This is from the #HackerOne #Hacker101 CTF challenge.
What does this mean? When can I expect an invitation? I've read their documentation at https://docs.hackerone.com/hackers/hacker101.html but they don't explain what private programs are...
@thegibson bro thanks for your boost. Lots of people followed me afterwards because of it. 🤗
https://www.schneier.com/blog/archives/2019/04/china_spying_on.html No more surveillance monopoly for the NSA...
⚠️Security Announcement ⚠️
If you run an instance with federation enabled, please make sure you are running version v0.8.4 (released 2 weeks ago) or newer.
If you are running an older version than 0.8.4, we recommend updating ASAP.
More details will be released in a few days.
In the US they are looking for "solutions" that opens encrypted data to law enforcement. A Backdoor for the "good guys" only is impossible. Encryption must remain strong and unbreakable, here's why: https://tutanota.com/blog/posts/why-a-backdoor-is-a-security-risk
https://gizmodo.com/silicon-valley-and-the-fbi-take-their-encryption-fight-1833069827
Users should never have to give their encryption keys to a third party. It’s time for @microsoft to #FixItAlready https://fixitalready.eff.org/win10
I should add: #BOINC is not a single project, but a platform for volunteer distributed computing. There are lots of projects in the platform that are already changing the world. From cancer to climate change research, extraterrestrial life search through radio waves and astronomy related topics. See the full list here: https://boinc.berkeley.edu/wiki/Project_list
Friendly reminder: #BOINC is a great project to contribute your otherwise idle computing power.
You can set complex scheduling options, either by time of day, battery level, non-BOINC CPU usage, mouse and keyboard activity and so on. This way, it won't take up all your resources when you're compiling or playing videogames.
You can also configure it to only take a percentage of the CPU, a specific core count, or only allow it to run in bursts.
Contribute today!
Bingo, finally got the CVE services enabled, scanning, and generating reports.
Here you have it folks. This replaces threatstack, nessus, and a few other things once I figure out how to configure all the bells and whistles. Some added benefit if you're monitoring for PCI DSS, GDPR or just want some general tips on how to harden your system per guidelines.
Pretty happy I looked at this and took a deep dive.
From Twitter
Mastodon cross-posting should be working now... Hello from Twitter, Fediverse!
Follow me on https://twitter.com/L1Cafe
Twitter cross-posting should be working now... Hello from the Fediverse, Twitter!
Follow me on https://social.privacytools.io/@L1Cafe
Ever since I was 7 years old, I've been interested in computers, the Internet, and more recently, cybersecurity and social engineering.
I strive to become an excellent cybersecurity engineer. I'm always eager to learn and love meeting new people with similar interests. Feel free to drop me a DM!
For more information, please check out my personal blog: https://L1Cafe.blog.
It is proven! I am l1cafe on Keybase: https://keybase.io/l1cafe/sigchain#934307bab3a59c98d7039af09edcd416ccff06f36a595333dccd79d3eb81f81b0f
#ComputerScience & #Engineering student, #cybersecurity enthusiast, #privacy advocate.
I blog about CTFs and system administration. Sometimes a bit of reverse engineering as well.
Posts are my own and do not represent the views of my employer.