@soatok Out of curiosity, would you please care explaining to me why you consider DNSSEC to be off-limits? I believe it is a key component to secure the ACME protocol, which is the basis of so many modern PKIs. I wouldn't know how to do in it without DNSSEC.
This is not me trying to evangelize about it, but trying to understand what are the alternatives? Do you consider that ACME is a mistake?
Notices by F. Maury ⏚ (x_cli@infosec.exchange)
-
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Sunday, 17-Nov-2024 17:17:36 JST F. Maury ⏚ -
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Thursday, 26-Sep-2024 22:59:43 JST F. Maury ⏚ @ryanc Yeah, but at the same time, the concurrent protocols was using ASN.1. So yeah. SMTP is kinda cool in regard.
-
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Tuesday, 17-Sep-2024 01:35:28 JST F. Maury ⏚ @Mer__edith
Yet, the flatpak is said to be published "by Signal Foundation". If that's not the case, the package is usurping Signal Foundation identity and people using Flatpak oriented distros are targeted by this usurper. Can you request a takedown, please?
@apicultor @briankrebs -
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Friday, 30-Aug-2024 16:43:04 JST F. Maury ⏚ @soatok It also shows a complete lack of understanding of the mindset of cryptographers.
Cryptographers call cryptanalysis breaking a few rounds of AES. They deprecate hashing algorithms at the first sign of weakness. I mean, MD5 has still no 2nd preimage attacks but the general recommandation is not no longer use it, even if this property still holds.
Cryptograhers do not wait for a vulnerability to be dramatically practical to raise flags. It just is the way it works. They take no chance, and I feel safer that way.
People need to understand that.
-
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Friday, 21-Jun-2024 06:29:39 JST F. Maury ⏚ @ryanc
Maybe they are not sure about your partner gender and neutral is neutral? -
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Monday, 09-Oct-2023 06:10:39 JST F. Maury ⏚ @feditips
Thanks. I did not know about that sort of groups.
One drawback I see is that such groups are centralized. If the provider goes dark, members would lose everything. Hashtags are decentralized by nature and thus would be more resilient. Am I missing something? -
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 23-Nov-2022 08:08:28 JST F. Maury ⏚ @jerry I am strongly against this kind of lists. I chose this instance because I trust your judgement and your moderation policy. Outsourcing censorship feels dangerous.
-
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 23-Nov-2022 08:08:26 JST F. Maury ⏚ @feld @jerry I do not. Open networks are bound to fail. The issue is with open networks as a concept.
-
Embed this notice
F. Maury ⏚ (x_cli@infosec.exchange)'s status on Wednesday, 23-Nov-2022 08:08:23 JST F. Maury ⏚ @cafkafk @feld @jerry Can you please name one open network of significant size that is not crippled by spam, please?