Notices tagged with tls
-
LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} (lnxw48a1)'s status on Sunday, 09-Aug-2020 16:40:15 EDT LinuxWalt (@lnxw48a1) {3EB165E0-5BB1-45D2-9E7D-93B31821F864} #China blocking #TLS 1.3 and #ESNI https://nu.federati.net/url/273805
This prevents users from visiting sites without censors' knowledge and approval.
Source: https://mastodon.social/@theprivacyfoundation/104660711680451629 -
Joshua Judson Rosen (rozzin)'s status on Wednesday, 25-Sep-2019 05:32:22 EDT Joshua Judson Rosen #Termbin is a nice #pastebin !hack https://termbin.com/
Obvious down side: no #TLS #security.
But it's also #nonobvious if any of the other pastebin tools use TLS—where TLS is easily added in front of #termbin and clients just swap #netcat for #socat or #gnutls.
#transparency -
qbi (qbi)'s status on Tuesday, 31-Oct-2017 18:05:23 EDT qbi Warum HTTPS verwenden, wenn es auch anders geht …
!security #tls
https://twitter.com/troyhunt/status/925462678516019200 -
qbi (qbi)'s status on Wednesday, 11-Jan-2017 15:54:31 EST qbi Kann ich jetzt Bingo rufen?
!crypto #landtag #sachsen #tls !security
https://quitter.se/attachment/2915725 -
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 08-Nov-2016 14:14:09 EST lnxw48 (Linux Walt) @schlink Some degree of coordination and cooperation is needed, of course. But look at the way !XMPP network all moved to requiring #TLS for server-to-server connections. It was a priority, so most everyone made the move, leaving laggards (including Google Talk) behind. -
lnxw48 (Linux Walt) (lnxw48)'s status on Saturday, 29-Oct-2016 12:33:15 EDT lnxw48 (Linux Walt) @postblue My mobile browser says "net::ERR_SPDY_INADEQUATE_TRANSPORT_SECURITY" ... check your web server's #TLS settings -
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 18-Oct-2016 17:19:12 EDT lnxw48 (Linux Walt) @jim It could also depend on where $CONTACT is hosted (for example, if enabling always-on #TLS caused URLs to change then other instances try to connecting to the old non-encrypted address). -
Joshua Judson Rosen (rozzin)'s status on Thursday, 08-Sep-2016 17:04:32 EDT Joshua Judson Rosen @bobjonkman, at this point #GoogleTalk is (just) a pretty shitty #XMPP server: it's missing a whole bunch of important XEPs like Carbons and fully-functional MUCs, and it doesn't do back-end #TLS so most (better) servers will refuse to talk to it. -
qbi (qbi)'s status on Wednesday, 07-Sep-2016 16:02:35 EDT qbi Ich lese die Einträge zu #HSTS und weine leise.
https://bugs.chromium.org/p/chromium/issues/detail?id=527947#c17
!security #tls -
MMN-o ✅⃠ (mmn)'s status on Tuesday, 02-Feb-2016 07:31:18 EST MMN-o ✅⃠ Chat is also available with #TLS: https://33bits.eu/mhck/chat/ and the website as well (right now #CAcert though) on https://music.umeahackerspace.se/ :] !umehack -
harald (harald)'s status on Tuesday, 30-Jun-2015 11:31:03 EDT harald Amazon announces s2n, a new small, open source implementation of TLS: http://qttr.at/s45 !crypto #tls #amazon #open-source -
qbi (qbi)'s status on Tuesday, 05-May-2015 06:35:57 EDT qbi RFC 7525 erzählt euch, welche Algorithmen für #TLS empfehlenswert sind: https://tools.ietf.org/html/rfc7525
!crypto -
qbi (qbi)'s status on Monday, 27-Oct-2014 18:21:31 EDT qbi Deploying #TLS the hard way from @ttaubert: https://timtaubert.de/blog/2014/10/deploying-tls-the-hard-way/
!crypto #SSL -
lnxw48 (Linux Walt) (lnxw48)'s status on Friday, 10-Oct-2014 01:30:58 EDT lnxw48 (Linux Walt) Automated configuration analysis for #Mozilla‘s #TLS guidelines http://url.federati.net/yadA5 !crypto !security
-
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 10-Sep-2014 21:40:50 EDT lnxw48 (Linux Walt) #RedHat !security blog: #TLS landscape http://url.federati.net/PLFSs
-
Markus Kilås (netmackan)'s status on Monday, 28-Jul-2014 12:46:50 EDT Markus Kilås Do Government Websites Care About HTTPS? Not in 2010, wonder if it is better now? #ssl #tls !crypto #infosec https://t.co/id4ViuvhFk -
qbi (qbi)'s status on Tuesday, 04-Feb-2014 15:24:37 EST qbi Die SSL-Einstellungen von bitcoin.org sind ja auch finster: https://www.ssllabs.com/ssltest/analyze.html?d=bitcoin.org !crypto !bitcoin #TLS -
qbi (qbi)'s status on Wednesday, 22-Jan-2014 16:23:28 EST qbi Heute neu ohne TLS1.1/1.2: @linuxplumbers und @torproject (Gitweb). https://kubieziel.de/computer/ssl-tls.html !crypto #ssl #tls -
qbi (qbi)'s status on Friday, 17-Jan-2014 18:09:44 EST qbi Ich habe in meinem Beitrag auf das Wiki von Kai Raven verwiesen. Er hat weitere sinnvolle Hinweise: http://t.co/iqHGWbuTdB #SSL #TLS !crypto -
qbi (qbi)'s status on Friday, 10-Jan-2014 18:07:20 EST qbi Using #SSL #TLS securly in your browser: http://kubieziel.de/blog/archives/1564-Using-SSL-securly-in-your-browser.html !security !crypto