
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.

🚀 Seen my posts and want more? Dive deep into the issues with Big Tech at Escape Big Tech!
💡 Need FOSS-focused software solutions? Reach out on Matrix at @dannym:balooga.xyz!
definitely agree with you.
also PGP is so easy to use that honestly I really cannot grasp why it's not more used for critical communication like this. if the emails were encrypted this would be much less of a problem
The main thing I would point to is that Matrix itself only does text; the Element client uses Jitsi to add in audio/video calls and screensharing [...]
Matrix VoIP is a thing, and it's usable for audio & video on many clients, element and fluffychat come to mind, but probably more.
element call is also coming into element (and possibly other clients) for video calls and screensharing
My other gripes are just with the user interface, [...] it really doesn’t look like Discord
why does that matter?
why not matrix?
Counting the days to 1984... It's truly coming closer and closer :-/
The medical industry has very bad security practices in general from what I hear. You can basically expect that your medical history is accessible to lots of companies that should have nothing to do with it, not just Microsoft. Pretty much all of your health data is probably in the hands of at the very least Google and Amazon and the sad reality is that people don't care about security and privacy until it's too late. The number one server provider for anything healthcare related is AWS and the legal requirements they have to follow for data protection, HIPAA, are the sort of requirements that only a politician would think are actually beneficial to keeping data secure.
EDIT: to be clear, I hate it, and I think you made the right choice, but sadly expecting privacy of our medical information is gonna keep being a battle, until the medical industry starts taking it more seriously
Thanks for checking out the article! As for skimming through it, well, I guess I'll take that as a hint that I need to write shorter posts as I do have a tendency of blabbering too much when writing haha
I didn't know about scribe.rip, I will definitely use that instead of medium from now on thank you!
No way, really who could've guessed? I'm shocked, I'm telling you shocked...
oh wait, I'm not
way too specific... is this the plot to a book? if so what's it called?
Permanently Deleted
Those tests are worth more than four years of college?
Yes a test to figure out if you can perform your job is significantly more valuable than a collage degree, this doesn't mean that college has no value, mind you, it just means that knowing how to do the job and knowing that you fit in with the company culture is vastly more important.
Go get a bunch of I.T. certifications. Get your CompTIA A+, Network+, Security+ Get a Microsoft MCP or MCSA
Those certifications are useless, they look good on your resume because managers love showcasing their staff's "certifications", as many companies that don't understand IT put value on the certifications more than anything else, but they don't actually provide you any value in of themselves. Sure it might be interesting how many network switches you can daisy chain according to the standards, but it has no real value most of the time, if that's information you need in your job it's something you can just look up, HOWEVER, asking you random questions that pertain to the job during the interview IS a good way to understand if you're a good candidate, and, often, the actual response doesn't matter as much as your reasoning for getting to that response.
When an interviewer at google asks you how many pennys it would take to make a structure as tall as the empire state building, it doesn't matter what the answer is, truly, even if you got the exact number of pennys, just saying the number would mean you don't pass the interview, your answer would be worth less than an answer that gets it wrong by 75% but is well reasoned, what they care about is how you come up to the conclusion that you come up with, the solution is useless.
how would you know
wouldn't it have been easier to just read the source code? (not that GNU's code is easy to read, but still)
this is definitely satire, otherwise it would take longer than the age of the universe to finish coding it lol
That’s not the issue. You can attempt as many passwords as you want in actually secure password managers as well. KeepassXC for instance IS secure, you can still brute force the password, but because of the hashing algorithm they use it’s extremely hard. With PKZIP if you know some of the words in the file, you can easily guess the password in just a few hours because the encryption algorithm it uses isn’t secure
It is
EDIT: I'm wrong, I don't know what I was thinking, I misremembered hearing something apparently. Thank you for the corrections
Thank you! More people should do this. It may seem like $5 is nothing, but it’s actually great help. Even $1 helps out FOSS projects, as if even just 1% of the users of such projects donated $1 each month that’d be able to make a good income,
Someone really should maintain a list like that, hosted on multiple non big tech git hosts.
This recent Anti-FOSS propaganda needs to stop
Seconded, and added Haier to my mental list of companies to never buy from.
The UK has a data protection agency? Does the UK know? Have they been asleep for the past 20 years?
How about using LDAP? It's a bit complicated to learn but it's easy to integrate it in a bunch of applications and it allows you to manage user accounts and permissions in one central place.
Maybe try LLDAP which is a modern implementation (haven't used it myself) which is designed to be simplified and I assume more welcoming to newcomers.
asus's router webui
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.
I'm a software engineer and I love actual technology, but I think we have reached the peak of mt. stupid
TKey: A reasonably secure RISC-V computer in a USB stick
Note: I am not affiliated with the project
TKey: A reasonably secure RISC-V computer in a USB stick
Note: I am not affiliated with the project
TKey: A reasonably secure RISC-V computer in a USB stick
Note: I am not affiliated with the project
https://www.youtube.com/watch?v=o4GZUCwVRLs
https://www.youtube.com/watch?v=o4GZUCwVRLs
Hello, Penguins! We will interrupt this week’s showcase friday to bring you a breaking news story. Apple just released an update to iOS 17 that fixes a bug that has been leaking users’ Wi-Fi MAC addresses for the past three years. This is a major privacy faceplant for Apple, and it’s a cautionary ta...
Hello, Penguins! We will interrupt this week’s showcase friday to bring you a breaking news story. Apple just released an update to iOS 17 that fixes a bug that has been leaking users’ Wi-Fi MAC addresses for the past three years. This is a major privacy faceplant for Apple, and it’s a cautionary ta...
Welcome back to Showcase Friday, my enlightened Penguins of the digital tundra! I present to you another hidden FOSS gem this week. This week, we’re diving into Purplix, the survey platform that gives Big Tech a proverbial wedgie by encrypting everything end-to-end! Yes, you read that right: everyth...
Welcome to Showcase Friday, put down those fish and listen up. Today is no ordinary Friday—it’s Showcase Friday, the day we plunge headfirst into the icy waters of Free and Open-Source Software. Showcase Friday is a new series of articles where I’ll be showcasing a FOSS project that I think deserves...
Total surveillance: How today’s digital mass surveillance threatens free societies
Recent events highlight the need for companies to continuously evaluate and improve how sensitive data is handled. Microsoft revealed that AI researchers had inadvertently exposed 38 terabytes of internal information since 2020. Additionally, Google agreed to pay settlements totaling $155 million ov...
Recent events highlight the need for companies to continuously evaluate and improve how sensitive data is handled. Microsoft revealed that AI researchers had inadvertently exposed 38 terabytes of internal information since 2020. Additionally, Google agreed to pay settlements totaling $155 million ov...
The recent blog post by Andrew Kelley and Loris Cro about the supposed damages bounties inflict on open source projects, like Zig, warrants a well-articulated counter-argument. In this article, we’ll explore the oft-ignored benefits of competition in Free and Open Source Software (FOSS) and how the ...
The “smart” home of the future: a paradise where devices cater to our every need, adjust to our routines, and offer unprecedented convenience. While this dream is often powered by proprietary systems and platforms, we’ll explore why the Free and Open Source Software (FOSS) movement...
Everyone told me to use a VPN to protect myself from tracking online and I know that staying safe online is an ever growing difficulty and I could be exploited by hackers. [REDACTED] allows me to change my IP address, making me harder to track, securing my privacy. The average privacy concious perso...
In the realm of Cyberworld, VPNs are akin to knights guarding your privacy. However, they cannot singlehandedly protect you from all the monsters lurking in the Interweb Forest. It's essential to arm yourself with knowledge and the right tools, as your journey through the Cyberworld is filled with threats like Tracker Cookies and DNS Dragons. It's not just about having the right VPN, but also about adopting secure practices to enhance your protection.