Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)IS
Members
305
Posts
8
Active Today
9
Created
2 yr. ago
  • Information Security @infosec.pub
    activistPnk @slrpnk.net

    SSD forced itself into read-only mode -- how can this be reversed?

    The background is here. In short, an SSD with the “Apacer” brand froze itself into read-only mode, presumably due to reaching a point of poor reliability.

    The data on the drive is useless. It was part way through installing linux when it happened. I would like to reverse that switch to make one last write operation (to write a live linux distro), which thereafter can be read-only.

    I have heard some speculation that the manufacturer uses password to impose read-only mode. If true, then the password would be in the drive’s firmware. Does anyone know what Apacer uses for this password?

  • Information Security @infosec.pub
    ianonymous3000 @infosec.pub

    Keyoxide Verification

    aspe:keyoxide.org:3VP5CIVZ6MQ767ELCSBRCPSV4M

  • Information Security @infosec.pub
    cyberhakon @infosec.pub

    I tested using Google's Gemini as a helping hand in Linux log based threat hunting - and it is actually helpful, although not ready to take the security analyst's job (yet).

  • Information Security @infosec.pub
    cyberhakon @infosec.pub

    A blog post I made based on discussions at a conference last week - we need to teach smart things like self driving cars and ships to defend themselves against cyber attacks. This outlines how we should approach it.

  • Information Security @infosec.pub
    ericjmorey @programming.dev

    Do Users Write More Insecure Code with AI Assistants?

    chaos.social ~n (@[email protected])

    This is fine... "We observed that participants who had access to the AI assistant were more likely to introduce security vulnerabilities for the majority of programming tasks, yet were also more likely to rate their insecure answers as secure compared to those in our control group." https://arxiv.o...

    cross-posted from: https://programming.dev/post/8121843

    ~n (@[email protected]) writes:

    This is fine...

    "We observed that participants who had access to the AI assistant were more likely to introduce security vulnerabilities for the majority of programming tasks, yet were also more likely to rate their insecure answers as secure compared to those in our control group."

    [Do Users Write More Insecure Code with AI Assistants?](https://arxiv.org/abs/2211.03622?

  • Information Security @infosec.pub
    comfydecal @infosec.pub

    General tips and where to study?

    I am curious if anyone has advice on a good start to get into InfoSec. I just bought a car, used a separate phone number and somehow marketers found my actual number, so want to get a better handle on how to handle personal data.

  • Information Security @infosec.pub
    splendoruranium @infosec.pub

    Smart card/Yubikey labeling - yay/nay?

    Now ever since I got a label printer I made it a habit to... well... label everything. It's been the a gamechanger in organizing my stuff.

    This habit includes having a tiny label with my street address and mail address on most any item that I loan away or tend to regularly lug around with me as a general reminder of ownership. I forget about and lose stuff all the time, so this gives me some piece of mind with most of my medium-value little gadgets. I believe (and have experienced) that people are generally decent and will return lost stuff to me if it's easy for them to find out to whom it belongs.

    Now it has occurred to me that this practice might be detrimental when applied to a smart cards in general and my Yubikeys in particular. After all, shouldn't a lost Yubikey be considered "tampered with/permanently lost" anyway, whether it's returned or not? And wouldn't an Email address on the key just increase the risk of some immediate abuse of the key's contents, i.e. GPG private keys

  • Information Security @infosec.pub
    /home/pineapplelover @lemm.ee

    WiFi routers can see people through walls. Here’s how it works

    cross-posted from: https://lemmy.kevitprojects.com/post/8452

    What do you guys think about this?