Wow, Huawei just accused the US govt of launching cyberattacks to infiltrate its intranet and internal information systems: https://www.huawei.com/en/facts/voices-of-huawei/media-statement-regarding-reported-us-doj-probes-into-huawei (h/t @Viss and campuscodi)
Musical Instruments To Be Exempt From Restrictions On Heavily Trafficked Rosewood https://n.pr/2ZkHlX4
This article does a good job on presenting the many different ways that data about your credit card purchases are shared without your knowledge or permission: #privacy https://www.washingtonpost.com/technology/2019/08/26/spy-your-wallet-credit-cards-have-privacy-problem/
The spy in your wallet: Credit cards have a privacy problem
https://www.washingtonpost.com/technology/2019/08/26/spy-your-wallet-credit-cards-have-privacy-problem/ #privacy #security
This is why attending a Battlebots event is risky--future generations might view it like we view the Roman Colosseum. I'm already going to have a hard enough time explaining my Roomba to future generations. #singularity #ai https://www.independent.co.uk/life-style/gadgets-and-tech/news/youtube-robot-combat-videos-animal-cruelty-a9071576.html
"Users who decline to share footage through the app may have police showing up at their door asking them to share in person if online requests don't work out. Law enforcement can also go to Amazon directly with a valid legal demand and bypass the user's consent to access the footage entirely." #privacy https://arstechnica.com/tech-policy/2019/08/dont-call-our-surveillance-products-surveillance-ring-tells-police/
The main difference between the Webmin RCE and similar build infrastructure attacks in proprietary tools is that since Webmin is FOSS, it has the opportunity to use Reproducible Builds so we all can detect this kind of attack in the future.
When your shopping cart has 8 racks of pork spare ribs, 3lbs of Kosher salt and 2lbs of brown sugar, everyone you meet in the store knows your plans for the weekend. #bbq #lowandslow
It's gonna take a lot to drag us away from you
There's nothing that a hundred nodes on Tor could ever do
I wish domains weren't all trackin' ya
Gonna take some time to build a `net without those ads
The AI bots cry out in the night
As they parse user data for some advertising company
I know that I must do what's right
As sure as Amazon Echo fights Google Assistant to own the data from me
I seek to cure what's deep inside
Frightened of this thing that they've become
It's gonna take a lot to drag us away from you
There's nothing that a hundred nodes on Tor could ever do
I wish domains weren't all trackin' ya
Gonna take some time to build a `net without those ads
I bought and plugged Echo in tonight
And she hears every whisper of each quiet conversation
She streams a song, then books a flight
Her LEDs reflect the stars that guide me toward salvation
I stopped an old man along the way
Hoping to find some old forgotten words to reclaim privacy
He turned to me as if to say
"Foolish boy, it's listening to you!"
OK everyone, time to reset your face and fingerprint. https://www.theguardian.com/technology/2019/aug/14/major-breach-found-in-biometrics-system-used-by-banks-uk-police-and-defence-firms
After decades of suffering through ipchains/iptables syntax, and seeing how easy fw and ufw made common firewall workflows, it's disappointing that the best Debian's iptables replacement can do is:
nft add rule inet filter input tcp dport 22 accept
When syntax for common workflows is complicated, you increase the chance the admin will make a mistake that exposes them to attackers. See S3 bucket permissions for more examples of this. #infosec #devops
I can't speak for the rest of the @linuxjournal archive, but I own the decade+ worth of articles I wrote. A lot of them are just as relevant today (I refer to them myself quite often). Would anyone be interested in some kind of "Best of Hack and /" polished and updated compilation?
Technical author, FOSS advocate, public speaker, Linux security & infrastructure geek, author of The Best of Hack and /: Linux Admin Crash Course, Linux Hardening in Hostile Networks and many other books, ex-Linux Journal columnist.