GNU social JP
  • FAQ
  • Login
GNU social JPใฏๆ—ฅๆœฌใฎGNU socialใ‚ตใƒผใƒใƒผใงใ™ใ€‚
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)

  1. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Sunday, 26-Oct-2025 03:58:44 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to

    There should be something like a nuclear clock that measures gamma emissions, but instead it measures the steady rate of women leaving tech

    In conversation about 3 days ago from infosec.exchange permalink
  2. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Sunday, 26-Oct-2025 03:58:44 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to

    Every month it is a little more tempting to walk into a forest, curl up under a tree, and become part of the mossy forest floor forever

    In conversation about 3 days ago from infosec.exchange permalink
  3. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Sunday, 26-Oct-2025 03:58:42 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to
    • Emily_S

    @emily_s exactly

    Maybe a "girl-ger" counter instead of a "guy-ger" counter ๐Ÿ™ƒ

    In conversation about 3 days ago from gnusocial.jp permalink
  4. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Wednesday, 22-Oct-2025 11:58:38 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    โ˜… Do you get excited or upset about AWS SCPs, or GCP Org Policies?
    โ˜… Do you have experience developing software to solve cloud security challenges?
    โ˜… Do you downplay your cloud security knowledge but actually you know a lot of niche oddities of cloud IAM?
    โ˜… Do you like working in diverse security teams that care about your wellbeing?
    โ˜… Do you want to get paid to work on cloud security for one of the most sophisticated AWS environments in the world?

    I'm hiring an L5 (mid-late career) cloud security software engineer for Netflix Cloud Security! I'm looking for someone with skills across cloud security, cloud infra, AND software engineering, and would like to see at least one of these skill areas:
    โ€ข Experience building secure-by-default controls for Infra-as-Code (IAC) tools such as Terraform
    โ€ข Experience building robust systems or easy to use abstractions for AWS native services such as EC2, Lambda, S3, SNS, SQS, DDB, etc.
    โ€ข Experience leveraging AWS Config, Cloud Control API, CloudFormation, and CloudTrail
    https://explore.jobs.netflix.net/careers/job/790304450320-security-software-engineer-l5-cloud-infrastructure-security-usa-remote

    Netflix Cloud Security has industry-leading cloud security capabilities, and one of the most sophisticated AWS environments in the world. As a manager, I prioritize inclusion in order to maintain both the wellbeing and productivity of our diverse team. We hold folks to delivering high quality work by creating environments where you can operate to the best of your ability, through work-life balance, expecting folks to take ample time off (~6 weeks, but no one will track it). I'm happy to talk about this role and about how I manage teams โ€” e.g., my Explicit Expectations and my commitments to my reports. https://managinginthemargins.com/explicit-expectations-leadership-by-example-edcb451abfb4

    I'd love to hear what perspectives, skills, and experiences you could bring to our team! [This role can be US remote or office, with a distributed team across the US]
    #Hiring #FediHire #CloudSecurity

    In conversation about 7 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: static.vscdn.net
      Security Software Engineer (L5), Cloud Infrastructure Security | USA - Remote | Netflix
      Netflix is one of the world's leading entertainment services, with over 300 million paid memberships in over 190 countries enjoying TV series, films and games across a wide variety of genres and languages. Members can play, pause and resume watching as much as they want, anytime, anywhere, and can change their plans at any time. Netflix operates our streaming service control plane on Amazon Web Services, which has led to one of the largest and most sophisticated AWS environments in the world. Cloud Security for our public cloud deployments is critical to Netflix's security posture to protect our members, partners, employees, and intellectual property. This entails various capabilities distributed across a number of Infrastructure Security teams - cloud security paved roads, posture management, architecture, consulting and operational services. Of this charter, the Cloud Infrastructure Security (CIS) team designs and implements strategic cloud security controls and core building blocks supporting identity and access management, resource inventory and controls, developer workflows for operating in our cloud environment, and more. This is primarily a software engineering team focused on scalable secure defaults and posture management for Netflix AWS deployment. We are looking for an experienced security software engineer to enable our mission. You will have the opportunity to leverage your cloud security and engineering skills to help us scale cloud security for Netflix. Desired Background: You have a strong technical understanding of Cloud Security concepts and related risk management You have a depth of experience in AWS infrastructure and security constructs (AWS configuration, policy management, identity lifecycle etc). You have experience with Infrastructure as Code (IaC) tools such as AWS CloudFormation or Terraform, and Continuous Integration/Continuous Deployment (CI/CD) pipelines You have experience writing and maintaining production software in Python or Golang, creating and triaging alerts around the health and security of your systems You are passionate about scalable cloud security risk management with secure by default approaches You are a strong collaborator and communicator across security and infrastructure teams Our culture is unique, and we live by our values, so it's worth learning more about Netflix culture. Compensation: Generally, our compensation structure consists solely of an annual salary; we do not have bonuses. You choose each year how much of your compensation you want in salary versus stock options. To determine your personal top of market compensation, we rely on market indicators and consider your specific job family, background, skills, and experience to determine your compensation in the market range. The range for this role is 100,000 - $720,000. Benefits: Netflix provides comprehensive benefits including Health Plans, Mental Health support, a 401(k) Retirement Plan with employer match, Stock Option Program, Disability Programs, Health Savings and Flexible Spending Accounts, Family-forming benefits, and Life and Serious Injury Benefits. We also offer paid leave of absence programs. Full-time hourly employees accrue 35 days annually for paid time off to be used for vacation, holidays, and sick paid time off. Full-time salaried employees are immediately entitled to flexible time off. See more detail about our Benefits here. Inclusion is a Netflix value and we strive to host a meaningful interview experience for all candidates. If you want an accommodation/adjustment for a disability or any other reason during the hiring process, please send a request to your recruiting partner. We are an equal-opportunity employer and celebrate diversity, recognizing that diversity builds stronger teams. We approach diversity and inclusion seriously and thoughtfully. We do not discriminate on the basis of race, religion, color, ancestry, national origin, caste, sex, sexual orientation, gender, gender identity or expression, age, disability, medical condition, pregnancy, genetic makeup, marital status, or military service. Job is open for no less than 7 days and will be removed when the position is filled.
    2. Domain not in remote thumbnail source whitelist: miro.medium.com
      Explicit Expectations: Leadership by Example
      from https://anna-sarai-rosenberg.medium.com
      Knowing whatโ€™s flexible and whatโ€™s important gives you room to do your best work, knowing that you wonโ€™t be judged for minutiae.
  5. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Tuesday, 21-Oct-2025 11:04:53 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    RE: https://infosec.exchange/@saraislet/115409648180155252

    I should write a talk on cloud security vs bear metal security

    Something like this:
    "I'm Sarai Rosenberg, and I've been responsible for securing one of the largest cloud platforms in the world, and I've also been responsible for securing one of the largest bear metal platforms in the world โ€” and here's why you should just turn everything off permanently: because, let's face it, you're never going to be stronger than the bear."

    In conversation about 8 days ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (@saraislet@infosec.exchange)
      from Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
      @ligasser@social.epfl.ch @occult@ominous.net @fj@mastodon.social Most companies aren't choosing between the blast radius of being a cloud provider vs making their own security mistakes, rather they're choosing between whether their own self-managed security posture would be better than the security posture they'd have when accepting that the cloud provider itself could introduce risk. And while cloud provider security issues are far more visible, the general security posture provided by cloud is a much higher bar than the average small-medium size company bare metal deployment security posture. There are SO MANY tools and standards, whether native cloud capabilities or open source or vendor products, to support cloud security, and so little of that is available on bare metal. IAM strategy alone is such a rat's nest of challenges. But on bare metal, what's the equivalent? Usually it's down to key management, and the authn & authz designs that are baked into each and every layer and piece of code running. So instead of reviewing IAM policies to scope down access, at best you have to dive into the layers of code passing around logic about whether this key is still accepted, and whether this signed context (a la AEAD/JWT) binds the action and source to the indicated resources and is authorized. And worst case scenario, not only is there no context binding, you don't even have a key revocation process or a fleshed out threat model for key compromise. And the most likely case is that confused deputy is a strategy rather than an exploit. IAM is complicated and sometimes tedious, but the complexity of your infrastructure can expand exponentially when you build on top of IAM in at least a moderately secure way. Without IAM, home grown bare metal absolutely cannot grow in complexity without a highly strategic and highly prioritized and substantial investment in secure design and layered security controls, and a robust security ecosystem of tooling and patterns and abstractions. Anything else might as well be selling confused deputy as a service.
  6. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Tuesday, 16-Sep-2025 04:58:17 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to
    • Adrianna Tan

    @skinnylatte do you have any favorite (shareable) stories about dating or falling in love with your wife?

    In conversation about a month ago from infosec.exchange permalink
  7. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Monday, 15-Sep-2025 10:28:18 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to
    • mk30

    @mk30 pretty clear
    https://www.vanityfair.com/news/story/charlie-kirk-tyler-robinson-memes-meaning

    In conversation about a month ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: media.vanityfair.com
      Groypers, Helldivers 2, Furries: What Do the Messages Left by Charlie Kirkโ€™s Alleged Killer Actually Mean?
      from Joshua Rivera
      Suspect Tyler Robinson allegedly inscribed messages on bullet casings that reference video games and internet cultureโ€”but they hardly point toward a coherent ideology.
  8. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Monday, 15-Sep-2025 07:17:46 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    Every company that has ever been involved with fascism, slavery, or exploitation of labor should have open statements like this on their website

    But I'm impressed that BMW is this blunt about it โ€”ย and has actual pictures of Dachau
    https://www.bmwgroup.com/en/company/history/BMW-during-the-era-of-national-socialism.html

    In conversation about a month ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/204/851/279/847/662/original/726053860a10e593.png

  9. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Thursday, 11-Sep-2025 05:16:45 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    Free advice: When something Not Great happens that's relevant to Black folks or Jewish or queer or Arabic folks, such as hate crimes or laws restricting civil rightsโ€ฆ

    โ€ฆplease check in with your friends and colleagues who might be emotionally affected even if they're not directly connected

    Sharing kind sentiments is as easy as "I heard about some recent events. You don't have to say anything, but I'm thinking about you and I care about your well-being โค๏ธ"

    (an opt-in offer, without forcing a conversation)

    In conversation about 2 months ago from infosec.exchange permalink
  10. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Tuesday, 09-Sep-2025 09:03:23 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to
    • Grampa

    @grampajoe it doesn't really matter what you call it, the point is that it isn't easy to distinguish Signal from Whatsapp based on superficial qualities like "is the user required to pay money?"

    In conversation about 2 months ago from infosec.exchange permalink
  11. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Tuesday, 09-Sep-2025 05:31:19 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    "If a product is free, then you're the product"

    Signal is free
    Linux is free
    Shutting up is free

    I'm starting to think this adage isn't accurate

    In conversation about 2 months ago from infosec.exchange permalink
  12. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Thursday, 04-Sep-2025 01:34:17 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to

    I am tempted to create a "Death Timer" tabletop game.

    Each round (week), every player who has done something risky rolls dice to determine how many years they remove from everyone's life around them. If they consistently wear a well fitting KN95+ mask in any indoor space near other people, remove months instead of years.

    If you are ever in the same room with a player who has rolled dice in the past week, you also have to roll dice. This condition stacks.

    In conversation about 2 months ago from infosec.exchange permalink
  13. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Thursday, 04-Sep-2025 01:34:16 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to

    I hate playing this game where X event means avoiding anyone who attended that for 2 weeks, and then for the following 2 weeks avoiding everyone who spent time with anyone who attended it

    Which means a month has gone by, and there's another event

    I'm already masking in any crowded/risky indoor spaces ๐Ÿคท๐Ÿผโ™€๏ธ

    In conversation about 2 months ago from infosec.exchange permalink
  14. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Thursday, 04-Sep-2025 01:34:16 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to

    Oh wait sorry, that's not an original idea, that's just COVID and we're already playing it. ๐Ÿ’€๐Ÿ’€๐Ÿ’€

    In conversation about 2 months ago from infosec.exchange permalink
  15. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Thursday, 04-Sep-2025 01:22:45 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    Here's your annual warning to beware hanging out in person with Defcon attendees, because many of them have returned with asymptomatic COVID infections.

    As in every year since 2021, Defcon is a super spreader event. Many COVID infections are NOT symptomatic: not showing symptoms does not guarantee not carrying the highly contagious virus.

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments


  16. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Tuesday, 19-Aug-2025 17:46:46 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to

    Or, if I really wanted to blow up some (personal) cloud service bills, each instance could provision two new instances before the new instances tear down the previous instance ๐Ÿ™ƒ because what if we fork bomb the cloud?

    I wonder how far it would get before someone at AWS calls me to say, "hey Sarai, cut it out"

    And the real question here โ€” which part of AWS would call first? My guess is that it would hit IAM limits before it hits compute or API limits, but if I designed it to create new accounts for each instance I could probably hit some AWS Organizations limits

    In conversation about 2 months ago from infosec.exchange permalink
  17. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Tuesday, 19-Aug-2025 17:46:14 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    So I had this terrible idea a few years ago to write some infrastructure automation that provisions a new compute instance, sets up secrets storage, configures IAM roles, authorizes the new instance to be able to provision new instance and roles via infra-as-code automation, and then the new instance tears down the instance and roles that created it, before then creating its own new compute instance, etc

    Like a self-propagating glider in Conway's Game of Life, except with cloud infrastructure

    In conversation about 2 months ago from infosec.exchange permalink
  18. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Monday, 18-Aug-2025 04:38:54 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to
    • Adrianna Tan

    @skinnylatte is that equivalent to "being in the queer community" in Monterey?

    In conversation about 2 months ago from infosec.exchange permalink
  19. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Monday, 04-Aug-2025 06:00:59 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    I need a website that's like "Does the dog die?" but for whether a comedian is racist/homophobic

    In conversation about 3 months ago from infosec.exchange permalink
  20. Embed this notice
    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ (saraislet@infosec.exchange)'s status on Monday, 14-Jul-2025 23:48:40 JST Insecurity Princess 🌈💖🔥 Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ
    in reply to

    I have a much wider and wiser perspective now: The tools developed by my teams are operated by them day in and day out, used by thousands of engineers daily, maintaining products that are used by hundreds of millions of customers night and day around the world

    In conversation about 4 months ago from infosec.exchange permalink
  • Before

User actions

    Insecurity Princess 🌈💖🔥

    Insecurity Princess ๐ŸŒˆ๐Ÿ’–๐Ÿ”ฅ

    I write about power dynamics in engineering managementInsecurity Princess. Netflix Clod Infracture Security Manager. Queer femme mathematician. Dismantling systemic barriers in tech, one fencepost problem at a timeWife of https://infosec.exchange/@sophieschmieg

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          40253
          Member since
          26 Nov 2022
          Notices
          91
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP็ฎก็†ไบบ. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.