-
5 votes
-
Meet the mad scientist who wrote the book on how to hunt hackers
8 votes -
CVE-2020-0601 - Windows CryptoAPI spoofing vulnerability
16 votes -
Hackers are breaking directly into telecom companies to take over customer phone numbers
10 votes -
Tricky phish angles for persistence, not passwords
3 votes -
reCAPTCHA: Is there method in monotony?
What started out as a little facetious in my own head leads me now to a serious question. Is there some meaningful reason why Google has to use a subsection of images for reCAPTCHA? I really...
What started out as a little facetious in my own head leads me now to a serious question. Is there some meaningful reason why Google has to use a subsection of images for reCAPTCHA? I really dislike having to do this and at the very least would appreciate some variation.
- Traffic Lights
- Buses
- Bicycles
- Cars
- Crosswalks
Is there something special about these things in this context? Is the visual noise they're usually associated with what makes them good candidates? Are Google just really into urban planning? Who knows...I'm hoping some Tilder smarter than I can help me out.
10 votes -
Promiscuous cookies and their impending death via the SameSite policy
10 votes -
On privacy versus freedom
9 votes -
What we know about you when you click on this article—Vox has a pretty typical privacy policy. That doesn’t make it great.
11 votes -
Why electronic voting is still a bad idea
17 votes -
Generated passwords, UX and security absolutism
17 votes -
Military grade encryption won’t save you, or your business
4 votes -
Firefox Private Network
30 votes -
Finland launches data security guarantee label – certification symbol serves as a guarantee to consumers that a device's basic information security features are in order
12 votes -
It’s time to plan for a future beyond passwords
11 votes -
Finland is preparing to defend itself against a mysterious activist group threatening to carry out cyberattacks – unless it gets some Bitcoin
7 votes -
A new tracking technique using CNAME aliases to circumvent third-party cookie restrictions is blockable using a Firefox DNS API, but not in Chrome
18 votes -
Seven security strategies, summarized
3 votes -
Android exploit of system camera apps enabled a malicious app to record and upload photos, video and audio with only "storage" permission
10 votes -
Cybercrime Booms As Scammers Hack Human Nature To Steal Billions
8 votes -
I'm the Google whistleblower. The medical data of millions of Americans is at risk
33 votes -
1Password has raised $200 million from Accel
16 votes -
Give Firefox a chance for a faster, calmer and distraction-free internet
27 votes -
Hackers can use lasers to ‘speak’ to your Amazon Echo or Google Home
10 votes -
How to stay safe online and prevent phishing with FIDO2, WebAuthn and security keys
5 votes -
NSO exploited WhatsApp to hack at least 1400 phones and spy on top government officials at US allies
16 votes -
The cybersecurity firm Tiversa dominated an emerging online market—before it was accused of fraud, extortion, and manipulating the federal government
6 votes -
Australia wants to use face recognition for porn age verification
22 votes -
This video is sponsored by ███ VPN
38 votes -
Tor Browser 9.0 is released
13 votes -
Olympic destroyer - The untold story of the 2018 Olympics cyberattack
6 votes -
Sudo flaw lets Linux users run commands as root even when they're restricted
18 votes -
How safe is Apple’s Safe Browsing?
9 votes -
An analysis of the implications of using Google's G Suite products in a newsroom
10 votes -
Into the web multiverse
6 votes -
NSA whistleblower dropped from Australian cyber conference at the last minute
6 votes -
Elevator hacking: From the pit to the penthouse
16 votes -
New SIM attacks de-mystified, protection tools now available
6 votes -
DoorDash data breach - Affects approximately 4.9 million consumers, Dashers, and merchants who joined before April 6, 2018
12 votes -
Ring says it doesn't use facial recognition, but it has “a head of face recognition research”
16 votes -
What's your cloud/syncing setup for files, pics, mail, bookmarks, etc?
So I've spent the last few days trying to sync everything up between devices, with the following thoughts in mind: how fucked am I going to be if a device gets corrupted/stolen/lost? how can I...
So I've spent the last few days trying to sync everything up between devices, with the following thoughts in mind:
- how fucked am I going to be if a device gets corrupted/stolen/lost?
- how can I easily access everything I need from a mobile device/device not belonging to me?
- how can I avoid using services from the big tech companies, and keep things open source, as much as possible?
I'm by no means an expert in the field, and I'm hoping in this thread to get a discussion going as to the pros and cons of using different services/setups, to get a general idea as to what others are doing to keep their daily lives simpler and more secure, and to perhaps see what are the future steps for me to take when I feel like playing around again.
Servers & Storage
I span up a 25GB VPS with Vultr for 'active use data', and also took out some 'deep storage'(?) from Wasabi for things which I need to keep, but not really access that much.Mail
Protonmail with custom domain. Using the ProtonMail app for mobile, and Linux ProtonMail bridge with Evolution mail for desktop.Pics/Vids
Nextcloud autoupload feature on mobile automatically uploads my pics to an 'autoupload' folder on Nextcloud server. Here, I categorise pics into folders and share what needs sharing before deleting anything I don't need and wiping the pics on my phone.Passwords
Nothing yet. Looking at getting KeyPass synced across devices.Bookmarks
Again, nothing yet. Had Firefox Sync running to connect Fennec and Firefox, but am looking for a more open approach which involves Nextcloud somehow, and allows me to tag and order things more effectively as opposed to dragging things around in the sidebar.Calendar/Contacts
Evolution calendar on desktop, simple calendar on mobile, hooked up to Nextcloud and all synced using davx5Programs and General Setup
Here, I'd like to somehow take an image/backup of my Ubuntu configs of importance and experiment with getting my setup and customisaitons replicated on another machine quickly and without taking up too much space in storage (i.e. don't need to bakckup all my files as they're already on cloud).Also, I am very curious as to whether anybody is using Syncthing across their devices? And if so, how are they finding the experience?
22 votes -
The stakes are too high for Apple to spin the iPhone exploits
6 votes -
"Satori" Internet-of-Things botnet operator Kenneth Currin Schuchman pleads guilty
5 votes -
Twitter CEO Jack Dorsey's account was compromised, sent public tweets and retweets including racial slurs
17 votes -
Kernel Panic - The world's first cyber crime: The Morris Worm
5 votes -
Mozilla takes action to protect users in Kazakhstan
26 votes -
Security researchers find several bugs in Nest security cameras
10 votes -
Yubico releases the first Lightning security key for iPhones
8 votes -
Absolute scale corrupts absolutely
5 votes -
Wirecutter has selected TunnelBear and Mullvad as the best current VPN services, and written extensively about how they made this decision
26 votes