| Work home page | https://www.kiv.zcu.cz/~brada/ |
| Work home page | https://www.kiv.zcu.cz/~brada/ |
For my PKCS signing certificate I use the current Firefox user certificate store. First try: In the Tools-menu I click on “Digitally Sign…”. In the window that opens, I click OK. Now I’m being asked for a password. But no password works. Second try: In the Tools-menu I click on “Digitally Sign…”. In the window that opens, I first(!) click on the name of the certificate and then on OK. Now I can sign my PDF document. If there’s only one certificate, it’s not obvious that you have ...
We’re excited to announce that Mastodon 4.4 is now generally available as an upgrade for all Mastodon servers. The update brings improvements to profiles, navigation, list management, media controls, server moderation notes, and more.
I'll miss him.
"Greetings CVE Partners,
We wanted to let you know that thanks to actions taken by the government, a break in service for the Common Vulnerabilities and Exposures (CVE®) Program and the Common Weakness Enumeration (CWE™) Program has been avoided.
...
The CVE Services infrastructure will continue to operate as normal, as will updates to the CVE List and the cve.org website."
Harvard launched a new version of their site yesterday that highlights their pioneering researchers and the incredible work they do in response to the Trump admin targeting the school. https://www.harvard.edu/
What I love most about the new website is the idea of Web Design As Protest that 25yo me in the late 1990s would have loved.
I boosted several posts about this already, but since people keep asking if I've seen it....
MITRE has announced that its funding for the Common Vulnerabilities and Exposures (CVE) program and related programs, including the Common Weakness Enumeration Program, will expire on April 16. The CVE database is critical for anyone doing vulnerability management or security research, and for a whole lot of other uses. There isn't really anyone else left who does this, and it's typically been work that is paid for and supported by the US government, which is a major consumer of this information, btw.
I reached out to MITRE, and they confirmed it is for real. Here is the contract, which is through the Department of Homeland Security, and has been renewed annually on the 16th or 17th of April.
https://www.usaspending.gov/award/CONT_AWD_70RCSJ23FR0000015_7001_70RSAT20D00000001_7001
MITRE's CVE database is likely going offline tomorrow. They have told me that for now, historical CVE records will be available at GitHub, https://github.com/CVEProject
Yosry Barsoum, vice president and director at MITRE's Center for Securing the Homeland, said:
“On Wednesday, April 16, 2025, funding for MITRE to develop, operate, and modernize the Common Vulnerabilities and Exposures (CVE®) Program and related programs, such as the Common Weakness Enumeration (CWE™) Program, will expire. The government continues to make considerable efforts to support MITRE’s role in the program and MITRE remains committed to CVE as a global resource.”