Sécurité & informatique
  • Sécurité & informatique
  • Tag cloud
  • Picture wall
  • Daily
  • RSS Feed
  • Login
Delete   Set public   Set private   Add tags   Delete tags
  Add tag   Cancel
  Delete tag   Cancel

Picture Wall - 22 pics

"Face à l’IA générative, l’objection de conscience" et quelques réponses
L'Intelligence Artificielle Générale (AGI) comme complotisme et comme complot
De l'intérêt de séparer les privilèges d'exécution et d'installation (dans "Supply Chain Attacks on Linux distributions - Fedora Pagure)
Bring your own key (BYOK) was a lie! (Edgeless Systems)
webext-signed-pages: A browser extension to verify the authenticity (PGP signature) of web pages (github)
Is Ethical Advertising Possible? – Purism
CVE-2021-21261: Flatpak sandbox escape via spawn portal · Advisory · flatpak/flatpak · GitHub
The docker.io Debian package is back to life
Post-mortem and remediations for Apr 11 security incident | Matrix.org
How does ssh ProxyCommand actually work?
PHP-FPM local root vulnerability
Travis CI exposait des secrets informatiques à du code non arbitraire
HTTP/2: The Sequel is Always Worse | PortSwigger
ChaosDB: How we hacked thousands of Azure customers’ databases | Wiz Blog
NO STARTTLS
Microsoft ADCS – Abusing PKI in Active Directory Environment - RiskInsight
Your Phone Is Your Castle – Purism
SELECT code_execution FROM * USING SQLite; | 36c3
Very Pwnable Network (VPN) - media.ccc.de
The Future of Software Supply Chain Security – Purism
Why Was SolarWinds So Vulnerable to a Hack? - Bruce Schneier - Opinion - The New York Times
Google’s FLoC Is a Terrible Idea - EFF
Shaarli · The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community · Documentation
Fold Fold all Expand Expand all Are you sure you want to delete this link? Are you sure you want to delete this tag? The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community