buc.ci is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Admin email
abucci@bucci.onl
Admin account
@abucci@buc.ci

Search results for tag #cloud

AodeRelay boosted

[?]Brian Greenberg :verified: » 🌐
@brian_greenberg@infosec.exchange

Watching humanoid robots take the stage at the Lunar New Year celebration in China 🇨🇳 means a shift in our relationship with robots. You might think of robots as stiff tools confined to factories. Buckle up... These machines show a level of coordination that mirrors our own biology. 🤯 The speed of development is incredible. It took decades to teach a machine to walk. We are now seeing them dance and interact in front of millions of people. This transition means the gap between high-level computation and physical reality is disappearing.

🧠 Humanoid models now use neural networks for movement.
⚡ China plans to lead global production by 2026.
🎓 Performance art tests the limits of machine balance.
🔍 Industrial applications will follow these public displays.

reuters.com/business/media-tel

    AodeRelay boosted

    [?]Kevin Dominik Korte » 🌐
    @kdkorte@fosstodon.org

    You aren't in control of your "cloud" if you cannot exit.

    korte.co/0ocm

      [?]Karl Voit :emacs: :orgmode: » 🌐
      @publicvoit@graz.social

      -basierte bieten weniger Schutz als versprochen
      ethz.ch/de/news-und-veranstalt

      Forscher der ETH haben , und jeweils etliche Angriffe demonstriert.

      "Wir waren überrascht, wie gross die Sicherheitslücken sind" 🤣

      Leute, bitte schenkt eure geheimsten Daten doch niemals einen Cloud-Service-Anbieter! Egal welchem.

      Lest karl-voit.at/2023/03/05/Passwo und entscheidet klug.

      AodeRelay boosted

      [?]☮ ♥ ♬ 🧑‍💻 » 🌐
      @peterrenshaw@ioc.exchange

      “The data centres at the heart of the ai craze are built around graphics processing units ( s), the chips which power . But they also need cpus.

      , the leading maker of gpus, uses Arm designs for its cpus, as do giants such as and . Mr Haas argues that this is only the beginning.

      As workloads shift from to , where models respond to user queries, demand for efficient, general-purpose processors should rise. Much of that work, ’s boss expects, will spread beyond into , and , again favouring s.”

      <economist.com/business/2026/02> (paywall) /
      <archive.md/wrKvv>

        AodeRelay boosted

        [?]HackerWorkspace » 🌐
        @hackerworkspace@infosec.exchange

        UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

        thehackernews.com/2026/02/uat-

        -intelligence -security

          AodeRelay boosted

          [?]Taylor Parizo » 🌐
          @taylorparizo@infosec.exchange

          Hands on is the way to learn, so I built an email service with SES, setup IRC in EC2, used Pacu for recon/persistence and analyzed logs along the way in CloudTrail.

          blog.axelarator.net/learn-by-d

            AodeRelay boosted

            [?]Arapalla » 🌐
            @Arapalla@aus.social

            Before the sun got started this morning, the moon still had something to say.

            A pre dawn sky full of cloud shows soft reds and greys. The moon tries to show through the light cloud cover.

            Alt...A pre dawn sky full of cloud shows soft reds and greys. The moon tries to show through the light cloud cover.

              AodeRelay boosted

              [?]knoppix » 🌐
              @knoppix95@mastodon.social

              France launches "LaSuite," an open-source office suite for digital sovereignty, reducing reliance on foreign proprietary software. 🖥️
              Built on Matrix/TChap, LiveKit/Visio, Grist, and Drive—all MIT-licensed for any organization to deploy. 🇪🇺

              🔗 sinologic.net/en/2026-01/franc

                AodeRelay boosted

                [?]Brian Greenberg :verified: » 🌐
                @brian_greenberg@infosec.exchange

                💠 Holographic storage used to be the stuff of science fiction or expensive, failed experiments. We usually expect massive capacity at the cost of proprietary hardware that forces us to throw away everything we already built. HoloMem is taking a different path by making holographic tech work inside the tape libraries you already have in your data center. 😳 The move from magnetic tape to light-sensitive polymer ribbons is the core of this change. These cartridges look like standard LTO units but hold eleven times the data on a ribbon that is ten times shorter. Because the polymer is physically stable, you can turn off the air conditioning in your archive room and walk away for fifty years.

                🧠 The system uses a five-dollar laser diode to write data as volumetric voxels.
                ⚡ One 200TB cartridge replaces more than ten LTO-10 tapes.
                🎓 Software sees the HoloDrive as a standard LTO device for easy adoption.
                🔍 Field trials in UK data centers show the tech works with existing robotic arms.

                techtarget.com/searchstorage/n

                  AodeRelay boosted

                  [?]Brian Greenberg :verified: » 🌐
                  @brian_greenberg@infosec.exchange

                   Apple designed Lockdown Mode for people facing grave threats, but we're seeing it work in practice against federal forensics. During a recent investigation into a journalist, the FBI reported that it was unable to extract any data from an iPhone because the feature was enabled. It is rare for a software setting to hold its own against professional, state-level tools. 🔒 The strength of this mode comes from how it drastically reduces the attack surface of the device. By disabling just-in-time JavaScript and blocking most message attachments, it removes the entry points that forensic tools like GrayKey typically exploit. It also forces the device into a state in which biometrics are disabled, requiring a passcode that often carries stronger legal protections during a search.

                  🧠 Lockdown Mode specifically blocks wired data connections used by extraction hardware.
                  ⚡ The FBI confirmed in court filings that its Computer Analysis Response Team was blocked.
                  🎓 Using this mode requires giving up features like shared photo albums and link previews.
                  🔍 Apple offers a $2 million bounty for anyone who can bypass these specific protections.

                  appleinsider.com/articles/26/0

                    AodeRelay boosted

                    [?]Brian Greenberg :verified: » 🌐
                    @brian_greenberg@infosec.exchange

                    The tech world is currently with OpenClaw, the open-source agent that finally gives AI hands. It can browse the web, execute terminal commands, and manage your emails. While offering a glimpse into a future of total automation, it's also become a textbook example of a security nightmare. The very features that make it useful—system access and persistent memory—are exactly what make it dangerous. 😱 The problem lies in the collapse of traditional security boundaries. OpenClaw operates as you, bypassing the sandboxing that usually protects your operating system from the browser. Because it can reason over and act on external content, a simple malicious email or a poisoned webpage can quietly steer the agent to exfiltrate your data or run harmful scripts. We are seeing thousands of instances exposed to the open internet with little to no authentication. ☠️

                    🧠 OpenClaw binds to all network interfaces by default, making it visible to the public internet.
                    ⚡ Malicious skills in the community marketplace have been caught installing info-stealing malware.
                    🎓 Indirect prompt injection allows attackers to hijack the agent via the data it processes.
                    🔍 Security researchers have already identified critical RCE vulnerabilities with high CVSS scores.

                    fastcompany.com/91485326/openc

                      AodeRelay boosted

                      [?]Brian Greenberg :verified: » 🌐
                      @brian_greenberg@infosec.exchange

                      🇫🇷 The French government is sending a message about digital independence by ditching Microsoft Teams and Zoom for its own platform, Visio. This move is not about a lack of features but a calculated push for digital sovereignty. By 2027, every government department in France will communicate via this sovereign stack, ensuring that sensitive data remains subject to European law. The shift addresses a growing concern that relying on foreign cloud giants creates a strategic vulnerability. France is opting for an open-source architecture built on Django and React, hosted on the domestic Outscale cloud. This infrastructure removes the risk of external service disruptions while fostering a local tech ecosystem.

                      🧠 The Visio platform integrates with Tchap, a secure messaging app based on the Matrix protocol.
                      ⚡ French startup Pyannote provides the AI backbone for meeting transcripts and speaker identification.
                      🎓 The administration expects to save millions in annual licensing fees by using in-house software.
                      🔍 Data remains strictly within French jurisdiction to bypass foreign data access laws.

                      itsfoss.com/news/france-ditche

                        AodeRelay boosted

                        [?]Brian Greenberg :verified: » 🌐
                        @brian_greenberg@infosec.exchange

                        We spend billions on firewalls and zero-trust architecture, only to be undone by a copy-paste command by someone who should know better. The U.S. cyber defense chief "accidentally" feeding classified intelligence to an unsecured version of ChatGPT is the ultimate reminder that the greatest vulnerability in any system is the person using it. Technology is outpacing our muscle memory. When a tool feels like a helpful colleague, we treat it like one—forgetting that LLMs are basically giant, permanent digital sponges. If the person in charge of the nation's digital shield can trip over the AI threshold, your team probably is too.

                        🧠 Convenience is the enemy of confidentiality
                        ⚡ Your data is the product, even in a chat box
                        🎓 Policy without automated guardrails is just a wish
                        🔍 The UI is designed to make you forget the risks

                        arstechnica.com/tech-policy/20

                          AodeRelay boosted

                          [?]Herbert Hertramph » 🌐
                          @_DigitalWriter_@bildung.social

                          Zum Thema "ownCloud Infinite Scale" habe ich auf @gnulinux einen Artikel geschrieben:

                          gnulinux.ch/owncloud-infinite-

                            AodeRelay boosted

                            [?]Brian Greenberg :verified: » 🌐
                            @brian_greenberg@infosec.exchange

                            We aren’t just fighting basic threats anymore; we’re up against algorithms that exploit our own behavior before we even realize we’ve been targeted. In cybersecurity, we've shifted from defending perimeters to defending identities in a world where seeing—and hearing—is no longer believing.

                            I recently spoke with InformationWeek about the escalating threat of AI-based attacks. From agentic AI to deepfakes, the gap between platform vulnerabilities is where the real danger lives. My take? If your security team is still relying on manual processes to fight automated attackers, you’re bringing a knife to a railgun fight. We’re doubling down on zero-trust and out-of-band authentication to ensure the person on the other end of the "urgent" request is who they claim to be.

                            🧠 Deepfakes are becoming extraordinarily dangerous and difficult to guard against.
                            ⚡ Automated detection is no longer optional—it is the only way to keep pace with attacker speed.
                            🔍 Out-of-band authentication (OOBA) is critical for verifying identities through separate channels.
                            🎓 Closing the "natural gaps" between platforms is the primary goal of modern zero-trust.

                            informationweek.com/cybersecur

                            @InformationWeek@flipboard.com @informationweek-InformationWeek @informationweek@bird.makeup

                              AodeRelay boosted

                              [?]hbrpgm » 🌐
                              @hbrpgm@adalta.social

                              📺 peer.adalta.social/w/bDQg3TwLT
                              🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_LIV0PU1G/1)

                              Un commentaire sur les réseaux sociaux concernant l'exposition de Zak Pullen révèle une tension culturelle profonde entre conformisme et singularité artistique.

                                AodeRelay boosted

                                [?]hbrpgm » 🌐
                                @hbrpgm@adalta.social

                                📺 peer.adalta.social/w/maALFXSgB
                                🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_LIV0PU1G/1)

                                A social media critique of Zak Pullen's exhibition reveals a cultural tension between conformity and artistic will.

                                  AodeRelay boosted

                                  [?]hbrpgm » 🌐
                                  @hbrpgm@adalta.social

                                  📺 peer.adalta.social/w/enfEhGQQP
                                  🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_LIV0PU1G/1)

                                  Ein sozialer Medien-Kommentar zu Zak Pullens Ausstellung offenbart eine tiefere kulturelle Spannung zwischen Konformität und Eigenwillen.

                                    AodeRelay boosted

                                    [?]hbrpgm » 🌐
                                    @hbrpgm@adalta.social

                                    📺 peer.adalta.social/w/8ZL5E1qF6
                                    🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_OZQHSVYX/1)

                                    Un cheval rétif dans l'œuvre de Zak Pullen devient un symbole culturel et politique inattendu.

                                      AodeRelay boosted

                                      [?]hbrpgm » 🌐
                                      @hbrpgm@adalta.social

                                      📺 peer.adalta.social/w/xAujxmAh5
                                      🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_OZQHSVYX/1)

                                      A personal reflection on Zak Pullen's exhibition reveals a quiet cultural tension between admiration for untamed subjects and social conformity.

                                        AodeRelay boosted

                                        [?]hbrpgm » 🌐
                                        @hbrpgm@adalta.social

                                        📺 peer.adalta.social/w/jKPtxq6hA
                                        🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_OZQHSVYX/1)

                                        Ein sozialer Medien-Kommentar zu Zak Pullens Ausstellung offenbart eine tiefere kulturelle Spannung zwischen Konformität und Eigenwillen.

                                          AodeRelay boosted

                                          [?]Kevin Karhan :verified: » 🌐
                                          @kkarhan@infosec.space

                                          @goebelmasse +9001%

                                          Es gibt keine , nur von !

                                            AodeRelay boosted

                                            [?]hbrpgm » 🌐
                                            @hbrks@mastodon.social

                                            - Kritische Sicherheitsaktualisierung 5.0.2
                                            Ein dringendes Update schließt eine schwerwiegende Schwachstelle in öffentlichen Links und unterstreicht die fortlaufenden Sicherheitsherausforderungen in der Open-Source-.

                                            🔗 p4u.xyz/ID_LQ1SR_LU/1 (🇩🇪🇺🇸🇫🇷)

                                              AodeRelay boosted

                                              [?]HackerWorkspace » 🌐
                                              @hackerworkspace@infosec.exchange

                                              Interview with a ‘Just use a VPS’ bro (OpenClaw version)

                                              youtube.com/watch?v=40SnEd1RWUU

                                              -security

                                                AodeRelay boosted

                                                [?]hbrpgm » 🌐
                                                @hbrpgm@adalta.social

                                                📺 peer.adalta.social/w/tuYBhErBw
                                                🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_JWNKFUBW/1)

                                                Une faille de sécurité majeure force une mise à jour obligatoire et immédiate pour tous les déploiements.

                                                  AodeRelay boosted

                                                  [?]hbrpgm » 🌐
                                                  @hbrpgm@adalta.social

                                                  📺 peer.adalta.social/w/uQWVWJZTc
                                                  🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_LQ1SR_LU/1)

                                                  Une vulnérabilité majeure dans les liens publics nécessite une mise à jour immédiate des déploiements.

                                                    AodeRelay boosted

                                                    [?]hbrpgm » 🌐
                                                    @hbrpgm@adalta.social

                                                    📺 peer.adalta.social/w/58nJmg5Jf
                                                    🔗 [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_LQ1SR_LU/1)

                                                    A critical vulnerability in public links prompts an immediate, mandatory update for all OpenCloud deployments.

                                                      AodeRelay boosted

                                                      [?]HackerWorkspace » 🌐
                                                      @hackerworkspace@infosec.exchange

                                                      A Code Editor That Actually Scales

                                                      youtube.com/watch?v=kCWwrx51IS4

                                                      -security -security

                                                        0 ★ 1 ↺

                                                        [?]Anthony » 🌐
                                                        @abucci@buc.ci

                                                        "Cloud" is an appropriate metaphor for that kind of computing. From a distance it can appear solid. Up close, it's a fog, with nothing clear and with none of the apparent solidity visible.


                                                          AodeRelay boosted

                                                          [?]gadgetChecks.de » 🤖 🌐
                                                          @gadgetchecks@burningboard.net

                                                          AodeRelay boosted

                                                          [?]Kevin Karhan :verified: » 🌐
                                                          @kkarhan@infosec.space

                                                          @Gerbsen @Lilith das ganze "" - Businessmodel ist für'n Arsch.

                                                          gruene.social/@Gerbsen/1160089

                                                            AodeRelay boosted

                                                            [?]knoppix » 🌐
                                                            @knoppix95@mastodon.social

                                                            France mandates open source "Visio" across government by 2027, replacing Teams, Zoom, and non-EU videoconferencing tools 🖥️
                                                            MIT-licensed app runs on French infrastructure for full data sovereignty and security control 🔒
                                                            Emphasizes user freedom while challenging Big Tech 💻

                                                            🔗 itsfoss.com/news/france-ditche

                                                              AodeRelay boosted

                                                              [?]Baikal » 🌐
                                                              @Baikal@infosec.exchange

                                                              Old wordle solve with guesses; CLOUD, DOING, DETOX

                                                              Alt...Old wordle solve with guesses; CLOUD, DOING, DETOX

                                                                AodeRelay boosted

                                                                [?]Brian Greenberg :verified: » 🌐
                                                                @brian_greenberg@infosec.exchange

                                                                They say Chicago is the city of broad shoulders, but after yesterday’s FutureCon, I’d argue it’s the city of sharp minds. Despite the January chill, the energy was electric. It’s rare to have this many practitioners in one room who are equally committed to dismantling silos and building sturdier fortresses. The most sophisticated firewall in the world is useless without the human intelligence behind it. Yesterday wasn’t just about the tech stack; it was about the collective wisdom of a community that refuses to be outpaced by the threat landscape. If you missed it, you missed the blueprint for the year ahead.

                                                                🧠 Elite speaker insights on the shifting threat horizon
                                                                ⚡ Real-time collaboration between C-suite and practitioners
                                                                🎓 Tactical takeaways for the 2026 security roadmap
                                                                🔍 Strengthening the local Chicago tech ecosystem

                                                                futureconevents.com/events/chi

                                                                  AodeRelay boosted

                                                                  [?]gadgetChecks.de » 🤖 🌐
                                                                  @gadgetchecks@burningboard.net

                                                                  AodeRelay boosted

                                                                  [?]Pandolin » 🌐
                                                                  @pandolin@fosstodon.org

                                                                  „Kunden wollen keine Baukästen“, sagt John (Big Tech). „Kunden wollen keine goldenen Käfige“, sagt Katrin (Hoster).

                                                                  Ein Dialog über zwei unvereinbare IT-Weltbilder bei schlechtem Konferenz-Kaffee. Es geht um Lock-in, Bequemlichkeit, die bittere Wahrheit, dass wir 80% der Wertschöpfung als Lizenzgebühren exportieren.

                                                                  Wem gehört eure Infrastruktur wirklich?

                                                                  ☕️ Zum Protokoll: pandolin.io/2-kaffees-2-welten

                                                                  Eine Illustration einer Kaffeepause auf einem geschäftigen IT-Event. Links sitzt eine Frau im Business-Anzug (Katrin), rechts ein Mann im blauen Hemd mit Microsoft-Logo (John). In der Mitte sitzt der Pandolin (ein Schuppentier) mit einer dampfenden Tasse in den Händen und hört der Diskussion der beiden zu.

                                                                  Alt...Eine Illustration einer Kaffeepause auf einem geschäftigen IT-Event. Links sitzt eine Frau im Business-Anzug (Katrin), rechts ein Mann im blauen Hemd mit Microsoft-Logo (John). In der Mitte sitzt der Pandolin (ein Schuppentier) mit einer dampfenden Tasse in den Händen und hört der Diskussion der beiden zu.

                                                                  AodeRelay boosted

                                                                  [?]hbrpgm » 🌐
                                                                  @hbrpgm@adalta.social

                                                                  📺 peer.adalta.social/w/6scFoCWHF
                                                                  [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_IBALMXOL/1)

                                                                  Geopolitical sanctions and cloud dependency render consumer IoT devices inoperable, creating a stark case study in supply chain and cybersecurity risk.

                                                                    AodeRelay boosted

                                                                    [?]hbrpgm » 🌐
                                                                    @hbrpgm@adalta.social

                                                                    📺 peer.adalta.social/w/wbg2NQrv1 peer.adalta.social/w/wbg2NQrv1
                                                                    [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_W9U1WBWJ/1)

                                                                    Smart home devices in Russia are failing due to geopolitical software dependencies, transforming cloud services into operational choke points.

                                                                      AodeRelay boosted

                                                                      [?]hbrpgm » 🌐
                                                                      @hbrpgm@adalta.social

                                                                      📺 peer.adalta.social/w/dQ37fJ7Tm
                                                                      [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_63OFUPK3/1)

                                                                      Smart home devices in Russia are failing due to geopolitical disruption of cloud-dependent firmware and identity services, transforming software into a hard border.

                                                                        AodeRelay boosted

                                                                        [?]hbrpgm » 🌐
                                                                        @hbrpgm@adalta.social

                                                                        📺 peer.adalta.social/w/gU25zAUA4
                                                                        [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_IBALMXOL/1)

                                                                        La dépendance au cloud et les sanctions géopolitiques provoquent une obsolescence forcée massive.

                                                                          AodeRelay boosted

                                                                          [?]hbrpgm » 🌐
                                                                          @hbrpgm@adalta.social

                                                                          📺 peer.adalta.social/w/qvY7Enr5Y peer.adalta.social/w/qvY7Enr5Y
                                                                          [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_W9U1WBWJ/1)

                                                                          La dépendance logicielle au cloud transforme les appareils connectés en otages géopolitiques, privant les utilisateurs russes du contrôle de leurs propres équipements.

                                                                            AodeRelay boosted

                                                                            [?]hbrpgm » 🌐
                                                                            @hbrpgm@adalta.social

                                                                            📺 peer.adalta.social/w/tnSu3iLXd
                                                                            [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_63OFUPK3/1)

                                                                            La dépendance logicielle au cloud devient un point de rupture géopolitique pour les objets connectés en Russie.

                                                                              AodeRelay boosted

                                                                              [?]hbrpgm » 🌐
                                                                              @hbrpgm@adalta.social

                                                                              📺 peer.adalta.social/w/iXtsaGCb5
                                                                              [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_IBALMXOL/1)

                                                                              Geopolitische Sanktionen und Cloud-Abhängigkeit führen zum Funktionsverlust von Konsumelektronik.

                                                                                AodeRelay boosted

                                                                                [?]hbrpgm » 🌐
                                                                                @hbrpgm@adalta.social

                                                                                📺 peer.adalta.social/w/spBJczF51 peer.adalta.social/w/spBJczF51
                                                                                [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_W9U1WBWJ/1)

                                                                                Russische Smart-Home-Geräte werden durch Cloud-Abhängigkeit und geopolitische Sanktionen zu funktionslosen Objekten

                                                                                  AodeRelay boosted

                                                                                  [?]hbrpgm » 🌐
                                                                                  @hbrpgm@adalta.social

                                                                                  📺 peer.adalta.social/w/qEYhbzhsi
                                                                                  [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_63OFUPK3/1)

                                                                                  Russische Smart-Home-Geräte werden durch Cloud-Abhängigkeit und geopolitische Sanktionen zu teuren Ziegeln

                                                                                    AodeRelay boosted

                                                                                    [?]hbrpgm » 🌐
                                                                                    @hbrpgm@adalta.social

                                                                                    📺 peer.adalta.social/w/uTXt8BczS peer.adalta.social/w/uTXt8BczS
                                                                                    [🇩🇪🇺🇸🇫🇷](p4u.xyz/ID_T2N81M54/1)

                                                                                    Ein praktischer Leitfaden zeigt, wie fünf Docker-Container eine komplette Produktivitäts-Stack ersetzen und volle Datenhoheit zurückgeben.

                                                                                      AodeRelay boosted

                                                                                      [?]Brian Greenberg :verified: » 🌐
                                                                                      @brian_greenberg@infosec.exchange

                                                                                      We have spent a decade chasing "frictionless" user experiences, but we forgot that friction is what gives us pause when we need it. New research shows that millions of users are at risk from SMS sign-in links designed to make their lives easier. It turns out, when you send a "magic link" via an unencrypted, legacy protocol like SMS, you aren’t just inviting the user in—you’re inviting anyone who can guess a simple URL string.

                                                                                      The arrogance of modern implementation is breathtaking. We are seeing services that use low-entropy tokens (easily guessed by incrementing a number) and links that never expire. This isn't just a technical glitch; it's a fundamental design failure. We’ve treated the phone number as a digital soul-tether, failing to realize that SMS is effectively a postcard sent through a crowd. If the link is the credential and public, the account is no longer yours.

                                                                                      🧠 Vulnerable tokens: Many services use predictable URL patterns that attackers can brute-force in minutes.
                                                                                      ⚡ Eternal sessions: Authentication links frequently fail to expire, leaving personal data exposed for years.
                                                                                      🎓 Massive scale: Over 700 endpoints across 177 services were found leaking sensitive financial and identity data.
                                                                                      🔍 False security: "Possession" of a link is being treated as "identity," bypassing the need for actual passwords.

                                                                                      arstechnica.com/security/2026/

                                                                                        AodeRelay boosted

                                                                                        [?]Brian Greenberg :verified: » 🌐
                                                                                        @brian_greenberg@infosec.exchange

                                                                                        🇺🇸 America is hurtling toward an AI regulatory "Splinternet," and it isn't coming from overseas; it’s coming from within. As the federal government remains paralyzed by partisan gridlock on nearly every issue, individual states are rushing to fill the vacuum with their own AI mandates. We are witnessing the birth of a legislative patchwork that threatens to turn the American tech landscape into a navigational nightmare for startups and tech giants alike.

                                                                                        It is a fundamental disagreement over who gets to hold the leash on the most transformative technology of our century. When California, Texas, and New York each define "algorithmic bias" or "high-risk models" differently, compliance becomes an impossible burden on progress.

                                                                                        🧠 Regulatory Vacuum: Congressional inaction has forced states to create a chaotic patchwork of conflicting AI laws.
                                                                                        ⚡ The Compliance Burden: Smaller AI firms face an existential threat as they struggle to navigate 50 different sets of rules.
                                                                                        🎓 Ideological Divide: The battle lines are drawn between "accelerationists" and "protectionists," with no middle ground in sight.
                                                                                        🔍 Global Stature: This internal friction risks slowing U.S. development while international rivals move toward unified standards.

                                                                                        technologyreview.com/2026/01/2

                                                                                          [?]iBestuur » 🌐
                                                                                          @ibestuur@mastodon.nl

                                                                                          Minister van SZW, Mariëlle Paul, stelt Tweede Kamer gerust: SVB Sociale Verzekeringsbank stapt niet over naar Microsoft Azure en de kritische processen van SVB zitten niet in publieke cloudomgeving.

                                                                                          @barbarakathmann

                                                                                          Lees het artikel:
                                                                                          ibestuur.nl/markt-en-overheid/

                                                                                            AodeRelay boosted

                                                                                            [?]knoppix » 🌐
                                                                                            @knoppix95@mastodon.social

                                                                                            Bitwarden upgrades its Premium & Families plans with new tools for proactive security 🛡️
                                                                                            Vault health alerts flag weak or exposed passwords 🔍
                                                                                            Password coaching & more 2FA key options enhance protection 🔑

                                                                                            Prices rise slightly, but free plan remains unchanged 🌐

                                                                                            @bitwarden

                                                                                            🔗 bitwarden.com/blog/bitwarden-l

                                                                                              AodeRelay boosted

                                                                                              [?]HackerWorkspace » 🌐
                                                                                              @hackerworkspace@infosec.exchange

                                                                                              AodeRelay boosted

                                                                                              [?]Tino Eberl » 🌐
                                                                                              @tinoeberl@mastodon.online

                                                                                              ‼️ Wer Windows 11 mit einem Online--Konto nutzt, speichert seine -Schlüssel automatisch in der .

                                                                                              Diese können bei einem rechtlichen Ersuchen an das weitergegeben werden, wie nun bestätigt hat. Eine lokale Speicherung ist möglich, aber nicht voreingestellt. Die Schlüssel liegen unverschlüsselt vor, was ein erhebliches und darstellt.

                                                                                              windowscentral.com/microsoft/w

                                                                                                AodeRelay boosted

                                                                                                [?]Brian Greenberg :verified: » 🌐
                                                                                                @brian_greenberg@infosec.exchange

                                                                                                We’ve spent the last few years treating AI like a science fair project—lots of cool pilots, very few polished products. But as we hit 2026, the mandate has shifted from "can we do this?" to "how does this actually work with everything else?"

                                                                                                I recently sat down with Kelsey Ziser at InformationWeek to discuss the latest industry obsession: embedded hardware AI. While the industry is racing to put an AI chip in every laptop, I’m still looking for the "why." For most of us, the browser is the office. Adding hardware-level complexity shouldn't be the default unless it solves a problem that the cloud can't.

                                                                                                🧠 2026 is the year of the 'Chief Integration Officer.'
                                                                                                ⚡ Hardware AI must prove its worth against browser-based LLMs.
                                                                                                🎓 Governance and interoperability remain the biggest hurdles.
                                                                                                🔍 Stop chasing "ambient" novelty; start chasing scalable value.

                                                                                                informationweek.com/ai-innovat
                                                                                                @InformationWeek@flipboard.com @informationweek-InformationWeek @informationweek@bird.makeup

                                                                                                  AodeRelay boosted

                                                                                                  [?]Erik Jonker » 🌐
                                                                                                  @ErikJonker@mastodon.social

                                                                                                  [?]Frankie ✅ » 🌐
                                                                                                  @Some_Emo_Chick@mastodon.social

                                                                                                  AodeRelay boosted

                                                                                                  [?]Edge » 🌐
                                                                                                  @czarbucks@vmst.io

                                                                                                  Before the storm came in yesterday afternoon, I saw this formation, which looked really strange to me, like the entire sky had been folded.

                                                                                                  Never seen anything quite like it.

                                                                                                  A grey, leaden sky is completely covered by clouds.  The photo is looking up, with various bare trees visible on the bottom and lower right.

Running in an almost straight line from upper right to lower left is a line in the clouds, looking greatly like a wave coming in to the shore.  The clouds to the left of the line are slightly darker than those on the right.  Perhaps the warm air coming in over the cold below?  This is the setup for our currently-falling frozen rain, anyway.

Found it strange.

                                                                                                  Alt...A grey, leaden sky is completely covered by clouds. The photo is looking up, with various bare trees visible on the bottom and lower right. Running in an almost straight line from upper right to lower left is a line in the clouds, looking greatly like a wave coming in to the shore. The clouds to the left of the line are slightly darker than those on the right. Perhaps the warm air coming in over the cold below? This is the setup for our currently-falling frozen rain, anyway. Found it strange.

                                                                                                    [?]Nils Wilcke » 🌐
                                                                                                    @paul_denton@mastodon.social

                                                                                                    Le gouvernement va déployer une application française baptisée "Visio" (quelle originalité!) pour remplacer les autres logiciels utilisés pour les échanges entre agents de l'Etat face à la menace américaine et chinoise, annonce David Amiel, le ministre de la Fonction public. "Nous devons sortir de la dépendance aux outils américains et plus globalement non européens", ajoute le ministre dans La Tribune du dimanche. ll n'est jamais trop tard...

                                                                                                      AodeRelay boosted

                                                                                                      [?]𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕 » 🌐
                                                                                                      @kubikpixel@chaos.social

                                                                                                      »Microsoft confirms it will give the FBI your Windows PC data encryption if asked—you can thank Windows 11's forced online accounts for that:
                                                                                                      11's online Microsoft Account requirement means your is automatically backing up its data key to the , and says it will hand those over to the if requested via legal order«

                                                                                                      Which companies have no to hide and are then amazed that they have been/are being "hacked"?!

                                                                                                      👉 windowscentral.com/microsoft/w

                                                                                                        AodeRelay boosted

                                                                                                        [?]Pandolin » 🌐
                                                                                                        @pandolin@fosstodon.org

                                                                                                        Europa wacht auf. Mit Kopfschmerzen und der Erkenntnis, dass unser digitaler Boden längst parzelliert wurde.

                                                                                                        Während wir über Radwege in Peru debattieren, versinkt unsere Verwaltung im 0,5%-Open-Source-Sumpf. Wer kontrolliert die Spielregeln? Spoiler: Es ist nicht Brüssel.

                                                                                                        Mein neuer Artikel zum schleichenden Ausverkauf unserer digitalen Freiheit:

                                                                                                        pandolin.io/digitale-souveraen

                                                                                                        Eine detaillierte, farbige Illustration im Stil einer historischen Landkarte. Ein Mann, der Donald Trump ähnelt, trägt eine Safari-Uniform und einen Tropenhelm mit US-Flagge und steht triumphierend über einer Landschaft. Diese ist in eingezäunte Bereiche unterteilt, in denen kleine Figuren arbeiten. Die Claims sind mit US-Flaggen markiert und tragen Schilder mit den Aufschriften „CLOUD“, „AI“, „IDENTITY“, „EMAIL“ und „SEARCH“. Im linken Vordergrund steht ein großes, braunes Schuppentier (Pangolin) mit entschlossenem Gesichtsausdruck und ballt eine Faust in Richtung des Mannes. Im Hintergrund nähert sich ein koloniales Segelschiff mit US-Flaggen der Küste.

                                                                                                        Alt...Eine detaillierte, farbige Illustration im Stil einer historischen Landkarte. Ein Mann, der Donald Trump ähnelt, trägt eine Safari-Uniform und einen Tropenhelm mit US-Flagge und steht triumphierend über einer Landschaft. Diese ist in eingezäunte Bereiche unterteilt, in denen kleine Figuren arbeiten. Die Claims sind mit US-Flaggen markiert und tragen Schilder mit den Aufschriften „CLOUD“, „AI“, „IDENTITY“, „EMAIL“ und „SEARCH“. Im linken Vordergrund steht ein großes, braunes Schuppentier (Pangolin) mit entschlossenem Gesichtsausdruck und ballt eine Faust in Richtung des Mannes. Im Hintergrund nähert sich ein koloniales Segelschiff mit US-Flaggen der Küste.

                                                                                                        AodeRelay boosted

                                                                                                        [?]PrivacyDigest » 🌐
                                                                                                        @PrivacyDigest@mas.to

                                                                                                        Calls For Detachment From US Tech Giants

                                                                                                        The is calling on the to reduce dependence on U.S. tech giants by prioritizing EU-based , , and open-source . The report frames " Tech First," public procurement reform, and Public Money, Public Code as necessary self-defense against growing U.S. control over critical digital infrastructure.

                                                                                                        slashdot.org/story/26/01/22/22

                                                                                                          [?]Chris Alemany🇺🇦🇨🇦🇪🇸 » 🌐
                                                                                                          @chris@mstdn.chrisalemany.ca

                                                                                                          RE: flipboard.com/@techcrunch/late

                                                                                                          It’s sure great that my own workplace relies on this gigantic corporation for mission critical stuff. I am not worried about it blowing up in our face at aaallll....

                                                                                                            AodeRelay boosted

                                                                                                            [?]meriksson » 🌐
                                                                                                            @meriksson@swecyb.com

                                                                                                            A picture of a tweet saying "Maybe AWS keeps going down because they run all their stuff on prem"

                                                                                                            Alt...A picture of a tweet saying "Maybe AWS keeps going down because they run all their stuff on prem"

                                                                                                              AodeRelay boosted

                                                                                                              [?]Prof. Dr. Dennis-Kenji Kipker » 🌐
                                                                                                              @kenji@chaos.social

                                                                                                              Anforderungen an die Security in der : Das hat einen neuen Leitfaden veröffentlicht, der den sicheren Einsatz von Cloudlösungen für (VS) in der Bundesverwaltung regelt.

                                                                                                              Der Leitfaden ist zwar hersteller- bzw. anbieteroffen formuliert, ein zentraler Anknüpfungspunkt ist aber dennoch die Frage, ob ein Vertrauen zum CSP dahingehend besteht, dass er weder aus eigenem Antrieb noch durch Dritte erzwungen auf VS-Daten zugreift:

                                                                                                              bsi.bund.de/SharedDocs/Downloa

                                                                                                                AodeRelay boosted

                                                                                                                [?]gadgetChecks.de » 🤖 🌐
                                                                                                                @gadgetchecks@burningboard.net

                                                                                                                AodeRelay boosted

                                                                                                                [?]Brian Greenberg :verified: » 🌐
                                                                                                                @brian_greenberg@infosec.exchange

                                                                                                                Cybersecurity strategy is maturing, and CIOs & CISOs are being forced to mature with it.

                                                                                                                Today I participated in SecurityWeek’s CISO Forum 2026 Outlook: Proactive Resilience, a strong discussion on moving security programs from reactive defense to intentional, business-aligned resilience.

                                                                                                                What stood out for me:
                                                                                                                🔐 Security must be explicitly tied to business outcomes — not just risk reduction
                                                                                                                📊 Threat intelligence and attack surface management need to work together, not in silos
                                                                                                                ⚖️ Regulation and geopolitics are now first-order design constraints, not afterthoughts
                                                                                                                🤖 AI helps — but only when paired with sound governance and judgment

                                                                                                                Refreshing to hear CISOs and practitioners speak candidly about what actually works versus what just demos well. Kudos to SecurityWeek for convening a thoughtful, practitioner-driven conversation.


                                                                                                                securityweek.com/

                                                                                                                  AodeRelay boosted

                                                                                                                  [?]Knowledge Zone » 🌐
                                                                                                                  @kzoneind@mstdn.social

                                                                                                                  : A is a computing environment that combines a public cloud (like AWS, Azure, or Google Cloud) with a private cloud (on-premises infrastructure or a private hosted environment).

                                                                                                                  Organizations choose to adopt hybrid cloud platforms to reduce costs, minimize risk, and extend their existing capabilities to support digital transformation efforts.

                                                                                                                  knowledgezone.co.in/posts/Hybr

                                                                                                                    AodeRelay boosted

                                                                                                                    [?]Kuketz-Blog 🛡 » 🌐
                                                                                                                    @kuketzblog@social.tchncs.de

                                                                                                                    Letzter Teil der Artikelserie. 📢

                                                                                                                    Nextcloud sicher nutzen: Cryptomator-Tresor einrichten, lokal verschlüsseln und per Desktop-Client sowie mobil via WebDAV synchronisieren. 👇

                                                                                                                    kuketz-blog.de/sensible-daten-

                                                                                                                      AodeRelay boosted

                                                                                                                      [?]KeSe » 🌐
                                                                                                                      @KeSeDon@burningboard.net

                                                                                                                      und USA ade! Seit jetzt zwei Monaten auf mit eigener , und ich muss sagen, ich bin begeistert. Man merkt so extrem, dass die Linux-basierten Betriebssysteme einfach von Usern für User sind. Alles, was mir in 25 Jahren Microsoft auf den Sack ging, ist bei Mint einfach besser oder konfigurierbar. Ich trauere so sehr, dass es Linux Mint nicht schon vor 20 Jahren gab, als ich 15 war. Dann wäre ich nach den zwei Monaten schon Profi, weil ich noch die Zeit gehabt hätte, täglich zehn Stunden zu suchten 😂
                                                                                                                      Ich möchte gern so viele Menschen wie##@ möglich bekehren!

                                                                                                                      geht es als nächstes an den kragen!

                                                                                                                        AodeRelay boosted

                                                                                                                        [?]Johannes » 🌐
                                                                                                                        @jom@social.kontrollapparat.de

                                                                                                                        Könnt ihr euch an die letzte Werbekampagne des @bsi für IONOS, @hetzner oder @ubernauten erinnern? Oder für andere Firmen, die auch relevant Steuern in Deutschland zahlen? Ich mich auch nicht. Ist das schon Revolving door Prinzip? social.bund.de/@bsi/1159006343

                                                                                                                          AodeRelay boosted

                                                                                                                          [?]Brian Greenberg :verified: » 🌐
                                                                                                                          @brian_greenberg@infosec.exchange

                                                                                                                          We expect our smartphones to work 24/7 without a break. But Apple’s latest warning suggests that "uptime" is a vulnerability, not a virtue. PLUS you should be updating your phones frequently so you get the latest security patches. Mercenary spyware has been detected in the wild, and it thrives in the volatile memory of devices that never sleep. The solution isn't just a patch; it's also simple reboot. Turning your phone off and on again isn't just a meme from The IT Crowd anymore—it's basic digital hygiene. And update all your devices‼️

                                                                                                                          TL;DR
                                                                                                                          🧠 Mercenary spyware is targeting iOS memory (RAM).
                                                                                                                          ⚡ A restart clears volatile memory, disrupting the attack chain.
                                                                                                                          🎓 "Inactivity reboots" are good, but a manual restart is better.
                                                                                                                          🔍 Zero-click attacks often fail if the device is freshly booted.

                                                                                                                          forbes.com/sites/zakdoffman/20

                                                                                                                            AodeRelay boosted

                                                                                                                            [?]Bob 🇨🇦🇲🇽🇺🇦 » 🌐
                                                                                                                            @bielsubob@infosec.exchange

                                                                                                                            A simple CodeBuild flaw put every AWS environment at risk – and pwned 'the central nervous system of the cloud'

                                                                                                                            theregister.com/2026/01/15/cod

                                                                                                                              [?]Annie » 🌐
                                                                                                                              @theappletree@ruhr.social

                                                                                                                              AodeRelay boosted

                                                                                                                              [?]Pete Orrall » 🌐
                                                                                                                              @peteorrall@mastodon.bsd.cafe

                                                                                                                              Oh...this is just nasty.

                                                                                                                              New is making its way around the . Dubbed , it targets environments and then vanishes. It targets , , , and a host of others.

                                                                                                                              Less of a tool and more of a platform with various plugins, VoidLink can do reconnaissance, credential theft, and abuse containers. Additionally it *also* detects tampering and malware analysis tools. It can delete itself and remove traces of its activity.

                                                                                                                              As if the 'net isn't dangerous enough.

                                                                                                                              theregister.com/2026/01/14/voi

                                                                                                                                AodeRelay boosted

                                                                                                                                [?]gadgetChecks.de » 🤖 🌐
                                                                                                                                @gadgetchecks@burningboard.net

                                                                                                                                AodeRelay boosted

                                                                                                                                [?]Brian Greenberg :verified: » 🌐
                                                                                                                                @brian_greenberg@infosec.exchange

                                                                                                                                We often assume surveillance requires a judge's signature, but that is quickly becoming a quaint, analog concept. In the modern era, why bother with a warrant when you can simply purchase the data? ICE's new tools don't just look for a needle in a haystack; they buy the whole haystack and watch where the straw moves. By leveraging commercial data, agencies can now monitor entire neighborhoods and track daily commutes without ever stepping into a courtroom.

                                                                                                                                TL;DR
                                                                                                                                🧠 Monitors entire city blocks simultaneously
                                                                                                                                ⚡ Tracks movement patterns from work to home
                                                                                                                                🎓 Bypasses warrants using commercial data
                                                                                                                                🔍 Acquired via Penlink for mass tracking

                                                                                                                                404media.co/inside-ices-tool-t

                                                                                                                                  AodeRelay boosted

                                                                                                                                  [?]Brian Greenberg :verified: » 🌐
                                                                                                                                  @brian_greenberg@infosec.exchange

                                                                                                                                  The most sophisticated cyber attacks often rely on the simplest human behaviors. 👀 The FBI’s latest flash warning regarding North Korean state-sponsored actors (Kimsuky) using malicious QR codes is a fascinating case study in behavioral engineering. A QR code is essentially a digital question mark in the physical world. It begs to be resolved. We have spent the last few years training ourselves to scan them automatically; for menus, for parking, for connectivity. Attackers are weaponizing this muscle memory. They aren't just exploiting code; they are exploiting our inherent need to know what is on the other side of that scan. In high-stakes environments like academia and think tanks, unchecked curiosity is now a critical vulnerability.

                                                                                                                                  TL;DR
                                                                                                                                  🧠 FBI Alert: North Korean group Kimsuky (APT43) is active.
                                                                                                                                  🎯 Targets: NGOs, academia, and foreign policy experts.
                                                                                                                                  ⚡ Vector: Malicious QR codes bridging physical and digital gaps.
                                                                                                                                  🛡️ Defense: Treat an unknown QR code like a discarded USB drive. Do not scan.

                                                                                                                                  forbes.com/sites/daveywinder/2

                                                                                                                                    [?]Rihards Olups » 🌐
                                                                                                                                    @richlv@mastodon.social

                                                                                                                                    Stumbled upon a pretty comprehensive cloud storage comparison, pricing and features - might be useful.

                                                                                                                                    comparisontabl.es/cloud-storag

                                                                                                                                      [?]https://purl.org/rzr# » 🌐
                                                                                                                                      @rzr@mastodon.social

                                                                                                                                      fosdem.org/2026/fringe/# I am wondering if there is any side event like a dinner about / / / / ? any hint @gyptazy from
                                                                                                                                      community ?

                                                                                                                                        AodeRelay boosted

                                                                                                                                        [?]Metin Seven 🎨 » 🌐
                                                                                                                                        @metin@graphics.social

                                                                                                                                        AodeRelay boosted

                                                                                                                                        [?]⚯ Michel de Cryptadamus ⚯ » 🌐
                                                                                                                                        @cryptadamist@universeodon.com

                                                                                                                                        Peter Thiel and Howard Lutnick’s “free speech” video and cloud services platform Rumble has launched its new Tether powered in-app money laundering crypto¹ payments system and a truly impressive array of rightoid freaks, conspiracy theorists, russian influence peddlers, and sex pests is here to tell you about it.

                                                                                                                                        ¹ i think you can now pay your spies send tips via Tether USDT, bitcoin, and (i think) “Tether Gold” (XAUT).

                                                                                                                                        Tweet by Alex Jones: "This is a HUGE game changer!"

                                                                                                                                        Alt...Tweet by Alex Jones: "This is a HUGE game changer!"

                                                                                                                                        Tim Pool
- @Timcast
Not only is your account safe from third party pressure but it allows
regular people to easily trade USD, Gold, and Bitcoin
Its bringing crypto to a normie market, easier to trade and understand
Its the next big step needed to help regular people use bitcoin on a daily
basis
Chris Pavlovski 2 & BB @chrispavlovski - 3h
If its not clear, I'll make it really clear.
Rumble Wallet will compete directly against Coinbase and Venmo -- but we're
NOT custodial and we CANNOT shutdown your account. Its true financial
freedom to buy, hold and tip crypto....
8:51 AM - Jan 7,2026 - 73.8K Views

                                                                                                                                        Alt...Tim Pool - @Timcast Not only is your account safe from third party pressure but it allows regular people to easily trade USD, Gold, and Bitcoin Its bringing crypto to a normie market, easier to trade and understand Its the next big step needed to help regular people use bitcoin on a daily basis Chris Pavlovski 2 & BB @chrispavlovski - 3h If its not clear, I'll make it really clear. Rumble Wallet will compete directly against Coinbase and Venmo -- but we're NOT custodial and we CANNOT shutdown your account. Its true financial freedom to buy, hold and tip crypto.... 8:51 AM - Jan 7,2026 - 73.8K Views

                                                                                                                                        Russell Brand

                                                                                                                                        Alt...Russell Brand

                                                                                                                                          AodeRelay boosted

                                                                                                                                          [?]Nextcloud 📱☁️💻 » 🌐
                                                                                                                                          @nextcloud@mastodon.xyz

                                                                                                                                          “At the end of the day, if a security agency from the US wants to force a US vendor to pull out data, then they have to do this.” 🤯

                                                                                                                                          Computerworld investigates how global uncertainty is reshaping strategies in . Read the full story: 👇 computerworld.com/article/4109

                                                                                                                                            AodeRelay boosted

                                                                                                                                            [?]AI6YR Ben » 🌐
                                                                                                                                            @ai6yr@m.ai6yr.org

                                                                                                                                            Aw. CMON people. You do NOT NEED THE INTERNET AND A SUBSCRIPTION TO DETERMINE IF YOU ARE HYDRATED OR NOT.

                                                                                                                                            Engadget: Vivoo's toilet computer keeps an eye on your hydration

                                                                                                                                            engadget.com/home/vivoos-toile?

                                                                                                                                            
Vivoo's toilet computer keeps an eye on your hydration

                                                                                                                                            Alt... Vivoo's toilet computer keeps an eye on your hydration

                                                                                                                                              AodeRelay boosted

                                                                                                                                              [?]Kevin Karhan :verified: » 🌐
                                                                                                                                              @kkarhan@infosec.space

                                                                                                                                              @parismarx I mean, there's @european_alternatives and @alternativeto that do also have extensive tools to find ...

                                                                                                                                                AodeRelay boosted

                                                                                                                                                [?]Kevin Karhan :verified: » 🌐
                                                                                                                                                @kkarhan@infosec.space

                                                                                                                                                All das ganze zu ist für'n Arsch wenn deren -Steuerung in die fucking und - "" packen! [1] [2] [3] [4] [5]

                                                                                                                                                Ich meine, was kommt als nächstes?

                                                                                                                                                Da frage ich mich ob die bei @BNetzA & @bsi angesichts solcher Absurditäten gemeingefährlich inkompetent oder aktive Mittäter sind, denn es gibt keinen rationalen Grund an offensichtlich feindliche Staaten wie die solch eine indirekte über zu gewähren!

                                                                                                                                                Ich stelle mir auch die Frage wie weit dies angesichts der durch die nicht wie genutzt werden kann.

                                                                                                                                                • Getreu' dem Motto "Entweder ihr stellt Person/Unternehmen/Botschaft/... den Strom ab oder wir bricken eure Infrastruktur!"

                                                                                                                                                Hier sollte @Bundesregierung mal sich beim erkundigen, wie das so mit - "" läuft...[6] [7]

                                                                                                                                                Und was macht eigentlich @EUCommission bei solchen - Verstößen?

                                                                                                                                                AodeRelay boosted

                                                                                                                                                [?]Pandolin » 🌐
                                                                                                                                                @pandolin@fosstodon.org

                                                                                                                                                Venezuela war kein Unfall. Es war ein Testlauf.
                                                                                                                                                Wer militärisch Regime stürzt, juristisch entgrenzt und digital kontrolliert, braucht keine Regeln mehr.
                                                                                                                                                Clouds sind die neuen Flugzeugträger.
                                                                                                                                                Europas Abhängigkeit ist kein Betriebsrisiko, sondern ein Machtproblem.
                                                                                                                                                Digitale Souveränität ist Selbstverteidigung. Für uns, Taiwan, Grönland und die Ukraine.

                                                                                                                                                Hier mein neuer Artikel: pandolin.io/digitale-monroe-do

                                                                                                                                                Geteilte Grafik: Links tritt ein Militärstiefel auf Venezuela, rechts ein Kabel-Stiefel auf Europa. Ein Pangolin analysiert die Parallele unter dem Titel „Digitale Monroe-Doktrin“

                                                                                                                                                Alt...Geteilte Grafik: Links tritt ein Militärstiefel auf Venezuela, rechts ein Kabel-Stiefel auf Europa. Ein Pangolin analysiert die Parallele unter dem Titel „Digitale Monroe-Doktrin“

                                                                                                                                                AodeRelay boosted

                                                                                                                                                [?]C. » 🌐
                                                                                                                                                @c_th1@digitalcourage.social

                                                                                                                                                Wie digital unabhängig bist du wirklich?
                                                                                                                                                Accounts, , , , Plattformen — vieles in unserem Alltag hängt an wenigen -Konzernen. Und genau deshalb feiern wir den Digital Independence Day: den ersten Schritt raus aus diesen Abhängigkeiten – Schritt für Schritt, bewusst, nachhaltig.

                                                                                                                                                In dieser Ausgabe erklärt Sascha Pallenberg, warum mehr ist als Technik — es geht um Selbstbestimmung, Resilienz, Souveränität und demokratische Verantwortung. Und er zeigt ganz konkret, warum die E-Mail unsere wichtigste digitale Identität ist – und weshalb der Wechsel zu unabhängigen, datenschutzfreundlichen Anbietern wie Proton, Posteo, Mailbox.org & Co. der stärkste erste Move auf diesem Weg ist.

                                                                                                                                                Vom Abschied von -Abhängigkeiten über & -Setup, -Wechsel, -Alternativen & Datenschutz-Recht — bis zur Frage, wie wir uns schrittweise aus digitalen Lock-ins lösen, ohne Komfort zu verlieren.

                                                                                                                                                Webseite der Episode: share.transistor.fm/s/8749fab8

                                                                                                                                                AodeRelay boosted

                                                                                                                                                [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                @brian_greenberg@infosec.exchange

                                                                                                                                                The internet is treated like critical infrastructure, until it’s treated like a political yo-yo. Net neutrality didn’t fail because the idea was flawed. It failed because we keep arguing over who gets to be the referee. One administration writes rules. Another erases them. Courts step in. Agencies step back.
                                                                                                                                                Meanwhile, the network everyone depends on just keeps running. What’s changed in 2025 isn’t the argument; it’s the battlefield. Federal oversight weakened, not with a bang, but with procedural quiet. And when the center goes soft, the edges harden. States are stepping in, writing their own rules, and daring the system to hold. Is the lesson "instability is its own form of regulation?" When rules swing too often, power drifts to whoever can wait the longest.

                                                                                                                                                TL;DR
                                                                                                                                                🧠 Net neutrality keeps returning, then vanishing
                                                                                                                                                ⚡ Federal authority stepped back, not forward
                                                                                                                                                🎓 States are filling the vacuum
                                                                                                                                                🔍 Policy whiplash favors incumbents, not users

                                                                                                                                                theverge.com/report/851629/net

                                                                                                                                                  AodeRelay boosted

                                                                                                                                                  [?]Kevin Karhan :verified: » 🌐
                                                                                                                                                  @kkarhan@infosec.space

                                                                                                                                                  @Oleksii @robinsyl grows because and basically gave up delivering compareable computing power in the same thermal, electrical and price envelope.

                                                                                                                                                  Add to it the rise of like that further kicked the cost down in terms of basic computing and the big that welcomes cheap and does it's best to put it to good use.

                                                                                                                                                  It truly confirms @landley 's saying that in Computing it actually trickling up and thus gets moved from the to the to "the "...

                                                                                                                                                  Obviously, I wished for truly 'd to take the place but that's about 5-25 years lagging behind due to in many key technologies like ...

                                                                                                                                                    AodeRelay boosted

                                                                                                                                                    [?]Stefano Marinelli » 🌐
                                                                                                                                                    @stefano@mastodon.bsd.cafe

                                                                                                                                                    I Almost Died for a Full Sentry Database

                                                                                                                                                    A tale of bad logging practices, overengineering, and a near-death experience.

                                                                                                                                                    it-notes.dragas.net/2024/12/28

                                                                                                                                                    (Repost, one year later)

                                                                                                                                                      AodeRelay boosted

                                                                                                                                                      [?]Matthias » 🌐
                                                                                                                                                      @feb@loma.ml

                                                                                                                                                      So, ein erster Schritt ist getan. Meine Friendica Textinstanz besitzt nun eine OCM Verbindung. Das kann z.B. eine NetzCloud, OwnCloud oder irgendein anderes System sein, das das "OpenCloudMesh" Protokoll unterstützt, um mit Friendica verbunden zu werden und als Speicherort verwendet wird.

                                                                                                                                                      • In einer ersten Phase soll eine Verbindung zu einem externen Clouddienst hergestellt und ein Verzeichnis angelegt werden.
                                                                                                                                                      • In einer zweiten Phase sollen Bilder, Videos, Dokumente, etc. in die Cloud abgelegt werden, wenn sie in Friendica hoch geladen wurden.

                                                                                                                                                      So entsteht ein Medien-Spiegel außerhalb des Accounts.
                                                                                                                                                      Das Ziel ist es, jedem User eine Option zum automatischen Sichern der eigenen Anlagen zu geben. Weitere Anwendungsfälle sind denkbar.

                                                                                                                                                      Login und Verbindungsstatus OCM Verbindung

                                                                                                                                                      Alt...Login und Verbindungsstatus OCM Verbindung

                                                                                                                                                      Admin-Modul zum Aktivieren/Deaktivieren des Friendica Addon

                                                                                                                                                      Alt...Admin-Modul zum Aktivieren/Deaktivieren des Friendica Addon

                                                                                                                                                      Location: Bad Honnef, Grafenwerther Brücke

                                                                                                                                                        AodeRelay boosted

                                                                                                                                                        [?]r1cksec » 🌐
                                                                                                                                                        @r1cksec@infosec.exchange

                                                                                                                                                        AodeRelay boosted

                                                                                                                                                        [?]knoppix » 🌐
                                                                                                                                                        @knoppix95@mastodon.social

                                                                                                                                                        Denmark has begun phasing out Microsoft software in government, with the Road Traffic Authority piloting a switch to open-source OS and office tools. 🖥️

                                                                                                                                                        Officials cite data control and vendor lock-in risks, signaling a broader push that could affect up to 15,000 public employees. 🔓

                                                                                                                                                        🔗 itsfoss.com/news/denmark-road-

                                                                                                                                                          AodeRelay boosted

                                                                                                                                                          [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                          @brian_greenberg@infosec.exchange

                                                                                                                                                          For years, national security debates focused on chips, networks, and software. This week, a U.S. senator in one of the top intelligence roles suggested we may have been watching the wrong frontier. The next Huawei, he warned, isn’t building routers. It’s collecting DNA.

                                                                                                                                                          BGI’s rise worries U.S. officials not because genomics is inherently dangerous, but because scale changes meaning. At global volumes, genetic data stops being just medical information and starts looking like strategic infrastructure. Combined with AI, it can support surveillance, population modeling, and long-term military research. That’s why Senator Mark Warner described the situation in unusually blunt terms: “It’s terrifying.” Could this lead to biological warfare?

                                                                                                                                                          There’s a familiar pattern here. State-backed expansion, early global access, and standards-setting before governments grasp the implications. Huawei followed it in telecom. Warner fears BGI is following it in biotech. And once again, lawmakers are asking whether the response is arriving after the architecture is already in place.

                                                                                                                                                          The deeper issue is not China alone. It’s whether intelligence systems built to watch governments can adapt quickly enough to track commercial technology that quietly becomes national power. In a world where data defines advantage, spying isn’t just about secrets anymore. It’s about understanding who controls the future inputs.

                                                                                                                                                          TL;DR
                                                                                                                                                          🧠 DNA is being treated as strategic data
                                                                                                                                                          ⚡ Biotech joins chips and AI as intel priority
                                                                                                                                                          🎓 Commercial tech now shapes security risk
                                                                                                                                                          🔍 Standards-setting may decide long-term power

                                                                                                                                                          cnbc.com/2025/12/06/china-us-t

                                                                                                                                                            AodeRelay boosted

                                                                                                                                                            [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                            @brian_greenberg@infosec.exchange

                                                                                                                                                            This Gmail hack is unsettling not because it’s flashy, but because it’s bureaucratic. Attackers aren’t breaking encryption or outsmarting algorithms. They’re filling out forms. By changing an account’s age and abusing Google’s Family Link feature, they can quietly reclassify an adult user as a “child” and assume parental control. At that point, the rightful owner isn’t hacked so much as administratively erased.

                                                                                                                                                            The clever part is that everything happens inside legitimate features. Passwords are changed. Two-factor settings are altered. Recovery options are overwritten. And when the user tries to get back in, Google’s automated systems see a supervised child account and do exactly what they were designed to do: say no.

                                                                                                                                                            Google says it’s looking into the issue, which suggests this wasn’t how the system was supposed to work. But it’s a reminder of an old lesson. Security failures often happen when protective mechanisms are combined in ways no one quite imagined. The tools aren’t broken. The assumptions are.

                                                                                                                                                            There’s no dramatic fix here, only mildly annoying advice that suddenly feels urgent. Review recovery settings. Lock down account changes. Use passkeys. Because once an attacker controls the recovery layer, proving you’re you can become surprisingly difficult.

                                                                                                                                                            TL;DR
                                                                                                                                                            🧠 Family safety tools are being weaponized
                                                                                                                                                            ⚡ Account recovery can be shut down entirely
                                                                                                                                                            🎓 Legitimate features enable the lockout
                                                                                                                                                            🔍 Prevention matters more than appeals

                                                                                                                                                            forbes.com/sites/daveywinder/2

                                                                                                                                                              AodeRelay boosted

                                                                                                                                                              [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                              @brian_greenberg@infosec.exchange

                                                                                                                                                              NATO’s latest cyber exercise is a useful reminder that cyber defense is rarely dramatic and never tidy. Fifteen hundred defenders from across the alliance spent days responding to simulated attacks designed to be confusing, imperfect, and inconvenient. In other words, realistic.

                                                                                                                                                              What’s notable is what the exercise is not about. There’s no emphasis on secret weapons or breakthrough technology. The hard part is coordination: sharing information across borders, making decisions with incomplete data, and responding before certainty arrives. That’s where most real incidents succeed or fail.

                                                                                                                                                              The drills don’t trigger Article 5, and that’s intentional. This isn’t about retaliation. It’s about discovering friction while the consequences are still fictional. The goal is to surface weak handoffs, unclear authority, and quiet assumptions that only become obvious under pressure.

                                                                                                                                                              The takeaway is refreshingly unromantic. Cyber resilience isn’t built by brilliance alone. It’s built by practicing confusion together beforehand.

                                                                                                                                                              TL;DR
                                                                                                                                                              🧠 NATO rehearses real-world cyber chaos
                                                                                                                                                              ⚡ Coordination matters more than clever tools
                                                                                                                                                              🎓 Exercises reveal human and process gaps
                                                                                                                                                              🔍 Preparedness beats improvisation

                                                                                                                                                              theregister.com/2025/12/10/nat

                                                                                                                                                                AodeRelay boosted

                                                                                                                                                                [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                                @brian_greenberg@infosec.exchange

                                                                                                                                                                If you read the cybersecurity sections of the 2026 NDAA closely, you can almost hear a weary sigh. This is not the sound of bold futurism. This is the sound of an institution that just finished grading a stack of exams and realized half the class still doesn’t lock their phone.

                                                                                                                                                                After a year of SignalGate and other painfully avoidable security lapses, Congress has decided to do something radical: write laws that assume people will make bad decisions unless gently, repeatedly, and legally discouraged from doing so. Hence, there is a new focus on hardened mobile devices for senior officials and actual rules around AI security. Not vibes. Rules. And it's long overdue.

                                                                                                                                                                The subtext is refreshingly honest. Cybersecurity failures this year weren’t caused by zero-days or shadowy genius hackers. They were caused by convenience, overconfidence, and the timeless belief that “it’ll probably be fine.” The NDAA reads like a syllabus revision after the midterm went badly.

                                                                                                                                                                There’s a lesson here for the rest of us. You can buy the best tools, fund the smartest teams, and write the cleanest policies. But if leadership treats security like optional homework, the final grade will reflect that.

                                                                                                                                                                TL;DR
                                                                                                                                                                🧠 Cyber law reacts to real-world faceplants
                                                                                                                                                                ⚡ Mobile and AI security get adult supervision
                                                                                                                                                                🎓 Leadership behavior becomes part of the threat model
                                                                                                                                                                🔍 Secure tools don’t cancel careless habits

                                                                                                                                                                csoonline.com/article/4103754/

                                                                                                                                                                  AodeRelay boosted

                                                                                                                                                                  [?]omar » 🌐
                                                                                                                                                                  @omar@mastodon.bsd.cafe

                                                                                                                                                                  Find back the ASSolution Architect who at first allowed the move to .

                                                                                                                                                                  Airbus moving critical systems away from AWS, Google, and Microsoft citing data sovereignty concerns

                                                                                                                                                                  Alt...Airbus moving critical systems away from AWS, Google, and Microsoft citing data sovereignty concerns

                                                                                                                                                                    AodeRelay boosted

                                                                                                                                                                    [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                                    @brian_greenberg@infosec.exchange

                                                                                                                                                                    In tech, where you host is almost as important as what you build. Proton, long synonymous with Swiss privacy protection, has begun relocating parts of its physical infrastructure out of Switzerland in response to proposed changes to the country’s surveillance law. This is a strategic hedge against legal uncertainty that could require VPNs and encrypted services to log and retain user data, undermining core privacy commitments.

                                                                                                                                                                    🧠 The first service to shift is Lumo, Proton’s privacy-first AI chatbot, now hosted in Germany.
                                                                                                                                                                    ⚡ Proton insists this investment in Europe doesn’t mean abandoning Switzerland.
                                                                                                                                                                    🎓 The move highlights how evolving regulatory landscapes can ripple through tech ecosystems.
                                                                                                                                                                    🔍 And it raises a bigger question: when privacy laws tighten, where does a privacy company build trust?

                                                                                                                                                                    techradar.com/vpn/vpn-privacy-

                                                                                                                                                                      AodeRelay boosted

                                                                                                                                                                      [?]Patioboater » 🌐
                                                                                                                                                                      @patioboater@mastodon.social

                                                                                                                                                                      Today for my and 17 in my Top 25 Sunsets Countdown, Mongo Sun.

                                                                                                                                                                      The cloud across this big Sun reminds me of some of the visuals in the 1980 Flash Gordon movie.

                                                                                                                                                                      Frankly, we could all use Flash Gordon now!

                                                                                                                                                                      June 16, 2025. Wolverine Lake, Michigan.

                                                                                                                                                                      Sunset photograph of a big yellow and orange sun in a dark orange sky with a dark cloud billowing up from the lower left.

                                                                                                                                                                      Alt...Sunset photograph of a big yellow and orange sun in a dark orange sky with a dark cloud billowing up from the lower left.

                                                                                                                                                                        AodeRelay boosted

                                                                                                                                                                        [?]r1cksec » 🌐
                                                                                                                                                                        @r1cksec@infosec.exchange

                                                                                                                                                                        Browse and explore first-party applications including their pre-consented permissions in Microsoft Entra ID🕵️‍♂️

                                                                                                                                                                        entrascopes.com

                                                                                                                                                                          AodeRelay boosted

                                                                                                                                                                          [?]Brian Greenberg :verified: » 🌐
                                                                                                                                                                          @brian_greenberg@infosec.exchange

                                                                                                                                                                          Imagine inventing the future of AI hardware only to have your own government take a quarter of your China sales as part of policy. That’s exactly what’s happening with the U.S. decision to let Nvidia export its H200 AI chips to China with a 25% revenue share flowing back to Washington. 😳 The move was pitched as a way to balance economic engagement with strategic control, but many experts and security hands are baffled, calling the cut essentially an export tax that “makes no sense” given China’s AI ambitions. The critics warn this could erode U.S. leverage in the AI race by giving China broader access to powerful computing while letting Beijing tap into American tech ecosystems without paying full strategic cost. Even bipartisan lawmakers have pressed Nvidia’s CEO to testify on how this deal came together and what it means for national security.

                                                                                                                                                                          TL;DR
                                                                                                                                                                          🧠 policy turns chip exports into a revenue play
                                                                                                                                                                          ⚡ experts question strategic logic
                                                                                                                                                                          🎓 national security & market leadership on the line
                                                                                                                                                                          🔍 Congress is watching closely

                                                                                                                                                                          arstechnica.com/tech-policy/20

                                                                                                                                                                            Back to top - More...