Kuketz-Blog 🛡 (@[email protected])

Frage an euch: Wie geht ihr damit um, am Arbeitsplatz Microsoft-Tools einsetzen zu müssen, obwohl ihr das eigentlich ablehnt? Windows, Teams, OneDrive, 365 – alles Dinge, die ihr privat niemals anfassen würdet. Was macht das mit euch? Verdrängt ihr es, habt ihr euch arrangiert, oder zermürbt es euch mit der Zeit? /kuk #microsoft #bullshit

Mastodon

@mailbox_org oder einfach brauchbare #ITsec #InfoSec, #OpSec & #ComSec.

  • Jede*r 08/15-Zahlungsdienstleister in Deutschland hat mehr Schutzmechanismen und Redundanzen eingeplant!?, weil @BaFin denen dazu in den Nacken atmet!
@wiggwigg or you could just learn to use multiple, seperate identities and practise #OpEec, #ComSec, #InfoSec & #ITsec
@tazgetroete was lernen wir daraus: Härtere #OpSec, #InfoSec, #ComSec und auch #ITsec.

@hcf @dans_root @earthnewstech @monocles You don't get #SelfCustody of all the keys on their platforms, to the point that #ProtonMail bricks #LKML useage!

  • If you had actual Self-Custody, then it would be real #E2EE and not a mere "#TrustMeBro!"-Security

Please go to a #CryptoParty and learn abdolute fundamentals re: #Cryptography, #InfoSec, #OpSec & #ComSec.

https://www.youtube.com/watch?v=pOkNrvB63pc

[English] Pfandleiher on... The offline-pgp-method and why Encrochat, SKY ECC and ANON are failing.

YouTube

@hcf that's just wrong and you know that.

For example, if "#Security" was a real issue, they'd host their #IMAP+#SMTP access exclusively over @torproject / #Tor because #OnionServices are using fully-encrypted connections in a self-authenticating adress spaces.

  • They don't because that isn't the issue, and I'm not talking about the Server-to-Server - Connectivity, which is INHERENTLY AND UNFIXABLE INSECURE WITH EVERY EMAIL PROVIDER unless they don't allow actual cross-provider eMails (or restrict it to very few, selected competitiors with spechally negotiated connectivity [i.e. #VPN|s], which to my knowledge NONE of the commercial providers do)…

I brought up @monocles because they at least don't lie to customers and are honest about security & privacy!

@case2tv @dans_root @earthnewstech

#sarcasm #commentary #ITsec #InfoSec #OpSec #ComSec

.onion - Wikipedia

@hcf @dans_root @earthnewstech if you don't understand the concept of "#Self-Custody" of Keys then you ain't in the position to be angry.

I merely hinted at the fact that @monocles isn't making false security promises and instead encourages proper #OpSec, #InfoSec, #ComSec & #ITsec practises…

Kevin Karhan :verified: (@[email protected])

@[email protected] @[email protected] @[email protected] except both fuck up their self-hosted PGP which doesn't doesn't do *real #E2EE* if you don't exercise #SelfCustody of all the keys and use #PGP/MIME over #IMAP+#SMTP! - Something that @[email protected] [does disclose in their documentation!](https://docs.monocles.eu/services/mail.service/#security_of_keys)

Infosec.Space
Family of development devices with DSI & SPI displays. These will do codec2 and opus PTT and can be tailored to various networks and security requirements. When you require something out of dogma.
#comsec #opsec #dfir #preparedness #soverignty
Communication platforms evolving. Been tailoring my PTT codebase for various use cases. #OPSEC #COMSEC #Resilience #dfir #embedded

@Minionflo @gintoxicating @CyReVolt see the #hetznered tag…

Needless to say they also can't be assed to wipe their VPSes / delete virtual drives when they provision new customers, so one has to manually shred the contents!

  • I literally wrote my own script just I didn't have to sit there all day when I helped with a #CloudExit!

    • Booted into the "Rescue-Linux" and ran wget https://raw.githubusercontent.com/kkarhan/misc-scripts/refs/heads/master/bash/wiper.sh && chmod +x ./wiper.sh && sudo ./wiper.sh on said machines.

#Hetzner #InfoSec #ComSec #OpSec #ITsec

misc-scripts/bash/wiper.sh at master · kkarhan/misc-scripts

random scripts for various admin tasks. Contribute to kkarhan/misc-scripts development by creating an account on GitHub.

GitHub