We really need to start #FediSec teams to start to investigate threats.
There seems to be about 15 people doing it on their own, and 5 other small group chats on multiple platforms who all dislike each other.
We really need to start #FediSec teams to start to investigate threats.
There seems to be about 15 people doing it on their own, and 5 other small group chats on multiple platforms who all dislike each other.
The industry keeps face-planting on supply chain security — and it’s not because the problems are new.
We broke down the systemic issues in our new blog, "Package managers - malware delivery as a service":
https://distrust.co/blog/package-managers.html
#SupplyChainSecurity #InfoSec #DevSecOps #OpenSourceSecurity #CVE #FediSec
Any security concepts you would like to see explained, broken down, or discussed on #Glassof0J ?
Have you turned on 2FA Authentication on your fediverse accounts ?
#fedipoll #fedisec #opsec #fediverse #privacy #security #foss
What are models for social structures for decentralized coordination, info sharing, and response to network threats, and how might we apply them to #fediverse ops?
Adding some hashtags for findability, see start of thread at https://hachyderm.io/@juno/109452321046920379
#FediSec #FediBlock #MastodonSec #infosec #WebOfTrust #trust
What are models for social structures for decentralized coordination, info sharing, and response to network threats, and how might we apply them to #fediverse ops? Here's some: - CERT (Computer Emergency Readiness Team), a government-run forum, used for eg ransomware response (suggested via https://mastodon.acc.sunet.se/@fsnk/109450216490898680 ) - NANOG (network operators' group) used for internet operations eg Border Gateway Protocol - CCADB (common certificate authority database) - for root TLS cert authority trust
The underling design problem:
Instances in a federated network are implemented as peers in a p2p network.
Thus not advantaging federation at all.
¯\_(ツ)_/¯
#Infosec
#FediSec
#MastoSec
#vulnerability
#cybersecurity
#SoftwareEngineering
#DistributedSystems
» What is the number one vulnerability?
That question caught me by surprise.
...
I responded with “developers pushing credentials into public repositories”.
The interviewer smiled at me, she liked my answer, but clearly I was wrong. She said
The number one vulnerability is system misconfiguration «