If you use something like apt-transport-tor, try and fully onionize your sources.list. Doing this makes it much harder for adversaries to try and keep your machine from getting important updates because it means they will have to stop you from connecting to the entire tor network. Notice my connection to the Tor Project repo was reset by my circuit's exit.
Forwarded from Hacker News
Just set up a second Tor Exit Relay at 83.97.20.84 - relay fingerprint is B63665C357F10C9CFAC4489C443C2651C5609EF0. Should be up on the TorProject website under https://metrics.torproject.org/rs.html#details/B63665C357F10C9CFAC4489C443C2651C5609EF0 in a day or two.
Packet Pusher
Just set up a second Tor Exit Relay at 83.97.20.84 - relay fingerprint is B63665C357F10C9CFAC4489C443C2651C5609EF0. Should be up on the TorProject website under https://metrics.torproject.org/rs.html#details/B63665C357F10C9CFAC4489C443C2651C5609EF0 in a day…
Should probably be pushing ~20TB of traffic per month now.. 😃
Accurate time is incredibly important for cryptography. Things like certificates and pki all rely on having an accurate clock. NTP was never designed with security in mind, and a network-level adversary can manipulate normal plaintext NTP traffic in ways that would allow them to make your clock jump forward or backwards. Preventing this means your system needs a reliable source of time. NTS (Network Time Security) adds a layer of authenticated encryption to normal NTP which helps to mitigate the tampering part of this problem. Afaik, only Chrony and NTPsec provide NTS-secured NTP. I recommend Chrony because it is pretty straightforward to configure and reliable.
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_basic_system_settings/assembly_overview-of-network-time-security-in-chrony_configuring-basic-system-settings
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_basic_system_settings/assembly_overview-of-network-time-security-in-chrony_configuring-basic-system-settings
Red Hat Customer Portal
Chapter 32. Overview of Network Time Security (NTS) in chrony Red Hat Enterprise Linux 8 | Red Hat Customer Portal
Access Red Hat’s knowledge, guidance, and support through your subscription.
Forwarded from Sys-Admin InfoSec
/ Linux kernel: Heap buffer overflow in fs_context.c since version 5.1
- https://www.openwall.com/lists/oss-security/2022/01/18/7
- CVE-2022-0185 (demo) - https://github.com/Crusaders-of-Rust/CVE-2022-0185
/ GitHub Actions flaw that allowed code to be approved without review is addressed with new feature rollout
- https://portswigger.net/daily-swig/github-actions-flaw-that-allowed-code-to-be-approved-without-review-is-addressed-with-new-feature-rollout
- https://www.openwall.com/lists/oss-security/2022/01/18/7
- CVE-2022-0185 (demo) - https://github.com/Crusaders-of-Rust/CVE-2022-0185
/ GitHub Actions flaw that allowed code to be approved without review is addressed with new feature rollout
- https://portswigger.net/daily-swig/github-actions-flaw-that-allowed-code-to-be-approved-without-review-is-addressed-with-new-feature-rollout
GitHub
GitHub - Crusaders-of-Rust/CVE-2022-0185: CVE-2022-0185
CVE-2022-0185. Contribute to Crusaders-of-Rust/CVE-2022-0185 development by creating an account on GitHub.
Forwarded from BlackBox (Security) Archiv
The EU Wants Its Own DNS Resolver that Can Block ‘Unlawful’ Traffic
The EU is planning to develop its own government-run DNS resolver. The project dubbed DNS4EU is meant to offer a counterweight to the popular resolvers that are mostly based in the U.S. Aside from offering privacy and security to users, the DNS solution will also be able to block "illegal" websites, including pirate sites.
https://torrentfreak.com/the-eu-wants-its-own-dns-resolver-that-can-block-unlawful-traffic-220119/
#eu #dns
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The EU is planning to develop its own government-run DNS resolver. The project dubbed DNS4EU is meant to offer a counterweight to the popular resolvers that are mostly based in the U.S. Aside from offering privacy and security to users, the DNS solution will also be able to block "illegal" websites, including pirate sites.
https://torrentfreak.com/the-eu-wants-its-own-dns-resolver-that-can-block-unlawful-traffic-220119/
#eu #dns
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
The EU Wants Its Own DNS Resolver that Can Block 'Unlawful' Traffic * TorrentFreak
The EU is planning to develop its own government-run DNS resolver that can also be used to block unlawful websites.
BlackBox (Security) Archiv
The EU Wants Its Own DNS Resolver that Can Block ‘Unlawful’ Traffic The EU is planning to develop its own government-run DNS resolver. The project dubbed DNS4EU is meant to offer a counterweight to the popular resolvers that are mostly based in the U.S. Aside…
I don't see how this will accomplish anything when DNS resolvers like DnsCrypt-Proxy exist. At best, it would be a farce.
Encrypt your DNS. If you don't already, use Android's "Private DNS" feature under your network settings. If you're on Linux, use DnsCrypt-Proxy. If you use Chrome or FireFox, set up your browser to use DNSoverHTTPS.
If you are going to be publishing sensitive information, don't count on pixelation to safely redact information. Use full black-box redaction to safely redact stuff.
https://positive.security/blog/video-depixelation
https://positive.security/blog/video-depixelation
positive.security
Recovering redacted information from pixelated videos | Positive Security
We explore the history of image unblurring and present a simple yet effective technique to get a high-resolution image from a pixelated video in order to recover redacted information (with no guessing involved).
Packet Pusher
https://lilithwittmann.medium.com/bundesservice-telekommunikation-enttarnt-dieser-geheimdienst-steckt-dahinter-cd2e2753d7ca
AppleInsider
Apple's AirTag uncovers a secret German intelligence agency
A researcher has sent one of Apple's AirTags to a mysterious "federal authority" in Germany to locate its true offices — and to help prove that it's really part of an intelligence agency.