105 Followers
171 Following
1.1K Posts
Founder ofhttps://kilpi.tech
Personal websitehttps://nyman.re

Love them or hate them, SOC 2 reports have become table stakes for SaaS deals. But the framework leaves the vendor in control of the system boundary and auditor selection, which means the reports vary drastically in rigor.

I wrote about what that structural gap means for vendors trying to build credible programs and buyers trying to evaluate them:

https://zeltser.com/soc2-checkbox-reality/

#cybersecurity #infosec #SOC2 #riskmanagement #TPRM

Understand the Reality of the SOC 2 Checkbox

SOC 2 standardized security reporting, but it left the vendor in control of the system boundary and auditor selection. Understanding that structural gap helps vendors and buyers get the most value from the framework.

Lenny Zeltser

#Baltic Friends!

I'm going to be travelling starting in #Helsinki and then working my way through #Estonia, #Latvia, and #Lithuania mid-June through mid-July this summer. While I expect most schools will be on vacation, I'm still looking for any interesting #UX groups/teams that I could visit. Please feel free to pass my name along to anyone.

I have a persistent little botnet that has been hammering my non-standard ssh-port on my personal VPS for a while since it found it some weeks ago. For a long time I just ignored it, but today I decided to fight back a little.

First, I had claude write me a little script to fetch abuseipdb and turn it into a ipset rule to block everything before it even hits the server. But turns out the free level of abuseipdb only includes the top 10k ones. So I included a otx one also, but still did not catch all of them. Now I added blocklist.de which had the last ones. Let's see where that takes us.

Why am I doing this you might wonder? Is getting your ssh brute forced not part of life on the internet?

Probably, but I like making life hard for attackers even if it's mostly symbolic. First I had a ssh-tarpit with the hopes that it would tie up the scanners, but I think most scanners nowadays written in vibed in golang and it handles concurrency without trouble.

So next I thought I'd impose some cost on their botnet, by reporting them to abuseipdb. If that "burns" their IP and forces them to find a new one, then it's a win. But I was still getting too many connections that was already on the list, so me saying +1 it's bad was not adding much value.

So I thought, what if I block "all" the "known" ones. That means that if someone gets through and reported to abuseipdb, maybe that was a clean address that is now marked bad and might not work against others.

I guess it's like trying to put out a forest fire with a bucket of water, but it's at least something. And at least it cuts down on the noise on my server 10x.

European #DigitalRights is looking for interested candidates to become a member of the @edri Board. As Board Member, you will help shape the future of the organisation and the network and advance its mission to promote and protect #HumanRights in the digital environment.

https://edri.org/take-action/careers/call-for-nomination-edri-board-elections-2026/

Call for Nomination – EDRi Board elections 2026 - European Digital Rights (EDRi)

EDRi GA will this year elect two Board members to replace two outgoing Board members to help shape the future of the organisatation.

European Digital Rights (EDRi)

RE: https://hachyderm.io/@jenniferplusplus/116135395660222954

Incredibly useful explanation of what’s really behind the curtain.

RE: https://infosec.exchange/@rebane2001/116123227412288110

At what point did CSS become Turing complete any why?

Seems like unnecessary complexity but what is I know

I still use <center>

because it's great and does exactly what it says, you can try prying it from my aging hands ...

22,000+ incidents in the Verizon DBIR. Man-in-the-middle? Less than 4%, mostly phishing proxies. Not TLS interception.

Forward Secrecy killed "record now, decrypt later." So what actually compromises your connections?

https://www.certkit.io/blog/man-in-the-middle

#cybersecurity #TLS

How likely is a man-in-the-middle attack?

A stolen TLS private key sounds catastrophic. But thanks to forward secrecy, it can't decrypt recorded traffic. The only thing left is server impersonation, and that requires network position that ranges from "be in the same room" to "be a nation-state." We looked at the data on how often this actually happens.

CertKit SSL Certificate Management
Crisp morning in Helsinki +/- 10 degrees F/C

Feels like the anti-age verification people are shooting themselves in the foot without realising it.

Companies need to follow the law (if you disagree with the law, talk to the politicians, don't blame the companies).

Discord decided to use k-id for age verification which seems very good for your privacy. It processes your data mostly client side and just sends the results.

So of course some entrepreneuring hackers figured out how to game it.

https://github.com/amplitudesxd/discord-k-id-verifier

Great job! So now you force them to do the verification on the server side, which requires uploading the raw data and processing it there, like linked-in is doing, which seems like a clearly worse thing. (To be fair Linked-In wants to verify your identity, not only your age category so apples vs oranges but the point still stands).

https://thelocalstack.eu/posts/linkedin-identity-verification-privacy/

#discord #ageverification #linkedin

GitHub - amplitudesxd/discord-k-id-verifier: stop intrusive access to your personal data due to the uk's online safety act

stop intrusive access to your personal data due to the uk's online safety act - amplitudesxd/discord-k-id-verifier

GitHub

RE: https://mastodon.social/@gnomon/116097462032963849

If discord pushes people to discover IRCv3 that sounds like a win for the world. Seems v3 has support for most "modern" things like threads and history.

Not many IRCv3 clients out there yet though for iOS, I just found two. But that's still twice as many as there are discord clients so.. win I guess :-)