Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

avuko@infosec.exchangeA

avuko@infosec.exchange

@avuko@infosec.exchange
About
Posts
3
Topics
0
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • I'm surprised it survived that long.
    avuko@infosec.exchangeA avuko@infosec.exchange

    @AAKL @therecord_media Telegram was allowed because it served their purposes. As they need to further control the population, they need an app that does more than allow them to listen in on every conversation.

    They want that, and what the Chinese government has: your biometrics, financial transactions, location data, news consumption. E-ve-ry-thing.

    Thus, the WeChat model.

    Uncategorized telegram

  • They finally did it.
    avuko@infosec.exchangeA avuko@infosec.exchange

    @jkb @pheonix That seems to be the case, although the weakness is in Microsoft Notepad incorrectly handling “an unverified protocol”, not in something the user then has to do or interact with. Besides clicking a link.

    This reads to me like an URI protocol handling issue.

    And that functionality is not something they’d have to reinvent or vibe code.

    You know, with their proprietary plain text editor running on their proprietary OS, and next to their proprietary file explorer, their proprietary internet browser, their proprietary email client and proprietary network agents.

    All their proprietary software handling URI protocols… RIGHT THERE.

    Uncategorized noai microslop microsoft windows programming

  • Nederland wil minder afhankelijk worden van big tech, maar Binnenlandse Zaken laat de gesprekken daarover leiden door een branchevereniging die de belangen van big tech uitdraagt.
    avuko@infosec.exchangeA avuko@infosec.exchange

    @queen_fennec @FTM_nl

    Het scenario is in het kort denk ik:

    Systemen uitzetten of grootschalig degraderen via de beheersorganisatie vanuit een statelijke actor met volledige toegang en controle over IAM en cloud van de beheersorganisatie.

    Geef een onafhankelijk red team dit scenario mee en wacht een weekje.

    Je kan die week gebruiken om je voor te bereiden op de explosie aan de Five stages of grief waar iedereen vervolgens doorheen gaat.

    Ik zet trouwens in op veel Denial en Bargaining. Want dat is nu ook al schering en inslag.

    Uncategorized
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups