Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. @paco @BenAveling it is just a stupid electronic device

@paco @BenAveling it is just a stupid electronic device

Scheduled Pinned Locked Moved Uncategorized
597 Posts 265 Posters 303 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • ? Guest

    @globcoco@mamot.fr @paco@infosec.exchange Do you think your bank is better at cyber security than Google? You give them the same information.

    The alternative is giving photos of your photo ID to random websites with no full-time security team.

    If the data is collected who has a objectively better cyber security team? Google or a random adult videos website.

    We do have an alternative to age verification and it's censorship. It could just be illegal to transmit material harmful to minors across state lines. No age verification because there's no material to age gate.

    Unless you're willing to actively advocate that there should be zero safe guards to prevent a small child or teenager from being exposed to the materials, for the sake of adults having easier access to the material.

    Governments are going to do something. We can either present them with options that avoid harm as much as possibl, or we can stay silent l, and let them decide and it'll probably mean everyone loses. You might have to provide a government ID to use the internet, and there's censorship.

    globcoco@mamot.frG This user is from outside of this forum
    globcoco@mamot.frG This user is from outside of this forum
    globcoco@mamot.fr
    wrote on last edited by
    #377

    @elaine @paco

    Google is not the answer though.

    1 Reply Last reply
    0
    • betonglen@indieweb.socialB This user is from outside of this forum
      betonglen@indieweb.socialB This user is from outside of this forum
      betonglen@indieweb.social
      wrote on last edited by
      #378

      @paco

      thank you for sharing and you all for your service 🙏🏾✌🏾🖖🏾

      1 Reply Last reply
      0
      • b_cavello@mastodon.publicinterest.townB This user is from outside of this forum
        b_cavello@mastodon.publicinterest.townB This user is from outside of this forum
        b_cavello@mastodon.publicinterest.town
        wrote on last edited by
        #379

        @paco This is so cool! Thank you for sharing the process. This inspires me 💖

        paco@infosec.exchangeP 1 Reply Last reply
        0
        • b_cavello@mastodon.publicinterest.townB b_cavello@mastodon.publicinterest.town

          @paco This is so cool! Thank you for sharing the process. This inspires me 💖

          paco@infosec.exchangeP This user is from outside of this forum
          paco@infosec.exchangeP This user is from outside of this forum
          paco@infosec.exchange
          wrote on last edited by
          #380

          @b_cavello I’m glad! I think it’s fun. I’ve been doing it off and on for 20 years. (I lived outside the US for 10). Almost any eligible voter can be an election officer in most jurisdictions. It’s easy to try once, and no big deal if you don’t like it and don’t do it again.

          b_cavello@mastodon.publicinterest.townB 1 Reply Last reply
          0
          • paco@infosec.exchangeP paco@infosec.exchange

            @b_cavello I’m glad! I think it’s fun. I’ve been doing it off and on for 20 years. (I lived outside the US for 10). Almost any eligible voter can be an election officer in most jurisdictions. It’s easy to try once, and no big deal if you don’t like it and don’t do it again.

            b_cavello@mastodon.publicinterest.townB This user is from outside of this forum
            b_cavello@mastodon.publicinterest.townB This user is from outside of this forum
            b_cavello@mastodon.publicinterest.town
            wrote on last edited by
            #381

            @paco I live in DC, and I feel like they’re overwhelmed with volunteers, but maybe not for special election stuff. I’d like to try it! These quiet moments of democracy in action are really beautiful

            1 Reply Last reply
            0
            • ki@chaos.socialK ki@chaos.social

              @shinspiegel @elaine @paco
              which doesn't make things any better, though

              shinspiegel@mastodon.socialS This user is from outside of this forum
              shinspiegel@mastodon.socialS This user is from outside of this forum
              shinspiegel@mastodon.social
              wrote on last edited by
              #382

              @ki @elaine @paco I did write in my blog on this topic year ago, maybe this could better explain my reasonsing. It can be a little outdated, and I after thought this concept can be improved, but it’s a starting point: https://jeferson.me/blog/2025/06/10/pr0n/

              1 Reply Last reply
              0
              • paco@infosec.exchangeP This user is from outside of this forum
                paco@infosec.exchangeP This user is from outside of this forum
                paco@infosec.exchange
                wrote on last edited by
                #383

                @Virginicus Agreed. Speaking to Ms Hanley, she said of working in the general assembly: it’s the kiss of death on an initiative to say it’s being put forward by Fairfax. Everyone rolls their eyes. It’s an interesting story:

                VA law says you can’t have a district bigger than 5000 voters. Fairfax has a lot of people, so lots of 2500-3500 voter precincts. But it also has a bunch of 1000-person precincts. Her expression was that the office of elections is “turning into a moving company” because of how many precincts we have and the amount of equipment we have to send to each. But we have to do things according to the law.

                Thankfully, she said, Chesterfield County is running into something similar. So THEY can put forward a bill to get some changes and Fairfax can support them.

                She wants to do bigger locations with more of the print-on-demand machines. A location might serve 3-5 precincts. You walk up, we figure out what precinct you’re in, and we print the ballot that you should have. This is what they do at the satellite early voting sites. They just want to do more of it and do it in larger precincts on election day. Sounds like a good idea to me. But it sounds like it requires a change to the law.

                1 Reply Last reply
                0
                • june@social.nouveau.communityJ This user is from outside of this forum
                  june@social.nouveau.communityJ This user is from outside of this forum
                  june@social.nouveau.community
                  wrote on last edited by
                  #384

                  @paco The toilet paper is for fiber.

                  1 Reply Last reply
                  0
                  • cshlan@dawdling.netC This user is from outside of this forum
                    cshlan@dawdling.netC This user is from outside of this forum
                    cshlan@dawdling.net
                    wrote on last edited by
                    #385

                    @paco
                    My husband's going to the store tomorrow. He'll be getting grits and oatmeal 😁 among other things but we generally stay stocked up on TP and French toast.

                    #snow

                    1 Reply Last reply
                    0
                    • feld@friedcheese.usF This user is from outside of this forum
                      feld@friedcheese.usF This user is from outside of this forum
                      feld@friedcheese.us
                      wrote on last edited by
                      #386
                      @david_chisnall @paco AWS with the Mac Minis -- every time you power them off they wipe storage, takes a couple hours to complete before you can use the server again. Really annoying when you didn't expect it
                      vinoth@infosec.exchangeV david_chisnall@infosec.exchangeD 2 Replies Last reply
                      0
                      • feld@friedcheese.usF feld@friedcheese.us
                        @david_chisnall @paco AWS with the Mac Minis -- every time you power them off they wipe storage, takes a couple hours to complete before you can use the server again. Really annoying when you didn't expect it
                        vinoth@infosec.exchangeV This user is from outside of this forum
                        vinoth@infosec.exchangeV This user is from outside of this forum
                        vinoth@infosec.exchange
                        wrote on last edited by
                        #387

                        @feld @david_chisnall @paco David nails it. Also, encryption at rest makes it possible to retire storage devices after End-of-Life without having to worry about data theft after retirement.

                        feld@friedcheese.usF 1 Reply Last reply
                        0
                        • vinoth@infosec.exchangeV vinoth@infosec.exchange

                          @feld @david_chisnall @paco David nails it. Also, encryption at rest makes it possible to retire storage devices after End-of-Life without having to worry about data theft after retirement.

                          feld@friedcheese.usF This user is from outside of this forum
                          feld@friedcheese.usF This user is from outside of this forum
                          feld@friedcheese.us
                          wrote on last edited by
                          #388
                          @vinoth @david_chisnall @paco same reason why I FDE all my disks now. I don't have to care what happens if they fail.

                          Also I never have to worry about ZFS pool issues from moving disks around. Wiping the encryption key and setting a new one is much simpler than trying to scrub all the ZFS metadata off a disk
                          1 Reply Last reply
                          0
                          • feld@friedcheese.usF feld@friedcheese.us
                            @david_chisnall @paco AWS with the Mac Minis -- every time you power them off they wipe storage, takes a couple hours to complete before you can use the server again. Really annoying when you didn't expect it
                            david_chisnall@infosec.exchangeD This user is from outside of this forum
                            david_chisnall@infosec.exchangeD This user is from outside of this forum
                            david_chisnall@infosec.exchange
                            wrote on last edited by
                            #389

                            @feld @paco

                            The Morello cluster we set up at MS was exposed for GitHub Actions runners. We forwarded the GitHub web hook thing to an Azure message queue thing that the head node read. When it received one, it used an exciting pile of expect scripts to talk to the serial console on a node to boot one of the machines. The node then booted with a read-only NFS mount as the root filesystem, generated a random key, and used that for a GELI-encryped read-write filesystem on the (200GB) local SSD. The GitHub Actions runner (actually, the portable Go rewrite) then pulled the job to run. At the end, we rebooted the node and the next job would get a new key for disk encryption.

                            If a job left any important data on a node, the next user would get the encrypted data and, unless they deleted the GELI layer, would get it decrypted with a different key. We didn't need to bother scrubbing anything between uses.

                            feld@friedcheese.usF 1 Reply Last reply
                            0
                            • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                              @feld @paco

                              The Morello cluster we set up at MS was exposed for GitHub Actions runners. We forwarded the GitHub web hook thing to an Azure message queue thing that the head node read. When it received one, it used an exciting pile of expect scripts to talk to the serial console on a node to boot one of the machines. The node then booted with a read-only NFS mount as the root filesystem, generated a random key, and used that for a GELI-encryped read-write filesystem on the (200GB) local SSD. The GitHub Actions runner (actually, the portable Go rewrite) then pulled the job to run. At the end, we rebooted the node and the next job would get a new key for disk encryption.

                              If a job left any important data on a node, the next user would get the encrypted data and, unless they deleted the GELI layer, would get it decrypted with a different key. We didn't need to bother scrubbing anything between uses.

                              feld@friedcheese.usF This user is from outside of this forum
                              feld@friedcheese.usF This user is from outside of this forum
                              feld@friedcheese.us
                              wrote on last edited by
                              #390
                              @david_chisnall @paco yes yes yes this is exactly how it should be done (but the use of expect scripts makes me feel like we went back 30 years)
                              david_chisnall@infosec.exchangeD 1 Reply Last reply
                              0
                              • feld@friedcheese.usF feld@friedcheese.us
                                @david_chisnall @paco yes yes yes this is exactly how it should be done (but the use of expect scripts makes me feel like we went back 30 years)
                                david_chisnall@infosec.exchangeD This user is from outside of this forum
                                david_chisnall@infosec.exchangeD This user is from outside of this forum
                                david_chisnall@infosec.exchange
                                wrote on last edited by
                                #391

                                @feld @paco

                                Yup, experimental hardware. It came in a rackmounted box, but it was really an evaluation board. The bootloader was never meant to do that. We had all of the serial consoles connected via some big USB hubs because the only way of netbooting them was to talk to the serial console and prod it with a bunch of commands.

                                1 Reply Last reply
                                0
                                • syllopsium@peoplemaking.gamesS This user is from outside of this forum
                                  syllopsium@peoplemaking.gamesS This user is from outside of this forum
                                  syllopsium@peoplemaking.games
                                  wrote on last edited by
                                  #392

                                  @paco This is often essential for corporates to meet defined security standards.

                                  Yes, it's far more probable that the application will be attacked than the data container, but there you go.

                                  I also seem to remember that certain hacks *have* stolen the entire (virtual) container, so it is a nice to have.

                                  paco@infosec.exchangeP 1 Reply Last reply
                                  0
                                  • stf@chaos.socialS This user is from outside of this forum
                                    stf@chaos.socialS This user is from outside of this forum
                                    stf@chaos.social
                                    wrote on last edited by
                                    #393

                                    @paco what about data-at-rest encrypted on your disk while malware is exfilling all data, the encrypted stuff is safe. imagine all your mails (seperately) encrypted, malware actor can only use the ones that are decrypted while present. limits damages.

                                    paco@infosec.exchangeP 1 Reply Last reply
                                    0
                                    • tubemeister@mstdn.socialT This user is from outside of this forum
                                      tubemeister@mstdn.socialT This user is from outside of this forum
                                      tubemeister@mstdn.social
                                      wrote on last edited by
                                      #394

                                      @paco Groan, yes. Had someone just the other day asking about full disk encryption just after his wordpress had been hacked.

                                      No, you need to fix your website. FDE might satisfy your auditor or other paper tiger box ticking exercise (ta-*dah*, security) but it won’t stop your wordpress being hacked again.

                                      Which it was, a few days later.

                                      1 Reply Last reply
                                      0
                                      • stf@chaos.socialS stf@chaos.social

                                        @paco what about data-at-rest encrypted on your disk while malware is exfilling all data, the encrypted stuff is safe. imagine all your mails (seperately) encrypted, malware actor can only use the ones that are decrypted while present. limits damages.

                                        paco@infosec.exchangeP This user is from outside of this forum
                                        paco@infosec.exchangeP This user is from outside of this forum
                                        paco@infosec.exchange
                                        wrote on last edited by
                                        #395

                                        @stf That is all true. It’s just totally unrelated to the sense in which OpenAI is using “encryption at rest.” It’s also nothing like what a cloud provider means when they say “encryption at rest.”

                                        Can a person take individual actions to protect themselves? Yes. That isn’t the topic.

                                        stf@chaos.socialS 1 Reply Last reply
                                        0
                                        • syllopsium@peoplemaking.gamesS syllopsium@peoplemaking.games

                                          @paco This is often essential for corporates to meet defined security standards.

                                          Yes, it's far more probable that the application will be attacked than the data container, but there you go.

                                          I also seem to remember that certain hacks *have* stolen the entire (virtual) container, so it is a nice to have.

                                          paco@infosec.exchangeP This user is from outside of this forum
                                          paco@infosec.exchangeP This user is from outside of this forum
                                          paco@infosec.exchange
                                          wrote on last edited by
                                          #396

                                          @syllopsium i didn’t say there was no reason to do it. I just said it wasn’t protecting the data. Compliance is the biggest driver. And this is a great example where compliance makes a bunch of people do a bunch of stuff that has limited value in reality.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups