Synology SSH Security Fail
Synology made a brain-dead decision that undermines privilege separation, a fundamental concept in IT security.
Synology made a brain-dead decision that undermines privilege separation, a fundamental concept in IT security.
This is a quick guide on how to create and verify signatures with GnuPG (in a terminal).
There are different kinds of cloud drives, with different levels of reliability, maintenance, cost and privacy... and the state of things is not pleasing.
Do not use Apple's "Hide My Email" together with ProtonMail, or your real address can leak.
Why you shouldn't use SKS, and what to use instead.
A guide to easily prevent ZFS leaks.
You probably heard of the Log4j vulnerability by now, and you probably know that (the original) Minecraft is written in Java, and so is the server, and it uses Log4j. So, Minecraft servers are affected by this. I do run a small Minecraft server network (https://www.bitloco.org) but I haven't had [...]
In today's article, I'd like to talk about the pros and cons of sideloading, playing devil's advocate, offering a counter-argument and finally a possible solution to allow it in a secure fashion. Craig Federighi, Apple's current Senior Vice President of Software Engineering said in the Web Summit 2021: "Sideloading is [...]
Brief Today I'll show you how to set up PGP WKD (Web Key Discovery), to easily distribute your public key, so that anyone who has your email address will be able to get your public key (in some cases automatically) while being reasonably sure that it's the real key. Requirements [...]
Apple just released iOS 14.8, which comes as a surprise considering we're expecting iOS 15 any day now. Since iOS 6, Apple released every new version of iOS in mid-September, and we expect no different this year. So, why release iOS 14.8 on September 13th? What's even more interesting is, [...]