Handling users passwords and credentials in 2018, one approach:
Some tips about working with celery on your python projects:
That says something about cybersecurity, does it not? And not much good.
It's a real benefit of #opensource that you (and others) can inspect the code you run and know you've not been compromised by a single disgruntled employee at a vendor or distributor of your software.
Half of IT pros say it would be easy to turn to #cybercrime without getting caught, according to @TechRepublic. Explore their research: https://www.techrepubli…
How data is stored by Ethereum nodes, an overview:
"...the vulnerabilities would allow an attacker to download footage off a camera, edit things out or potentially make more intricate modifications, and then re-upload it, leaving no indication of the change." https://www.wired.com/story/police-body-camera-vulnerabilities/
GPG Sync 0.2 is released! It's an open source tool to make it easier for every member of an organization to have up-to-date versions of every other members' PGP public keys.
This version looks way nicer, is more stable, and now has support for Windows.
Here is a list of security tips for #nodejs web developers:
Hacking Humans https://www.thecyberwire.com/podcasts/hacking-humans.html
The Complete Privacy & Security Podcast
7 Minute Security
Social Engineer Podcast
For those interested in the decentralization of the web/Internet, `Decentralized Web Summit 2018` starts today:
You can find the live streams of each room on the `Internet Archive`'s youtube channel:
The field has an high amount of hype, scams and people just "selling" without any background/knowledge. Will it survive and turn into something useful? Time will tell.
curl | bash, just don't do it
More concerns when using or even building electron apps.
"Why Your Startup Doesn't Invest Sufficiently in its Differentiators" 🤔
Confidential Mode will push users further into Google’s own walled garden while giving them what we believe are misleading assurances of privacy and security.
It’s important to note at the outset that because Confidential Mode emails are not end-to-end encrypted, Google can see the contents of your messages and has the technical capability to store them indefinitely. In other words, Confidential Mode provides zero confidentiality with regard to Google.
An extensive description (with examples) of known mistakes/vulnerabilities and how to avoid them, when programming smart-contracts using solidity.
I've seen a few posts showing up lately, about different of bypassing CSP 🤔