| Pixelfed | https://pixelfed.social/schlamar |
| Pixelfed | https://pixelfed.social/schlamar |

Introduction The Incus team is pleased to announce the release of Incus 6.23! This release is going to be our last 6.x release before Incus 7.0 LTS which is due out on April 30th. It’s also quite a busy release with a good mix of security issues (mostly thanks to an ongoing analysis by 7asecurity), bug fixes and performance improvements and then a very good selection of features from expanding our OS support for VMs to adding more flexible instance storage with dependent volumes! As usual, ...
Last year, my position was that we still had time to design PQ authentication mechanisms.
Now, based on the pace of progress and on statements like Google's, I believe:
1. we need to finish rolling out PQ key exchange yesterday
2. we need to start rolling out PQ auth now
3. it's too late to ship any new non-PQ design or system
https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/
Hast du dich in letzter Zeit auch gefragt, ob dein Gedächtnis nachlässt? Ich hatte dieses Gefühl zuletzt öfter. Und es gefiel mir gar nicht.
Dann habe ich herausgefunden, woran das liegt. Ein Thread. 🧵
This is a crazy, developing story. And here you thought *your* organization's patch management routines were strict: From Christopher Kunz at Heise:
"A serious security vulnerability in the Windchill and FlexPLM products prompted a nationwide police response over the weekend. At the behest of the Federal Criminal Police Office (BKA), officers from across Germany were dispatched to alert affected companies – an unprecedented move. Administrators, whose weekends were disrupted, expressed their irritation – some of whom don't even use the compromised software."
"When the editorial team received a tip late Sunday morning about a critical security vulnerability in Windchill and FlexPLM , it sounded like a routine report: A deserialization vulnerability in specialized software, even with a CVSS score of 10, doesn't cause any alarm at heise security. The situation was apparently quite different at the Federal Criminal Police Office (BKA): By that time, they had already alerted the state criminal police offices (LKA) in various federal states, which dispatched police officers to affected companies during the night. As several readers reported to us in the forum , police officers were standing outside company and private premises in the dead of night."
https://www.heise.de/news/WTF-Polizei-rueckte-Samstagnacht-wegen-Zero-Day-aus-11221345.html
Eigentlich könnten wir hier ne geile Community gegen Rechts sein, aber manche essen Fleisch, manche sind geschminkt oder posten ohne ALT-Text & wieder andere fahren noch Benziner.
Seufz! 🤷🏼♀️
"Autofahrer ignorieren gesperrte Straße: Hunderte tote Feuersalamander in Wachenheim"
Wie war der Spruch, Menschen werden zu Arschlöchern, sobald sie ins Auto steigen?
(ja, ja, notall und so)
So @xaitax has cracked Microsoft Recall, he's got access to the encrypted database and has automated dumping of screenshots and all text from screenshots.
I've looked at most recent Recall and yep, you can just read the database as a user process. The database also contains all manner of fields which aren't publicly disclosed for tracking the user's activity.
No AV or EDR alerts triggered, world's #1 in infostealer 😅
* you can just read it in plain text