176 Followers
329 Following
343 Posts

Not the droids you're looking for.

Responsible for trying - twice - to replace every laptop at Twitter.

Why yes, I *can* answer your questions about YubiKeys.

TwitterTwitter.com/deltaon
Keybasehttps://keybase.pub/nfohs/mastodon.html
Websitehttps://nickfohs.com
2 years on, I still get better feelings on Mastodon than I do on Bluesky
Really having a hard time threading the needle between wanting to support writers I like and not giving any money to Substack. Especially when they’ve just recently started on there as their first foray into independent distribution

Id like to put my lab servers to work archiving US federal data thats likely to get pulled - climate and biomed data seems mostly likely. The most obvious strategy to me seems like setting up mirror torrents on academictorrents. Anyone compiling a list of at-risk data yet?

edit (2025-09-21): this became https://sciop.net and its still going, in case anyone in this thread missed it

edit (2025-09-21 pt 2): do note the date on original post, nearly a year old, we have been rolling on sciop since February or so

#sciop

SciOp - Public Information Preservation

Preserving Public Information

@paul in super dark mode, is there any way to lighten the indicator that the magnifying glass in the upper right is pressed? I keep forgetting how to turn search “off”
It’s spooky season, and @racheltobac continues to terrify!
https://infosec.exchange/@racheltobac/113319494211312107
racheltobac :verified: (@[email protected])

I just live hacked Arlene Dickinson (Dragons' Den star - Canada's Shark Tank) by using her breached passwords, social media posts, an AI voice clone, & *just 1 picture* for a deepfake live video call. Thank you Elevate Conference and Mastercard for asking me to demo these attacks live! https://www.youtube.com/watch?v=ysu7vEkZdN0 What are the takeaways from this Live Hack video with Arlene? 1. Stop reusing passwords - when you reuse your password and it shows up in a data breach, I can then use that password against you everywhere it's reused online and simply log in as you stealing money, access, data, etc. 2. Turn on multi-factor authentication (MFA) - turning on this second step when you log in makes it more obnoxious for me to takeover your accounts. I then have to try and steal your MFA codes from you (or if you use a FIDO MFA solution like a Yubikey etc, I'm likely just plain out of luck and have to move on to another target)! 3. Recognize that AI has made attacks more believable and scalable - will every or even most hacks involve AI? Nope! Most attacks are simple and leverage your breached passwords to log in as you or they attack via phishing over email, text, call, etc. That being said, it's important to realize that some attackers will attempt to leverage AI, especially if you have an high threat model. Arlene is a star with millions of followers around the world, because of this she has to be extra politely paranoid about those that reach out with sensitive requests! If someone with a high threat model (in the public eye, job is to wire money, lots of followers on social media, activist/being targeted, etc) receives a call and they're requesting sensitive info or a wire transfer, recognize that the attacker could believably use a voice clone in that call and could even build a believable deepfake for a live video call. This is not how all attacks work but it's especially important for those with elevated threat models to recognize that AI can be leveraged in attacks to up the believability with voice clones, deepfake video, etc. What do I mean "be politely paranoid" in this video? I recommend verifying that people are who they say they are before taking sensitive actions. - If you have a high threat model and someone calls you and asks for a wire transfer, use another method of communication to confirm it's them before taking action. Chat them, signal message, email, call them back to thwart spoofing using the number you have on file. This catches me 9 times out of 10 when I'm hacking! This is relevant for your work, when you're buying a house, pretty much anytime you need to send money! - If you receive an email from a board member asking for a copy of a sensitive document, verify that board member is who they say they are with another method of communication before sending over a document with sensitive work details listed on it. Stay politely paranoid, folks!

Infosec Exchange
Really love when your EDR makes your fleet less secure in entirely predictable ways.
I’ll tell you, no one is more hyped about AI than the sales teams selling it and the sales teams buying it…

Awesome! @semiphemeral now has an account on Mastodon!  

This is an official account!
Give this amazing tool a follow fellow privacy friends!   

#Semiphemeral #Birdsite #Privacy

Holy shit that’s a lot of balloons

Now that Joe Biden Stepped Down for the Good of the Country, Joe Kahn Must Join Him

https://www.emptywheel.net/2024/07/24/now-that-joe-biden-stepped-down-for-the-good-of-the-country-joe-kahn-must-join-him/

Now that Joe Biden Stepped Down for the Good of the Country, Joe Kahn Must Join Him - emptywheel

In its serial demands on Joe Biden and other Democrats "for the good of the country," the NYT keeps demanding that politicians do its job in holding Trump accountable, even while failing to do its part. If Joe Kahn's NYT won't meet NYT's own standards for reporting on Trump, he must step down.

emptywheel