-
7 votes
-
Amazon shared Ring security camera and video doorbell footage with police without a warrant
31 votes -
I've locked myself out of my digital life
16 votes -
Security and privacy tips for people seeking an abortion
14 votes -
Researchers devise iPhone malware that runs even when device is turned off
6 votes -
If you could rebuild user authentication on the web from the ground up, what would you do?
lou's post here resonated with me and my attempts to get my family to use better security practices (i.e. 2FA, password managers). They're very difficult to wrap your brain around to the average...
lou's post here resonated with me and my attempts to get my family to use better security practices (i.e. 2FA, password managers). They're very difficult to wrap your brain around to the average user, and they have the ability to create catastrophic failstates if used incorrectly. Furthermore, even when they work well, they can still be kind of clunky (different sites use different methods; writing down/printing recovery codes feels like a dated solution alongside other tech-forward things).
Also, outside of this, password requirements are their own bugbear, with nearly every site having different criteria. Even as someone who uses a password generator and manager on the regular, I still have to adjust the password creation criteria to do things like fit character limits or specific requirements (and don't get me started on forced resets!). I totally get why so many people reuse passwords, or have a default one that they sort of modify as needed to fit a given site's needs.
From my (admittedly super limited) perspective of a lay user: usernames, passwords, 2FA and the whole stack seems like something that's suffering under the technical debt of decades' worth of web development and networking. It seems like things have inched forward and many new layers have been added to address emergent problems, but the whole system gives a sort of barely-held-together-by-tape feel.
What if we could use what we know now and redesign things from the ground up? If we could start fresh, today, what might username authentication look like beyond the usual username/password combos that we're so used to?
I'm interested in any ideas -- not necessarily just feasible ones.
Also, despite me being the one prompting this thread, don't feel the need to simplify technical explanations or anything. I'm mostly interested in lurking and seeing what all you very smart techy people have to say about the topic. :)
12 votes -
A series of patent lawsuits is challenging the history of malware detection
7 votes -
Macho cyberwarfare and the long game
2 votes -
Hackers who broke into NVIDIA's network leak DLSS source code online
19 votes -
Chipmaker Nvidia investigating potential cyberattack
6 votes -
My journey down the rabbit hole of every journalist’s favorite app, Otter.ai
4 votes -
New Chrome 0-day bug under active attack
12 votes -
The battle for a powerful cyberweapon: A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware
4 votes -
IRS will soon require selfies for online access
18 votes -
Google releases “disable 2g” feature for new Android smartphones
19 votes -
Diskless infrastructure in beta (System Transparency: stboot)
4 votes -
Here’s how to prevent (and recover from) a Facebook hack
5 votes -
LastPass is going to become an independent company
16 votes -
Log4Shell: We are in so much trouble
21 votes -
Winning the war on ransomware - The DOJ’s task force is changing the landscape around hackers, but will it be enough?
4 votes -
But why that VPN? How WireGuard made it into Linux
8 votes -
VPN testing reveals poor privacy and security practices, hyperbolic claims
20 votes -
Hackers are spamming businesses’ receipt printers with ‘antiwork’ manifestos
13 votes -
Former Ubiquiti employee charged for data theft and attemtping to extort his employer
8 votes -
Ten tips for home safety in 2021
1 vote -
After releasing full database of LGBTQ dating website, Black Shadow hackers leak medical records of 290,000 Israeli patients
9 votes -
Fraudsters cloned company director’s voice in $35 million bank heist, police find
8 votes -
Polygon (formerly known as Matic Network) dodges $850M hack, pays record $2M bounty
2 votes -
Sinclair Broadcast Group was hit by ransomware over the weekend
13 votes -
The entirety of Twitch has reportedly been leaked
42 votes -
Company that routes SMS for all major US carriers was hacked for five years
27 votes -
Lithuania says throw away Chinese phones due to censorship concerns
15 votes -
Billed as the most secure phone on the planet, An0m became a viral sensation in the underworld. There was just one problem for anyone using it for criminal means: it was run by the police
14 votes -
Unsecure at any speed?
7 votes -
Diners beware: That meal may cost you your privacy and security
8 votes -
Zoom to pay $85M for lying about encryption and sending data to Facebook and Google
28 votes -
Amazon’s mission: Getting a ‘key’ to your apartment building
9 votes -
Venmo gets more private—but it’s still not fully safe
5 votes -
A case against security nihilism
9 votes -
Norway says cyber attack on parliament carried out from China – attack had utilised a security hole in Microsoft's Exchange software
10 votes -
Amazon asked Apple to remove an app that spots fake reviews, and Apple agreed
19 votes -
Sophisticated exploits used to breach fully-patched iPhones of journalists, activists, as detailed by Amnesty International's Security Lab
24 votes -
Swedish Coop supermarkets shut due to US ransomware cyber-attack – the hack targeted Florida-based IT company Kaseya before spreading through corporate networks
8 votes -
Why Google Play’s APK replacement is scaring some security experts
15 votes -
LinkedIn breach reportedly exposes data of 92% of users, including inferred salaries
13 votes -
NewsBlur Mongo database deleted in ransom attack (and restored)
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had...
NewsBlur was down yesterday evening due to its Mongo database getting attacked by a hacker and held for ransom. It’s restored from backup, but there are privacy implications for anyone who had sensitive private data there. We will likely find out more after the maintainer recovers from a busy night.
There are no good links for this, but it’s being discussed on Hacker News. Since it’s open source, someone described what’s being kept in that database.
(I use NewsBlur, but I don’t think my RSS reading habits are all that sensitive. Others might be in a different situation, though.)
6 votes -
Western Digital urges users to disconnect unsupported MyBook Live external hard drives from internet, after drives start being wiped remotely using vulnerability reported three years ago
14 votes -
780GB of data, tools, and source code were stolen from EA by purchasing a stolen cookie to get access to the company's Slack and social-engineering an IT Support employee
21 votes -
US Department of Justice recovers $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists
17 votes -
How to make your data harder to find online
7 votes