GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Embed Notice

HTML Code

Corresponding Notice

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 05-Mar-2024 08:36:59 JSTKevin BeaumontKevin Beaumont
    in reply to

    https://arstechnica.com/security/2024/03/hackers-exploited-windows-0-day-for-6-months-after-microsoft-knew-of-it/

    Ars has a good look at this one.

    My take - it may well have been a bunch of technical work to fix the vulnerability, absolutely. But Microsoft can afford to resource this stuff - it’s one of the most profitable companies on earth, and they end to end own and create 100% of the code.

    To again repeat one plea for vulnerability researches - publish public timelines on blogs about disclosures. It would create visibility of how long fixes take, and encourage accountability.

    In conversationabout a year ago from cyberplace.socialpermalink

    Attachments


    1. Domain not in remote thumbnail source whitelist: cdn.arstechnica.net
      ars | Ars Technica
      Serving the Technologist for more than a decade. IT news, reviews, and analysis.
    2. VineBeat™
      from VineBeat
      VineBeat - We create and invent the future
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.