there's very little engagement here, but I'm not posting on the nazi platform, so here we are
there's very little engagement here, but I'm not posting on the nazi platform, so here we are
Generative AI is supposed to change the world and what it seems like to me is that they've invented various forms of The Clapper for the computer
MUSK: A sophisticated cyberattack from Ukraine took out Twitter's servers
REALITY: Twitter's servers were not secured properly and were publicly visible
Great explainer here from @lhn.bsky.social
www.wired.com/story/x-ddos...
VXLAN implementation in eBPF. Not because we couldn't but because we could.
VXLAN is usually something you leave to hardware or the kernelβs networking stack, but eBPF lets you bypass all that, cutting out CPU overhead and making it faster.
github.com/unikzforce/w...
Blue Origin has roared into orbit, finally. So what's next for the company everyone wants to see emerge as a viable competitor to SpaceX?
arstechnica.com/features/202...
Well, big news. I am planning to move the Space Library to a new home. And I need some help - in 35 years I've never asked for funding, donations or subscriptions for my Space Report, to keep it independent, but now I need to raise some additional funds.
www.gofundme.com/f/fund-jonat...
I'm excited to announce Stratoshark, a sibling application to Wireshark that lets you capture and analyze process activity and log messages in the same way that Wireshark lets you capture and analyze network packets. You can try it out and learn more at stratoshark.org.
And just like that: TikTok is coming back...
x.com/TikTokPolicy...
OSI model fundamentals: If it can shock you, blind you, or cook you it's layer 1.
NIST BGP security recommendations by @eldomador.bsky.social : https://csrc.nist.gov/pubs/sp/800/189/r1/ipd
Screenshot of the presentation showing how tc-eBPF enforces a packet path dictated by the control plane using segment routing.
I had missed that Tencent discussed how they use #eBPF since 2022 to perform traffic engineering across their WAN at the granularity of containers.
Recording: www.youtube.com/watch?v=bn6D...
Paper: cs.stanford.edu/~keithw/sigc...
"The more you improve OSPF, the more you get IS-IS"
Peter Paluch
"Tracing (filtered) packets in the Linux networking stack, using eBPF probes and interfacing with control and data paths such as OvS or Netfilter"
The head of Russia's space program seems remarkably reasonable and level headed.
arstechnica.com/space/2024/1...
Researchers unveiled an attack that completely undermines security assurances AMD makes to customers using one of its most expensive microprocessor product lines in the cloud.
BadRAM takes minutes to bypass SEV-SNP protections that warn when the VM is compromised
arstechnica.com/information-...
The new year is nigh, Jeff Bezos is watching to see who is naughty or nice, and the moon beckons. No pressure, Blue.
arstechnica.com/space/2024/1...
My stomach after 40: βCheese is poison now.β
Me: [dunks bread into a wheel of melted brie]
This one's interesting too, from Black Lotus Labs and Microsoft:
Russian group Turla or Secret Blizzard has been hacking *other* hackers--to take over their infrastructure, launch new attacks, and hide their tracks. Appropriate nesting doll imagery:
blog.lumen.com/snowblind-th...
accidentally typed rm -fr and iβm using that now
Signal alone is not enough. If you are an activist, you need a complete self-defense against surveillance. @eff.org has been maintaining these resources for years: ssd.eff.org
Drop packets from IPs exceeding a throughput threshold with XDP
github.com/SRodi/xdp-dd...
I understand the satisfaction of "deleting" your Twitter account but I would not. Clear it if you desire. All your data there is not under your control and gets you nothing except a flag in one version of the data that says deleted. You need to deprive usage of your username and connected contexts.
10% off? why not smack me with a tire iron while youβre at it
When I'm not doing $WORK, I help the Hachyderm infrastructure team run hachyderm.io, a large Mastodon instance (55k users/11k MAU). Today, we published an analysis of our tech stack to prepare for access and resilience risks from the incoming US government.
community.hachyderm.io/blog/2024/11...
@tomsharpe.bsky.social wrote a very good, informed and unbiased (as to answer) piece on Yi Peng 3 and the sabotaged cables in Baltic Sea.
pastequest.com?4cc34df5a09b...
Code circulating in the wild hijacks the earliest stage boot process of Linux devices by exploiting a year-old UEFI vulnerability known as LogoFAIL when it remains unpatched. The ultimate objective of the exploit is to install a new Linux bootkit named Bootkitty.
arstechnica.com/security/202...
I hadnβt used the other site for 5+ years because the interesting technical community conversations had died and it was full of misogyny and uncharitable replies.
I heard there was something going on but I think my brain just doesnβt work in a social media way anymore.
Maybe thatβs good.
having spent the past few days in silicon valley in various gatherings with our AI overlords, governments, & scholars at the forefront of everything AI, I seriously wonder if the AI industry has become too big to fail
Do you have experience implementing passkeys on your orgβs website or network? Have you supported passkey use for end users? Have you tested how passkeys sync/work across platforms or on different sites? If so, Iβm eager to speak with you. Please DM me on Signal (DanArs.82) or here. Please boost.