We really need to start #FediSec teams to start to investigate threats.

There seems to be about 15 people doing it on their own, and 5 other small group chats on multiple platforms who all dislike each other.

The industry keeps face-planting on supply chain security — and it’s not because the problems are new.

We broke down the systemic issues in our new blog, "Package managers - malware delivery as a service":

https://distrust.co/blog/package-managers.html

#SupplyChainSecurity #InfoSec #DevSecOps #OpenSourceSecurity #CVE #FediSec

Any security concepts you would like to see explained, broken down, or discussed on #Glassof0J ?

#Infosec #cybersecurity #fedisec #hacking #hackers #cyber

Have you turned on 2FA Authentication on your fediverse accounts ?

#fedipoll #fedisec #opsec #fediverse #privacy #security #foss

Yes !
36.7%
No
46.7%
I don't like 2FA
16.7%
Poll ended at .

What are models for social structures for decentralized coordination, info sharing, and response to network threats, and how might we apply them to #fediverse ops?

Adding some hashtags for findability, see start of thread at https://hachyderm.io/@juno/109452321046920379

#FediSec #FediBlock #MastodonSec #infosec #WebOfTrust #trust

juno suárez (@[email protected])

What are models for social structures for decentralized coordination, info sharing, and response to network threats, and how might we apply them to #fediverse ops? Here's some: - CERT (Computer Emergency Readiness Team), a government-run forum, used for eg ransomware response (suggested via https://mastodon.acc.sunet.se/@fsnk/109450216490898680 ) - NANOG (network operators' group) used for internet operations eg Border Gateway Protocol - CCADB (common certificate authority database) - for root TLS cert authority trust

Hachyderm.io

@davidgerard @Edent

The underling design problem:
Instances in a federated network are implemented as peers in a p2p network.
Thus not advantaging federation at all.

¯\_(ツ)_/¯

#Infosec
#FediSec
#MastoSec
#vulnerability
#cybersecurity
#SoftwareEngineering
#DistributedSystems

» What is the number one vulnerability?

That question caught me by surprise.
...
I responded with “developers pushing credentials into public repositories”.

The interviewer smiled at me, she liked my answer, but clearly I was wrong. She said

The number one vulnerability is system misconfiguration «

@alevsk

https://www.alevsk.com/2022/11/system-misconfiguration-is-the-number-one-vulnerability-at-least-for-mastodon/

#Infosec
#FediSec
#MastoSec
#vulnerability
#cybersecurity