musician.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon site for Musicians and people into Music

Administered by:

Server stats:

147
active users

#itsec

3 posts3 participants1 post today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@0xF21D" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>0xF21D</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@morattisec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>morattisec</span></a></span> yeah, I think that <a href="https://infosec.space/tags/regulators" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>regulators</span></a> like <span class="h-card" translate="no"><a href="https://ec.social-network.europa.eu/@EUCommission" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>EUCommission</span></a></span> &amp; <span class="h-card" translate="no"><a href="https://social.bund.de/@bsi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bsi</span></a></span> need to clamp down <em>way harder</em> on <a href="https://infosec.space/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> and other <a href="https://infosec.space/tags/SaaS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SaaS</span></a> as well as <a href="https://infosec.space/tags/CCSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CCSS</span></a> than they do on <a href="https://infosec.space/tags/FLOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FLOSS</span></a> and make them own up to their <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> failures because unlike <a href="https://infosec.space/tags/OpebSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpebSource</span></a> they monopolize <a href="https://infosec.space/tags/SourceCodeAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SourceCodeAccess</span></a> <em>and</em> also don't have the excuse of not being able to maintain it as they have billions on their hands and thousands of talented staff…</p>

That cybersec expert I met recently agreed that what computers need is an immune system; a way to know "Me" from "Not me", even for stuff inside the system - current security can only try to stop "Not me" from getting in; once inside the defenses, it runs right alongside actual "Me" code.

In that light AI, and especially agents, is literally the opposite of a computer immune system.

Which is just one of the legio reasons it's such a bad idea.

#AI#itsec#cybersec
Replied in thread

@Dendrobatus_Azureus personally, I think it's high time that #ISPs will force customers to take #ITsec seriously and terminate connections upon abuse reports.

Not that I'd take #AbuseReports by #RogueISP|s like #CloudFlare serious anyway but I've yet to find any #ISP that doesn't allow them to terminate services at any time without warning if the services are used against their ToS and every #B2C / #consumer ISP explicitly bans #DDoS, #malware distribution and #hacking in said Terms of Service.

  • And yes I've seen cases where ISPs (most notably #DTAG) did terminate connectivity following a malware infection and #Spamming from a consumer's #DSL line.

Sounds harsh but #LackOfAccountability & #LackOfConsequences got us here!

OSINT confirms that #Qubic is lying and did not achieve a #51Percent majority in the #Monero network.

  • Which I was already certain didn't happen!

At peak they had 40%, and as of that post only about 30%

  • Which is still too much but still…

#TLDR: Qubic used "#SelfishMining" and had a streak of luck! Not to mention said blicks didn't get included in the blockchain anyway, so all it did was "#LyingWithNumbers" in some stats that rely on self-reported claims instead of actual evidence.

IOW: Just because one got 51 of 100 blocks at some arbitrary timeframe doesn't mean one "owns" 51% of the network hashrate!

Already the cost of this operation is estimated to be U$D 150M per day to fake sad #51PercentAttack and the success entirely predicated on #FUD.

Replied in thread

@molly0xfff and even if said Person/Company disliked the reporting, unless they're doing #Monero it would be trivial to search and find said details, espechally since they're not some smol retail investor nor darknet drug lord, so yeah...

youtube.com/watch?v=x7gaqhF-wr
web.archive.org/web/2023040710

Hm. Vor paar Tagen massive Einbruchsversuche in meinen dovecot (POP3), und zwar mit einer Mailadresse, die ich nur gegenüber einer bestimmten Firma angegeben habe. Ich leg mir tatsächlich mittlerweile für jede Firma/Orga eigene Mailadressen unter meiner Domain an.

Firma behauptet: Bei uns isse nich' weggekommen, es sei alles dicht und auf dem aktuellen Stand.

Un' nu?