Notices tagged with security, page 14
-
How to make sure the #Enigmail file you downloaded is the real deal: 1) Download the file and its ‘Open PGP’ signature: http://status.hackerposse.com/url/7025 2) Learn that you must download the key the packages have been signed with: http://status.hackerposse.com/url/7026 3a) Download gpg-curl and configure gpg to download keys securely, as described in http://status.hackerposse…
-
Why you think the PKI sucks !crypto !security https://t.co/SCvYlWITA3
-
TrueCrypt security audit completed: http://qttr.at/o2t #security !privacy !crypto
-
!listening http://r.8.je/jpq
this #firefox addon is best flash player alternative ive seen yet: Video WithOut Flash
!security !watching
-
*Why* on ${DEITY}'s green earth would nsd use SSL3? And how can I get it to stop bitching that 'certificate verify failed', presumably because it is stupid enough to use SSL3? Even commenting out the directives in nsd.conf doesn't stop it from complaining. !security
-
RP @zoowar: No accountability: #crypto https://indy.im/url/5765123 // #CertAuthority misconduct affects everyone's !security
-
As promised: https://openssl.org/news/secadv_20150319.txt #openssl #security
-
mentions #Intel's hardware entropy generator, #haveged, #audio-entropyd, #video-entropyd; does not mention #egd, #prngd
-
#Cloudflare blog: ensuring !security with #random numbers from the #Linux kernel's #entropy pool http://url.federati.net/diJIV
-
More #FREAK #SSL vuln info: more than 28,000 hosts in #IPv4 space use the same short #RSA key http://url.federati.net/Kk6gR !security // Unbelievably lazy and stupid
-
Bei den !clt gibt es wieder eine Keysigning-Party. Details auf http://qttr.at/n4v
!security !crypto
/cc @clt_news
-
Gibson's at it again with some squirrelly new web #authentication scheme... https://www.grc.com/sqrl/sqrl.htm !security
-
$ cat ~/local/bin/chromium
#!/usr/bin/env bash
/usr/bin/chromium --ignore-certificate-errors &> /dev/null &
Because CA system is shit anyway. !security
-
!Crypto !Security https://uwaterloo.ca/institute-for-quantum-computing/events/cybersecurity-quantum-world-will-we-be-ready 7pm, Tue 10 Mar 2015
-
@chimo why did I never have heard of it before the #Snowden leaks? cc !security If they exist since #2009 then there must be more about them.
-
@cbarbata DNS cache poisoning doesn't attack that site, but the DNS servers you use to look up the IP address for that site, leading you to connect to a malicious IP address. If true, your DNS server or one upstream has been compromised. Could be the DNS cache in your router, could be the DNS server at your ISP. Could be the root DNS servers, but I think the Internets would have said something by now. !security
-
Seen on #Libertree: RF attack vs #GPG keys http://url.federati.net/Q67Lv !security
-
Buffer Overflow: Overwriting Return Value http://head4.me/3d learning about !security in applications
-
KrebsOnSecurity: spammers using links to crack into routers where default passwords not changed http://head4.me/3c !security
-
Auch hier der Hinweis, dass keine momentan existierende !verschluesselung sicher ist, genuegend Zeit und Rechenkraft und schon kann man jede #Verschluesselung "knacken". cc !security