6 days ago

An easy-to-use secure configuration generator for web, database, and mail software. Simply select the software you are using and receive a configuration file that is both safe and compatible.

by mfred 6 days ago

9 days ago

Minimal CVE Hardened container image collection. Contribute to rtvkiz/minimal development by creating an account on GitHub.

by chrisSt 8 days ago

19 Jan 26

How we handle 92 million compilations a year without everything catching fire

by kawcco 21 days ago

14 Jan 26

A good overview of techniques to avoid secrets leaking in shell

by sebastien 25 days ago saved 2 times

We exploited a lack of isolation mechanisms in multiple agentic browsers to perform attacks ranging from the dissemination of false information to cross-site data leaks. These attacks resurface decades-old patterns of vulnerabilities that the web security community spent years building effective defenses against.

by mfred 26 days ago
Tags:

07 Jan 26

A shared secret manager that works with public keys. Made by Candid, they have other cool software too.

by sebastien 1 month ago

All encryption is end-to-end, if you’re not picky about the ends. config TCG_TPM2_HMAC bool “Use HMAC and encrypted transactions on the TPM bus” default n select CRYPTO_ECDH select CRYPTO_LIB_AESCFB select CRYPTO_LIB_SHA256 select CRYPTO_LIB_UTILS help Setting this causes us to deploy a scheme which uses request and response HMACs in addition to encryption for communicating with the TPM to prevent or detect bus snooping and interposer attacks (see tpm-security.rst). Saying Y here adds some encryption overhead to all kernel to TPM transactions. Last year, I came agross a Linux kernel feature called TCG_TPM2_HMAC. It claims to detect or prevent active and passive interposer attackers. That’s one of my sleeper agent activation phrases, so I dug in.

by marc 1 month ago saved 2 times

06 Jan 26

All encryption is end-to-end, if you’re not picky about the ends. config TCG_TPM2_HMAC bool “Use HMAC and encrypted transactions on the TPM bus” default n select CRYPTO_ECDH select CRYPTO_LIB_AESCFB select CRYPTO_LIB_SHA256 select CRYPTO_LIB_UTILS help Setting this causes us to deploy a scheme which uses request and response HMACs in addition to encryption for communicating with the TPM to prevent or detect bus snooping and interposer attacks (see tpm-security.rst). Saying Y here adds some encryption overhead to all kernel to TPM transactions. Last year, I came agross a Linux kernel feature called TCG_TPM2_HMAC. It claims to detect or prevent active and passive interposer attackers. That’s one of my sleeper agent activation phrases, so I dug in.

by yahourt 1 month ago saved 2 times

25 Dec 25

A proposed standard that allows websites to define security policies.

by bitor 1 month ago saved 4 times
Tags:

16 Dec 25

A useful website to print out and stow away somewhere safe to help your loved ones or yourself once you forget your masterpassword.

by mzumquadrat 1 month ago