mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#security

342 posts229 participants10 posts today
Pyrzout :vm:<p>RaaS Explained: How Cybercriminals Are Scaling Attacks Like Startups – Source:hackread.com <a href="https://ciso2ciso.com/raas-explained-how-cybercriminals-are-scaling-attacks-like-startups-sourcehackread-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/raas-explained-h</span><span class="invisible">ow-cybercriminals-are-scaling-attacks-like-startups-sourcehackread-com/</span></a> <a href="https://social.skynetcloud.site/tags/1CyberSecurityNewsPost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>1CyberSecurityNewsPost</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.skynetcloud.site/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://social.skynetcloud.site/tags/Hackread" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackread</span></a> <a href="https://social.skynetcloud.site/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://social.skynetcloud.site/tags/Startups" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Startups</span></a> <a href="https://social.skynetcloud.site/tags/RaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaaS</span></a></p>
Peter N. M. Hansteen<p>erspan(4) committed to -current <a href="https://www.undeadly.org/cgi?action=article;sid=20250515044548" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250515044548</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/erspan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>erspan</span></a> <a href="https://mastodon.social/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/packetcapture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>packetcapture</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/monitoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>monitoring</span></a> <a href="https://mastodon.social/tags/development" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>development</span></a> <a href="https://mastodon.social/tags/newfeature" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newfeature</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libresoftware</span></a></p>
heise Security<p>Datenleck: Zehntausende BVG-Kundendaten betroffen</p><p>Kriminelle haben möglicherweise zahlreiche Kundendaten bei einem BVG-Dienstleister erbeutet. Die Untersuchung des Vorfalls läuft.</p><p><a href="https://www.heise.de/news/Datenleck-Zehntausende-BVG-Kundendaten-betroffen-10384126.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Datenleck-Zehnta</span><span class="invisible">usende-BVG-Kundendaten-betroffen-10384126.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Datenleck" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenleck</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Lobsters<p>Breaking out of restricted mode: XSS to RCE in Visual Studio Code <a href="https://lobste.rs/s/h9ypzn" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/h9ypzn</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/editors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>editors</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://starlabs.sg/blog/2025/05-breaking-out-of-restricted-mode-xss-to-rce-in-visual-studio-code/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">starlabs.sg/blog/2025/05-break</span><span class="invisible">ing-out-of-restricted-mode-xss-to-rce-in-visual-studio-code/</span></a></p>
Leon P Smith<p>I've written major new sections concerning deployment issues surrounding the G3P in a typical client-side password hashing scenario.</p><p>I touch on:</p><p>1. Second Secrets and 2SKD</p><p>2. Account Separation</p><p>3. Vagaries of public salt servers<br> <br>4. Private Salts</p><p>5. Dynamic testing</p><p>6. Login page testing</p><p>7. Passphrase Generation</p><p>8. Passphrase Assistance</p><p>9. External Checksums</p><p>10. Smartphone on-screen keyboards</p><p>11. Virtual Memory</p><p>Whew! If you have any interest in these topics, let me know what you think!</p><p><a href="https://github.com/auth-global/self-documenting-cryptography/blob/26abe8f9c9a559c02304f8ab7b5b144c36668738/design-documents/g3pb2.md#deployment-considerations" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/auth-global/self-do</span><span class="invisible">cumenting-cryptography/blob/26abe8f9c9a559c02304f8ab7b5b144c36668738/design-documents/g3pb2.md#deployment-considerations</span></a></p><p><a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://ioc.exchange/tags/password" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>password</span></a> <a href="https://ioc.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://ioc.exchange/tags/e2ee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>e2ee</span></a></p>
Marcus Adams<p>Headline: North Korea Stole Your Job</p><p>Subtitle: For years, North Korea has been secretly placing young IT workers inside Western companies. With <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a>, their schemes are now more devious—and effective—than ever.</p><p>Source: <a href="https://www.wired.com/story/north-korea-stole-your-tech-job-ai-interviews/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/north-korea-st</span><span class="invisible">ole-your-tech-job-ai-interviews/</span></a></p><p>Archive Link: <a href="https://archive.is/j6LmH" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.is/j6LmH</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
Pyrzout :vm:<p>RaaS Explained: How Cybercriminals Are Scaling Attacks Like Startups <a href="https://hackread.com/raas-explained-cybercriminals-scaling-attacks-startups/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/raas-explained-cy</span><span class="invisible">bercriminals-scaling-attacks-startups/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.skynetcloud.site/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/Startups" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Startups</span></a> <a href="https://social.skynetcloud.site/tags/RaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaaS</span></a></p>
Paco Hope #resist<p>OMG. <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Copilot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Copilot</span></a> bypasses <a href="https://infosec.exchange/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sharepoint</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> so you don’t have to! </p><p>“CoPilot gets privileged access to SharePoint so it can index documents, but unlike the regular search feature, it doesn’t know about or respect any of the access controls you might have set up. You can get CoPilot to just dump out the contents of sensitive documents that it can see, with the bonus feature* that your access won’t show up in audit logs.”</p><p>The S in CoPilot stands for Security!</p><p><a href="https://pivotnine.com/the-crux/archive/remembering-f00fs-of-old/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pivotnine.com/the-crux/archive</span><span class="invisible">/remembering-f00fs-of-old/</span></a></p>
IT News<p>'Aggressive' Hackers of UK Retailers Are Now Targeting US Stores, Says Google - Google has warned that the hacker group known as "Scattered Spider," which recentl... - <a href="https://it.slashdot.org/story/25/05/14/224205/aggressive-hackers-of-uk-retailers-are-now-targeting-us-stores-says-google?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">it.slashdot.org/story/25/05/14</span><span class="invisible">/224205/aggressive-hackers-of-uk-retailers-are-now-targeting-us-stores-says-google?utm_source=rss1.0mainlinkanon&amp;utm_medium=feed</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Marcus Adams<p>Sounds more like somebody probably figured out what service they used to send out SMS messages and were able to breach that third party vendor. If attackers had other information on specific users they were targeting this could have been a part of that. I know a friend whose Steam account recently got hacked despite having 2FA enabled.</p><p>Headline: Following data leak, <a href="https://mastodon.social/tags/Valve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Valve</span></a> assures <a href="https://mastodon.social/tags/Steam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steam</span></a> users that its systems were not breached</p><p>Source: <a href="https://www.neowin.net/news/following-data-leak-valve-assures-steam-users-that-its-systems-were-not-breached/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">neowin.net/news/following-data</span><span class="invisible">-leak-valve-assures-steam-users-that-its-systems-were-not-breached/</span></a></p><p><a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
GrapheneOS<p>Vanadium version 136.0.7103.125.0 released:</p><p><a href="https://github.com/GrapheneOS/Vanadium/releases/tag/136.0.7103.125.0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/GrapheneOS/Vanadium</span><span class="invisible">/releases/tag/136.0.7103.125.0</span></a></p><p>See the linked release notes for a summary of the improvements over the previous release and a link to the full changelog.</p><p>Forum discussion thread:</p><p><a href="https://discuss.grapheneos.org/d/22476-vanadium-version-136071031250-released" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discuss.grapheneos.org/d/22476</span><span class="invisible">-vanadium-version-136071031250-released</span></a></p><p><a href="https://grapheneos.social/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GrapheneOS</span></a> <a href="https://grapheneos.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://grapheneos.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://grapheneos.social/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a></p>
unixbhaskar<p>For your curiosity's sake..😜</p><p>Context: Yesterday's video shortcoming....fixed</p><p><a href="https://youtu.be/nEbb5aAS9cE" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/nEbb5aAS9cE</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/linuxadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxadmin</span></a> <a href="https://mastodon.social/tags/tool" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tool</span></a> <a href="https://mastodon.social/tags/dmenu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dmenu</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
GamingOnLinux<p>There's been reports of a Steam data breach recently, and instead of jumping the gun I reached out to Valve first to see what was going on. Here's a statement from Valve.<br><a href="https://www.gamingonlinux.com/2025/05/heres-a-statement-from-valve-on-the-reported-steam-data-breach/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gamingonlinux.com/2025/05/here</span><span class="invisible">s-a-statement-from-valve-on-the-reported-steam-data-breach/</span></a></p><p><a href="https://mastodon.world/tags/Steam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Steam</span></a> <a href="https://mastodon.world/tags/Valve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Valve</span></a> <a href="https://mastodon.world/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.world/tags/Misc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Misc</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Insight: Rogue communication devices found in <a href="https://hachyderm.io/tags/Chinese" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chinese</span></a> <a href="https://hachyderm.io/tags/solar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>solar</span></a> power inverters<br>Using the rogue communication devices to skirt firewalls and switch off inverters remotely, or change their settings, could destabilise <a href="https://hachyderm.io/tags/powergrids" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>powergrids</span></a>, damage <a href="https://hachyderm.io/tags/energy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>energy</span></a> infrastructure, and trigger widespread <a href="https://hachyderm.io/tags/blackouts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blackouts</span></a>, experts said. "That effectively means there is a built-in way to physically destroy the grid," one of the people said.<br><a href="https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reuters.com/sustainability/cli</span><span class="invisible">mate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/</span></a><br><a href="https://hachyderm.io/tags/espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espionage</span></a> <a href="https://hachyderm.io/tags/china" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>china</span></a> <a href="https://hachyderm.io/tags/itsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsec</span></a> <a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
ITSEC News<p>Google Chrome to block admin-level browser launches for better security - Google is rolling out a change to Chromium that "de-elevates" Google Chrome so it does no... <a href="https://www.bleepingcomputer.com/news/google/google-chrome-to-block-admin-level-browser-launches-for-better-security/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/goog</span><span class="invisible">le/google-chrome-to-block-admin-level-browser-launches-for-better-security/</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a></p>
IsThereAnyDeal<p>Lots of rumors of a Steam user data leak. TL;DR so far seems to be: don't worry about it, just make sure you are using Steam app 2FA.</p><p><a href="https://totalgamingnetwork.com/valve/3537559-no-your-steam-account-details-werent-stolen-or-leaked" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">totalgamingnetwork.com/valve/3</span><span class="invisible">537559-no-your-steam-account-details-werent-stolen-or-leaked</span></a></p><p><a href="https://www.xda-developers.com/89-million-steam-account-details-leak/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">xda-developers.com/89-million-</span><span class="invisible">steam-account-details-leak/</span></a></p><p><a href="https://mastodon.social/tags/steam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>steam</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/2fa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2fa</span></a></p>
ITSEC News<p>Hackers behind UK retail attacks now targeting US companies - Google warned today that hackers using Scattered Spider tactics against retail chains in ... <a href="https://www.bleepingcomputer.com/news/security/google-scattered-spider-switches-targets-to-us-retail-chains/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/google-scattered-spider-switches-targets-to-us-retail-chains/</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
heise online English<p>Intel: Another attack bypasses all previous CPU protection measures</p><p>Intel is on a roll: Another vulnerability opens up many processors to side-channel attacks again despite previous protective measures.</p><p><a href="https://www.heise.de/en/news/Intel-Another-attack-bypasses-all-previous-CPU-protection-measures-10383787.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Intel-Another</span><span class="invisible">-attack-bypasses-all-previous-CPU-protection-measures-10383787.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Prozessoren" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Prozessoren</span></a> <a href="https://social.heise.de/tags/Intel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intel</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/MeltdownundSpectre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MeltdownundSpectre</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Lobsters<p>Introducing oniux: Kernel-level Tor isolation for any Linux app <a href="https://lobste.rs/s/q919pi" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/q919pi</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://blog.torproject.org/introducing-oniux-tor-isolation-using-linux-namespaces/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.torproject.org/introducin</span><span class="invisible">g-oniux-tor-isolation-using-linux-namespaces/</span></a></p>
ComputerBase<p>Google zur I/O: Android-Geräte sollen mit neuen Funktionen sicherer werden <a href="https://www.computerbase.de/news/betriebssysteme/google-zur-io-android-geraete-sollen-mit-neuen-funktionen-sicherer-werden.92637/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computerbase.de/news/betriebss</span><span class="invisible">ysteme/google-zur-io-android-geraete-sollen-mit-neuen-funktionen-sicherer-werden.92637/</span></a> <a href="https://mastodon.social/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/androidshow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>androidshow</span></a></p>