHaving a VPN, Virtual Private Network, is essential nowadays for many reasons, such as accessing restricted content by your ISP or government, bypassing geographically restricted content, protecting your privacy, and so on. In an earlier post, I have reviewed the top three VPN providers. If you are looking for a secure and affordable VPN provider, Private Internet Access is an excellent option as they respect your privacy while offering the service for a low price. If privacy is not your primary concern, check out my review of the top 3 VPN providers.
    1. With the ProtonVPN Free plan, you will have access to seven ProtonVPN servers in three countries: the Netherlands, Japan, and the US.
  20. Dec 2019
    1. Offer Secure Boot which means everything you load before an OS is loaded has to be signed. This gives your system an added layer of protection from running malware.

      It also makes it easier to screw up your boot, and less likely to expect an average person to install Linux to try it out and consider switching from their existing Boot...