Sécurité & informatique
Sécurité & informatique
Tag cloud
Picture wall
Daily
RSS Feed
Login
Delete
Set public
Set private
Add tags
Delete tags
Add tag
Cancel
Delete tag
Cancel
Remember me
Picture Wall - 19 pics
Bring your own key (BYOK) was a lie! (Edgeless Systems)
webext-signed-pages: A browser extension to verify the authenticity (PGP signature) of web pages (github)
Is Ethical Advertising Possible? – Purism
CVE-2021-21261: Flatpak sandbox escape via spawn portal · Advisory · flatpak/flatpak · GitHub
The docker.io Debian package is back to life
Post-mortem and remediations for Apr 11 security incident | Matrix.org
How does ssh ProxyCommand actually work?
PHP-FPM local root vulnerability
Travis CI exposait des secrets informatiques à du code non arbitraire
HTTP/2: The Sequel is Always Worse | PortSwigger
ChaosDB: How we hacked thousands of Azure customers’ databases | Wiz Blog
NO STARTTLS
Microsoft ADCS – Abusing PKI in Active Directory Environment - RiskInsight
Your Phone Is Your Castle – Purism
SELECT code_execution FROM * USING SQLite; | 36c3
Very Pwnable Network (VPN) - media.ccc.de
The Future of Software Supply Chain Security – Purism
Why Was SolarWinds So Vulnerable to a Hack? - Bruce Schneier - Opinion - The New York Times
Google’s FLoC Is a Terrible Idea - EFF
Fold
Fold all
Expand
Expand all
Are you sure you want to delete this link?
Are you sure you want to delete this tag?
The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community