@detective Hi! If you have a moment I have an odd question, I've searched around to no avail: what folder was the DB stored in on your system? I see snapshots are saved in C:\Users\[username]\AppData\Local\Temp but looking for where the Administrators-and-SYSTEM-only permanent copy is. I see D:\Analysis\... in your SQLite browser but I'm not sure if that's a copy or its location on your system 😅
I'm looking into "are deceptive links on social media typically malicious" and the answer is no (of course) and the most popular deception in 2023 by far is still linking to Rick Astley's Never Gonna Give You Up on YouTube (OF COURSE)
I tell ya hwat, I don't think most of the #InfoSec field is ready for a Safety-II mindset. Just look at how differently the human factor is considered in Safety-I and Safety-II ... that certainly rings a bell with all the user-blaming I've seen :/
Just checked my seedbox and found that someone downloaded a file I wasn't expecting would ~ever be downloaded, lol
Whoever is out there that actually downloaded the full genome sequence of my cat Aida (a whopping 30GB of data) that I published exclusively on Mastodon, you're my role model <3
I'd just like to interject for a moment. What you're referring to as a Mastodon DDoS, is in fact, Mastodon Request Amplification, or as I've recently taken to calling it, Mastodon plus Request Amplification. Request Amplification is not a DDoS unto itself, but rather another free component of a fully functioning DDoS system made useful by the REST API, Sidekiq jobs, and vital link preview generating components comprising a full Mastodon server as defined by Eugen.
Security goon at an online-bookstore-slash-server-rental company, adjunct professor at RIT, janitor for r/cybersecurity, and sporadic FOSS contributor. Cat person. Generally cheerful ^_^Always trying to learn new things, and I'd rather be corrected than be correct. I try to be correct the first time anyway though!How can I help?(posts searchable via tootfinder)