@dansup How do you intend on making Loops continued development sustainable over time?
It's one thing to support creators, and I'm obviously all for it, but would also argue that it's quite important that the platform gets sufficient support as well!
@dansup I'm quite excited about this. Because I have decided to put online a "controlled" environment for my daughter and her friends at school, and involve other parents in "responsible" use of Social Media.
I want to give them the opportunity to make and share videos, but at the same time allow them a more ... slow and control progression towards a federated instance.
So for me Loops in a non-federated configuration is ideal (at the moment)! ;-)
Thank you so much for building this. I can't wait to tell my daughter that she is finally going to get "TikTok"... ;-)
@evan I don't like the premise, 'speaking negatively'.
You can certainly speak critically and constructively about another network but ultimately why?
Let's continue to evolve the network we're on and speak constructively about how to make THIS better instead of focusing our limited energy on how the other ones are wrong.
I've done my fair share of bashing of BSky for example, but I've come to realize... I don't know enough to make assertions about other networks.
I only know that I like the "ideals" behind ActivityPub and it resonates with me on a deeper level than what other networks have done.
... I'm ranting. Let's stop focusing on other networks, and focus more on "our own" and make this one better. That's all I'm trying to say I guess.
I genuinely think that #Passkeys may be the first and only real solution in decades to have a chance at replacing the password/MFA issues.
It will work for individuals as well as organizations and their employees.
Until then we'll have to accept reality which is compromised private computers leaking credentials, and having enforced MFA will help in some instances.
Smart cards has never, imho, been a realistic solution to almost any organisations; ever.
@argv_minus_one Impractical, expensive, not especially user friendly. Sure they are secure, but there are so many other things (again, imho) that makes them not ideal to use for carrying user identities. @GossiTheDog
A short descriptive article about Evilginx and how stealing credentials work, a few suggested ways of detecting etc.
Summary: This article examines Evilginx, a tool that leverages the legitimate nginx web server to conduct Adversary-in-the-Middle (AitM) attacks that can bypass multifactor authentication (MFA). The tool works by proxying web traffic through malicious sites that mimic legitimate services like Microsoft 365, capturing not only usernames and passwords but also session tokens. The article demonstrates how Evilginx operates, showing how attackers can gain full access to a user's account even when protected by MFA. It provides detection methods through Azure/Microsoft 365 logs and suggests both preemptive and reactive mitigations, emphasizing the need to move toward phishing-resistant FIDO2-based authentication methods.
The attack involved compromising the v1 tag of reviewdog/action-setup between March 11th 18:42 and 20:31 UTC. Unlike the tj-actions attack that used curl to retrieve a payload, this attack directly inserted a base64-encoded malicious payload into the install.sh file. When executed, the code dumped CI runner memory containing workflow secrets, which were then visible in logs as double-encoded base64 strings. The attack chain appears to have started with the compromise of reviewdog/action-setup, which was then used to compromise the tj-actions-bot Personal Access Token (PAT), ultimately leading to the compromise of tj-actions/changed-files. Organizations are advised to check for affected repositories using GitHub queries, examine workflow logs for evidence of compromise, rotate any leaked secrets, and implement preventive measures like pinning actions to specific commit hashes rather than version tags.
Father, husband, Swedish and cyber. Oh man, all the things cyber but mostly threat Intelligence. Dabble with Python. In the cyber field as a professional since 2001.Cyber Security all the way... let's go!! Founder of the Cyber Espresso (https://www.cyberespresso.eu)