DaKnOb

42.9K posts

DaKnOb banner
DaKnOb

DaKnOb

@DaKnObCS

I do cool things that matter ;) @[email protected]

Zürich, Switzerland Beigetreten Haziran 2009
431 Folgt941 Follower
DaKnOb retweetet
Tim Geoghegan
Tim Geoghegan@SIGTIM·
ISRG is hiring an SRE to help keep the world’s largest certificate authority running. Come join our team and help us make the internet safer for all. abetterinternet.org/careers/le-sre…
English
0
6
12
882
DaKnOb retweetet
kennyog
kennyog@kennyog·
After a constructive engagement with @ThreemaApp during responsible disclosure, this is unexpectedly dismissive. We broke their protocol 6 ways. They updated it, thanks to our work (breakingthe3ma.app). So of course our work applies to an old version.
Threema@ThreemaApp

There’s a new paper on Threema’s old communication protocol. Apparently, today’s academia forces researchers and even students to hopelessly oversell their findings. Here’s some real talk: threema.ch/bp/new-paper-o…

English
5
99
329
93.6K
DaKnOb retweetet
NYTPitchbot
NYTPitchbot@DougJBalloon·
It takes a good six-year-old with a gun to stop a bad six-year-old with a gun.
English
102
1.9K
27K
1.1M
DaKnOb retweetet
Fernando Gont
Fernando Gont@FernandoGont·
GitHub on finally deploying IPv6.... 😊🤗 (@latest/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-allowed-ip-addresses-for-your-organization#adding-an-allowed-ip-address" target="_blank" rel="nofollow noopener">docs.github.com/en/enterprise-…)
Fernando Gont tweet media
English
2
41
118
12.5K
DaKnOb retweetet
dragosr
dragosr@dragosr·
Don't dump LastPass because of 7 breaches, dump them for crap crypto: Padding oracle vulns, ECB pass len leaks, switch to CBC for new vaults not old ones, vault key uses AES256 but only 128 bits entropy, key webui leak, silent KDF downgrade, KDF hash log leak, keys left in mem.
English
6
175
705
113.3K
DaKnOb
DaKnOb@DaKnObCS·
@Scott_Helme @troyhunt @Yubico @Cloudflare The blue keys that are cheaper are perfectly fine for 2FA and to some degree as Passkeys / for Passwordless login. The black keys are only needed for the Nano form factor, the Lightning connector, or their other applications (PIV, GPG, etc.).
English
0
0
0
143
DaKnOb retweetet
BGP.Tools
BGP.Tools@bgptools·
🎉 bgp.tools has passed 500 Online BGP sessions! Thanks to the networks that have made this possible We now have really quite good routing visibility in EU and a lot of the US, But isn't the whole world! The focus is now Africa, APAC, and LATAM!
BGP.Tools tweet media
English
0
11
56
0
DaKnOb retweetet
Jameson Lopp
Jameson Lopp@lopp·
This video of cops in Nevada searching a suspect and finding a seed phrase is pretty wild. Imagine having your seed phrase become part of public record due to it being captured by an officer's body camera!
English
483
782
4.4K
2.9M
DaKnOb
DaKnOb@DaKnObCS·
@aris_ada I have a little bit more, 1/5th, however it’s just one specific set of people mostly, which means Mastodon now is not covering everything I used to see here. I used fedifinder.glitch.me to find everyone and add them on Mastodon so I can begin the migration.
English
0
0
0
22
DaKnOb retweetet
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
POV: You're a security consultant hired to be embedded in a web development team
English
11
65
460
76.2K
DaKnOb retweetet
Bart Groothuis
Bart Groothuis@bgroothuis·
Europe’s new cyber security legislation NIS2 officially signed! 🥂
Bart Groothuis tweet media
English
38
49
152
0
DaKnOb retweetet
🧗‍♂️ Matt Holt
@DaKnObCS Oh yeah, forgot about that. I'm pretty sure we have the plumbing for this, let me see if we expose it.
English
0
1
0
0
DaKnOb
DaKnOb@DaKnObCS·
@mholt6 Google Trust Services supports setting the notBefore and notAfter via ACME so you can specify the exact duration, for up to 90 days. I’ve been using it with this patch: go-review.googlesource.com/c/crypto/+/454… Works fine, and I added it as “requested” to convey the fact that it may not happen.
English
2
0
0
0
🧗‍♂️ Matt Holt
I forget exactly when, but some time ago Caddy became the first (and only, so far?) server to implement all 10 of Sleevi's famous OCSP implementation recommendations. @caddyserver has the most robust and mature OCSP implementation of any server available. gist.github.com/sleevi/5efe9ef…
English
2
4
36
0
DaKnOb
DaKnOb@DaKnObCS·
@mholt6 I’ve gotten some of my certs down to 3 days and daily renewals without problems. Would you consider adding support for custom validity to Caddy / your libraries to request them via ACME? I would be happy to trial 3 or 7 day certs with Caddy!
English
1
0
1
0
🧗‍♂️ Matt Holt
We have cert lifetimes down to 90 days. Get it down to 7 and there's practically no need for revocation at all. I know that's a tall order, but if we can dispose of all our revocation infrastructure, we can use those resources for issuance instead.
English
2
0
7
0