[-] 0xD@infosec.pub 9 points 8 months ago

Fuuuuuuuuuuck Rockstar, sail the seas!

[-] 0xD@infosec.pub 9 points 8 months ago

That's really clever, you finally got me to dislodge this turd. Thank you!

[-] 0xD@infosec.pub 9 points 9 months ago

Just saying that running automated tools and identifying those vulnerabilities is just the first step to learning hacking, but nothing more. To gain a proper understanding you must be able to find vulnerabilities manually or at least understand a certain exploit such as ETERNALBLUE which you won't really look for manually.

[-] 0xD@infosec.pub 10 points 9 months ago

I'll be talking about digital signatures which is the basis for such things. I assume basic understanding of asymmetric cryptography and hashing.

Basically, you hash the content you want to verify with a secure hashing function and encrypt the value with your private key. You can now append this encrypted value to the content or just release it alongside it.

To now verify this content they can use your public key to decrypt your signature and get the original hash value, and compare it to their own. To get that, they just need to hash the content themselves with the same function.

So by signing their videos with the white house private key and publishing their public key somewhere, you can verify the video's authenticity like that.

For a proper understanding check out DSA :)

[-] 0xD@infosec.pub 9 points 9 months ago

Removing those draconic entry requirements would be a start.

[-] 0xD@infosec.pub 10 points 11 months ago

Lawful means "following a code", not "following the law".

[-] 0xD@infosec.pub 9 points 11 months ago

EUROPA EST MAXIME MOMENTI

[-] 0xD@infosec.pub 9 points 1 year ago

Not sure how much it fits online but I've never played a horror TTRPG and I'd love to try it! I like extreme stuff!

[-] 0xD@infosec.pub 9 points 1 year ago* (last edited 1 year ago)

Okay and now let's get into threat modelling and risk management.

What is the purpose of a password manager? What are the possible threats against them, and what are those against singular passwords for services? What is the risk of each of those?

[-] 0xD@infosec.pub 10 points 1 year ago

They keep trying to make money so they don't go under if/when Google pulls the plug on their easy money.

[-] 0xD@infosec.pub 10 points 1 year ago

Copyright for individuals is to be respected. But corporations? Fuck them.

view more: ‹ prev next ›

0xD

joined 1 year ago