It’s a sign that you’re winning a war when you need to jail your own researchers and scientists, right?
It’s a sign that you’re winning a war when you need to jail your own researchers and scientists, right?
I’m not sure I necessarily agree. Your assessment is correct, but I don’t really think this situation is security by obscurity. Like most things in computer security, you have to weight the pros and cons to each approach.
Yubico used components that all passed Common Criteria certification and built their product in a read-only configuration to prevent any potential shenanigans with vulnerable firmware updates. This approach almost entirely protects them from supply-chain attacks like what happened with ZX a few months back.
To exploit this vulnerability you need physical access to the device, a ton of expensive equipment, and an incredibly deep knowledge in digital cryptography. This is effectively a non-issue for your average Yubikey user. The people this does affect will be retiring and replacing their Yubikeys with the newest models ASAP.
Absolutely. If you are the CISO in a place where security is a top priority with adversaries that may have access to the equipment and knowledge to exploit this, you will absolutely want to retire the keys ASAP and replace them with the new model that is not vulnerable to this.
My friends and I do a bi-weekly anime night where everyone chooses a series and we watch an episode of each; kind of like a curated Toonami block. One of my friends chose the original Urusei Yatsura.
We’re currently on episode 152, with many more remaining.
Yes. She’s female and was born female.
It’s illegal to be transgender in Algeria, and the only complaint came from a Russian boxing body with a history of making suspect claims in the past.
You dont need to remind us to sympathize with the people you laid off, Phil. Thats the whole reason why your PR is bad right now.
I started Ori specifically because I didnt want to endlessly throw myself at Soul Master and the Watcher Knights again.
I’m about 60% through Ori and the Blind forest. Its curently scratching an itch I have for metroidvania games.
However, I learned that instead of patching the original game or releasing a DLC, they just made a re-release and im not buying the game a second time just for a new area and some improved QoL with fast travel.
Thats BC politics in a nutshell, really.
The same thing happened in Victoria when they converted that hotel to make permanent housing for the homeless while offering basically no social support for those people.
What if the other side is also genocide along with totalitarian fascist rule?
So far, the only thing AI has shown to be pretty good at is summerizing a large amount of data, and even then it cant be fully trusted to not make mistakes.
Yes, it’s possible
You need a SIP trunk to connect to and a PBX server. I would also recommend a proxy server to obfuscate your SIP server as it will be constantly attacked.
It doesn’t technically need its own network, but having it on its own VLAN is recommended as you will want to have some QoS policies for the UDP voice traffic otherwise your call audio will be choppy
Apps get a one strike rule. The minute I get a notification I don’t want, that app doesn’t get to send me notifications anymore
This would turn the Internet into a hell scape if only because corporations could throw huge amounts of money around.
There would be incentive for the Pizza Huts and the Walmarts of the world to just assume control of the websites for any local competitors.
Domain squatting is incredibly scummy, but I have no idea how it would be possible to have any other system.
My understanding is that domains do expire unless you pay the fee to renew for another year.
Regarding unused domain names, how would anyone know if a particular name is being unused? Domain names are used for more things than browsable websites. You’d have to have a system that could determine if traffic is going to those names, which seems bad from a privacy standpoint and also pretty easy to script around.
I agree that for this size of network AD is definitely not something you want to deal with unless you want to learn how it works.
However, I’m not sure it really increases attack vectors to have it running, outside of the fact that it’s a new network service on the LAN. The out of the box default configuration is not bad these days, security-wise
Veeam is not FOSS, but there is a free version, it’s user friendly, and has agents for both Windows and Linux.
I am always reminded of this tweet from ProZD when printers come up:
i’ve got a billion dollar idea, imagine a computer printer but like, it actually fucking works, it prints every time like it’s fucking supposed to without issue, it just does that no fucking problem, companies, feel free to take this idea, this one’s on me
Sounds like they’re still one of the best. That’s good to hear.
Isnt this basically what the Catholic Church did in Dogma when they introduced Buddy Christ? Like down to the motivations and everything?