Article seems to be behind a paywall.
Article seems to be behind a paywall.
I can’t say I agree with your opinion, but that’s what this community is all about and it’s pretty brave of you going out there 🙃.
Looks like you won today’s unpopular opinion! You can collect your downvotes at the door 😅.
Link leads to a 404.
Typically you put your independent variable on the X axis and the dependent on the Y. It now looks as if the more urgently you need to go, the closer people get to toilets (which, while not linear, will probably also be correct)
This concerns Veilid, to be announced in detail at defcon. Looks like the focus will be messaging apps, it’s not a general secure SDLC framework. Looks to be more of a platform/protocol.
Scientists are evil and just enjoy giving mice Alzheimer’s.
For those who didn’t read the article, so far it’s only being tested in mice with promising results.
The downvotes are a hilarious way to show you’ve found yourself an unpopular opinion. Congrats I guess.
This is really good fun. The bonus level is absolutely brutal though and I’m getting nowhere with it.
Probably not for real.
I use it as a way to discover new communities. Any recommendations on how you manage your subscription without looking at all from time to time?
Better use a cipher then for your pen and paper transmission. Invisible ink as well.
Password rotation isn’t necessary anymore according to NIST. Use long/strong unique passwords combined with MFA.
Furthermore, public wifi risk is overblown. As long as you ensure encrypted communication, you’re good.
This has no direct effect on privacy by the way.
Source: I’m an information Security manager.
You can escape from them by rooting your phone and installing a different OS. If you don’t do that, you’re at the whim of Xiaomi and its corporate deals.
Installing another OS is not without risk and requires some technical skills though.
“I have accepted my roll in society”*
Such a missed opportunity
The 1990s just called. They want their article back.
No one is still running a lot of bare metal. Everything is virtualized at the bare minimum, or containerized or Serverless code.
Furthermore the article doesn’t really teach you anything new except for the existence of the hypervisor layer. Threats and controls are mostly the same between physical and virtualized.
:Edit: just saw you wrote this article. Sorry for the harsh criticism, but I stand by it. Try to be more accurate with your threat and control assessments or write about more niche technology.
They’re probably using MS exchange /s
It’s much shorter. Definitely not a bigger fish 🧙♂️
I use alt 0160 for a non-line breaking space.