Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. @paco @BenAveling it is just a stupid electronic device

@paco @BenAveling it is just a stupid electronic device

Scheduled Pinned Locked Moved Uncategorized
597 Posts 265 Posters 298 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • oscherler@tooting.chO oscherler@tooting.ch

    @troed @paco Do you think they wouldn’t have been hacked if discord did it themselves? The outsourcing is a red herring.

    paco@infosec.exchangeP This user is from outside of this forum
    paco@infosec.exchangeP This user is from outside of this forum
    paco@infosec.exchange
    wrote on last edited by
    #376

    I suspect we are all in agreement. Discord is trying to blame a third party to make it seem like they did everything right; that the situation is just that their vendor let them down. None of us think that’s a reasonable excuse, nor that anyone should consider it an acceptable response in these circumstances.
    @oscherler @troed

    1 Reply Last reply
    0
    • ? Guest

      @globcoco@mamot.fr @paco@infosec.exchange Do you think your bank is better at cyber security than Google? You give them the same information.

      The alternative is giving photos of your photo ID to random websites with no full-time security team.

      If the data is collected who has a objectively better cyber security team? Google or a random adult videos website.

      We do have an alternative to age verification and it's censorship. It could just be illegal to transmit material harmful to minors across state lines. No age verification because there's no material to age gate.

      Unless you're willing to actively advocate that there should be zero safe guards to prevent a small child or teenager from being exposed to the materials, for the sake of adults having easier access to the material.

      Governments are going to do something. We can either present them with options that avoid harm as much as possibl, or we can stay silent l, and let them decide and it'll probably mean everyone loses. You might have to provide a government ID to use the internet, and there's censorship.

      globcoco@mamot.frG This user is from outside of this forum
      globcoco@mamot.frG This user is from outside of this forum
      globcoco@mamot.fr
      wrote on last edited by
      #377

      @elaine @paco

      Google is not the answer though.

      1 Reply Last reply
      0
      • betonglen@indieweb.socialB This user is from outside of this forum
        betonglen@indieweb.socialB This user is from outside of this forum
        betonglen@indieweb.social
        wrote on last edited by
        #378

        @paco

        thank you for sharing and you all for your service 🙏🏾✌🏾🖖🏾

        1 Reply Last reply
        0
        • b_cavello@mastodon.publicinterest.townB This user is from outside of this forum
          b_cavello@mastodon.publicinterest.townB This user is from outside of this forum
          b_cavello@mastodon.publicinterest.town
          wrote on last edited by
          #379

          @paco This is so cool! Thank you for sharing the process. This inspires me 💖

          paco@infosec.exchangeP 1 Reply Last reply
          0
          • b_cavello@mastodon.publicinterest.townB b_cavello@mastodon.publicinterest.town

            @paco This is so cool! Thank you for sharing the process. This inspires me 💖

            paco@infosec.exchangeP This user is from outside of this forum
            paco@infosec.exchangeP This user is from outside of this forum
            paco@infosec.exchange
            wrote on last edited by
            #380

            @b_cavello I’m glad! I think it’s fun. I’ve been doing it off and on for 20 years. (I lived outside the US for 10). Almost any eligible voter can be an election officer in most jurisdictions. It’s easy to try once, and no big deal if you don’t like it and don’t do it again.

            b_cavello@mastodon.publicinterest.townB 1 Reply Last reply
            0
            • paco@infosec.exchangeP paco@infosec.exchange

              @b_cavello I’m glad! I think it’s fun. I’ve been doing it off and on for 20 years. (I lived outside the US for 10). Almost any eligible voter can be an election officer in most jurisdictions. It’s easy to try once, and no big deal if you don’t like it and don’t do it again.

              b_cavello@mastodon.publicinterest.townB This user is from outside of this forum
              b_cavello@mastodon.publicinterest.townB This user is from outside of this forum
              b_cavello@mastodon.publicinterest.town
              wrote on last edited by
              #381

              @paco I live in DC, and I feel like they’re overwhelmed with volunteers, but maybe not for special election stuff. I’d like to try it! These quiet moments of democracy in action are really beautiful

              1 Reply Last reply
              0
              • ki@chaos.socialK ki@chaos.social

                @shinspiegel @elaine @paco
                which doesn't make things any better, though

                shinspiegel@mastodon.socialS This user is from outside of this forum
                shinspiegel@mastodon.socialS This user is from outside of this forum
                shinspiegel@mastodon.social
                wrote on last edited by
                #382

                @ki @elaine @paco I did write in my blog on this topic year ago, maybe this could better explain my reasonsing. It can be a little outdated, and I after thought this concept can be improved, but it’s a starting point: https://jeferson.me/blog/2025/06/10/pr0n/

                1 Reply Last reply
                0
                • paco@infosec.exchangeP This user is from outside of this forum
                  paco@infosec.exchangeP This user is from outside of this forum
                  paco@infosec.exchange
                  wrote on last edited by
                  #383

                  @Virginicus Agreed. Speaking to Ms Hanley, she said of working in the general assembly: it’s the kiss of death on an initiative to say it’s being put forward by Fairfax. Everyone rolls their eyes. It’s an interesting story:

                  VA law says you can’t have a district bigger than 5000 voters. Fairfax has a lot of people, so lots of 2500-3500 voter precincts. But it also has a bunch of 1000-person precincts. Her expression was that the office of elections is “turning into a moving company” because of how many precincts we have and the amount of equipment we have to send to each. But we have to do things according to the law.

                  Thankfully, she said, Chesterfield County is running into something similar. So THEY can put forward a bill to get some changes and Fairfax can support them.

                  She wants to do bigger locations with more of the print-on-demand machines. A location might serve 3-5 precincts. You walk up, we figure out what precinct you’re in, and we print the ballot that you should have. This is what they do at the satellite early voting sites. They just want to do more of it and do it in larger precincts on election day. Sounds like a good idea to me. But it sounds like it requires a change to the law.

                  1 Reply Last reply
                  0
                  • june@social.nouveau.communityJ This user is from outside of this forum
                    june@social.nouveau.communityJ This user is from outside of this forum
                    june@social.nouveau.community
                    wrote on last edited by
                    #384

                    @paco The toilet paper is for fiber.

                    1 Reply Last reply
                    0
                    • cshlan@dawdling.netC This user is from outside of this forum
                      cshlan@dawdling.netC This user is from outside of this forum
                      cshlan@dawdling.net
                      wrote on last edited by
                      #385

                      @paco
                      My husband's going to the store tomorrow. He'll be getting grits and oatmeal 😁 among other things but we generally stay stocked up on TP and French toast.

                      #snow

                      1 Reply Last reply
                      0
                      • feld@friedcheese.usF This user is from outside of this forum
                        feld@friedcheese.usF This user is from outside of this forum
                        feld@friedcheese.us
                        wrote on last edited by
                        #386
                        @david_chisnall @paco AWS with the Mac Minis -- every time you power them off they wipe storage, takes a couple hours to complete before you can use the server again. Really annoying when you didn't expect it
                        vinoth@infosec.exchangeV david_chisnall@infosec.exchangeD 2 Replies Last reply
                        0
                        • feld@friedcheese.usF feld@friedcheese.us
                          @david_chisnall @paco AWS with the Mac Minis -- every time you power them off they wipe storage, takes a couple hours to complete before you can use the server again. Really annoying when you didn't expect it
                          vinoth@infosec.exchangeV This user is from outside of this forum
                          vinoth@infosec.exchangeV This user is from outside of this forum
                          vinoth@infosec.exchange
                          wrote on last edited by
                          #387

                          @feld @david_chisnall @paco David nails it. Also, encryption at rest makes it possible to retire storage devices after End-of-Life without having to worry about data theft after retirement.

                          feld@friedcheese.usF 1 Reply Last reply
                          0
                          • vinoth@infosec.exchangeV vinoth@infosec.exchange

                            @feld @david_chisnall @paco David nails it. Also, encryption at rest makes it possible to retire storage devices after End-of-Life without having to worry about data theft after retirement.

                            feld@friedcheese.usF This user is from outside of this forum
                            feld@friedcheese.usF This user is from outside of this forum
                            feld@friedcheese.us
                            wrote on last edited by
                            #388
                            @vinoth @david_chisnall @paco same reason why I FDE all my disks now. I don't have to care what happens if they fail.

                            Also I never have to worry about ZFS pool issues from moving disks around. Wiping the encryption key and setting a new one is much simpler than trying to scrub all the ZFS metadata off a disk
                            1 Reply Last reply
                            0
                            • feld@friedcheese.usF feld@friedcheese.us
                              @david_chisnall @paco AWS with the Mac Minis -- every time you power them off they wipe storage, takes a couple hours to complete before you can use the server again. Really annoying when you didn't expect it
                              david_chisnall@infosec.exchangeD This user is from outside of this forum
                              david_chisnall@infosec.exchangeD This user is from outside of this forum
                              david_chisnall@infosec.exchange
                              wrote on last edited by
                              #389

                              @feld @paco

                              The Morello cluster we set up at MS was exposed for GitHub Actions runners. We forwarded the GitHub web hook thing to an Azure message queue thing that the head node read. When it received one, it used an exciting pile of expect scripts to talk to the serial console on a node to boot one of the machines. The node then booted with a read-only NFS mount as the root filesystem, generated a random key, and used that for a GELI-encryped read-write filesystem on the (200GB) local SSD. The GitHub Actions runner (actually, the portable Go rewrite) then pulled the job to run. At the end, we rebooted the node and the next job would get a new key for disk encryption.

                              If a job left any important data on a node, the next user would get the encrypted data and, unless they deleted the GELI layer, would get it decrypted with a different key. We didn't need to bother scrubbing anything between uses.

                              feld@friedcheese.usF 1 Reply Last reply
                              0
                              • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                                @feld @paco

                                The Morello cluster we set up at MS was exposed for GitHub Actions runners. We forwarded the GitHub web hook thing to an Azure message queue thing that the head node read. When it received one, it used an exciting pile of expect scripts to talk to the serial console on a node to boot one of the machines. The node then booted with a read-only NFS mount as the root filesystem, generated a random key, and used that for a GELI-encryped read-write filesystem on the (200GB) local SSD. The GitHub Actions runner (actually, the portable Go rewrite) then pulled the job to run. At the end, we rebooted the node and the next job would get a new key for disk encryption.

                                If a job left any important data on a node, the next user would get the encrypted data and, unless they deleted the GELI layer, would get it decrypted with a different key. We didn't need to bother scrubbing anything between uses.

                                feld@friedcheese.usF This user is from outside of this forum
                                feld@friedcheese.usF This user is from outside of this forum
                                feld@friedcheese.us
                                wrote on last edited by
                                #390
                                @david_chisnall @paco yes yes yes this is exactly how it should be done (but the use of expect scripts makes me feel like we went back 30 years)
                                david_chisnall@infosec.exchangeD 1 Reply Last reply
                                0
                                • feld@friedcheese.usF feld@friedcheese.us
                                  @david_chisnall @paco yes yes yes this is exactly how it should be done (but the use of expect scripts makes me feel like we went back 30 years)
                                  david_chisnall@infosec.exchangeD This user is from outside of this forum
                                  david_chisnall@infosec.exchangeD This user is from outside of this forum
                                  david_chisnall@infosec.exchange
                                  wrote on last edited by
                                  #391

                                  @feld @paco

                                  Yup, experimental hardware. It came in a rackmounted box, but it was really an evaluation board. The bootloader was never meant to do that. We had all of the serial consoles connected via some big USB hubs because the only way of netbooting them was to talk to the serial console and prod it with a bunch of commands.

                                  1 Reply Last reply
                                  0
                                  • syllopsium@peoplemaking.gamesS This user is from outside of this forum
                                    syllopsium@peoplemaking.gamesS This user is from outside of this forum
                                    syllopsium@peoplemaking.games
                                    wrote on last edited by
                                    #392

                                    @paco This is often essential for corporates to meet defined security standards.

                                    Yes, it's far more probable that the application will be attacked than the data container, but there you go.

                                    I also seem to remember that certain hacks *have* stolen the entire (virtual) container, so it is a nice to have.

                                    paco@infosec.exchangeP 1 Reply Last reply
                                    0
                                    • stf@chaos.socialS This user is from outside of this forum
                                      stf@chaos.socialS This user is from outside of this forum
                                      stf@chaos.social
                                      wrote on last edited by
                                      #393

                                      @paco what about data-at-rest encrypted on your disk while malware is exfilling all data, the encrypted stuff is safe. imagine all your mails (seperately) encrypted, malware actor can only use the ones that are decrypted while present. limits damages.

                                      paco@infosec.exchangeP 1 Reply Last reply
                                      0
                                      • tubemeister@mstdn.socialT This user is from outside of this forum
                                        tubemeister@mstdn.socialT This user is from outside of this forum
                                        tubemeister@mstdn.social
                                        wrote on last edited by
                                        #394

                                        @paco Groan, yes. Had someone just the other day asking about full disk encryption just after his wordpress had been hacked.

                                        No, you need to fix your website. FDE might satisfy your auditor or other paper tiger box ticking exercise (ta-*dah*, security) but it won’t stop your wordpress being hacked again.

                                        Which it was, a few days later.

                                        1 Reply Last reply
                                        0
                                        • stf@chaos.socialS stf@chaos.social

                                          @paco what about data-at-rest encrypted on your disk while malware is exfilling all data, the encrypted stuff is safe. imagine all your mails (seperately) encrypted, malware actor can only use the ones that are decrypted while present. limits damages.

                                          paco@infosec.exchangeP This user is from outside of this forum
                                          paco@infosec.exchangeP This user is from outside of this forum
                                          paco@infosec.exchange
                                          wrote on last edited by
                                          #395

                                          @stf That is all true. It’s just totally unrelated to the sense in which OpenAI is using “encryption at rest.” It’s also nothing like what a cloud provider means when they say “encryption at rest.”

                                          Can a person take individual actions to protect themselves? Yes. That isn’t the topic.

                                          stf@chaos.socialS 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups