Sécurité & informatique
  • Sécurité & informatique
  • Tag cloud
  • Picture wall
  • Daily
  • RSS Feed
  • Login
Delete   Set public   Set private   Add tags   Delete tags
  Add tag   Cancel
  Delete tag   Cancel

Picture Wall - 19 pics

Bring your own key (BYOK) was a lie! (Edgeless Systems)
webext-signed-pages: A browser extension to verify the authenticity (PGP signature) of web pages (github)
Is Ethical Advertising Possible? – Purism
CVE-2021-21261: Flatpak sandbox escape via spawn portal · Advisory · flatpak/flatpak · GitHub
The docker.io Debian package is back to life
Post-mortem and remediations for Apr 11 security incident | Matrix.org
How does ssh ProxyCommand actually work?
PHP-FPM local root vulnerability
Travis CI exposait des secrets informatiques à du code non arbitraire
HTTP/2: The Sequel is Always Worse | PortSwigger
ChaosDB: How we hacked thousands of Azure customers’ databases | Wiz Blog
NO STARTTLS
Microsoft ADCS – Abusing PKI in Active Directory Environment - RiskInsight
Your Phone Is Your Castle – Purism
SELECT code_execution FROM * USING SQLite; | 36c3
Very Pwnable Network (VPN) - media.ccc.de
The Future of Software Supply Chain Security – Purism
Why Was SolarWinds So Vulnerable to a Hack? - Bruce Schneier - Opinion - The New York Times
Google’s FLoC Is a Terrible Idea - EFF
Shaarli · The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community · Documentation
Fold Fold all Expand Expand all Are you sure you want to delete this link? Are you sure you want to delete this tag? The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community