infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

ChkTag: x86 Memory Safety

https://community.intel.com/t5/Blogs/Tech-Innovation/open-intel/ChkTag-x86-Memory-Safety/post/1721490
this post | permalink
Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves

https://arxiv.org/pdf/2510.09272

#fromTwitter
this post | permalink
@sassdawe and state of the art EDRs like CrowdStrike! :)
this post | permalink
@Downwithdan https://www.youtube.com/watch?v=eMJk4y9NGvE
this post | permalink
[RSS] Securing the Future: Changes to Internet Explorer Mode in Microsoft Edge

https://microsoftedge.github.io/edgevr/posts/Changes-to-Internet-Explorer-Mode-in-Microsoft-Edge/
this post | permalink
@Sempf Oh OK, the TCP-level DDoS protection is obviously secret sauce, so you'll end up in trial&error. My educated guess is that if you are not too aggressive with timings and do proper TCP handshakes (-sT IIRC) you should be fine, and if something triggers than suddenly all your connections will fail so -vvv and keep an eye on logs.
this post | permalink
@Sempf why on earth would you nmap a cdn? you won't see the origin ports, and even at the application layer you'd only see the proxy. there may be some L7 proxy trickery or even some TCP level magic that works, but nmap is not the right tool to test those.
this post | permalink
[RSS] In-depth analysis and deobfuscation of Zelix KlassMaster's flow obfuscation

https://github.com/LvStrnggg/zkm-flow
this post | permalink
[RSS] Hacking the Nokia Beacon 1 Router: UART, Command Injection, and Password Generation with Qiling

https://spaceraccoon.dev/nokia-beacon-router-uart-command-injection/
this post | permalink
@foolishowl @danirabbit do you have an idea why they won't use Signal? It's free and easy, but I got similar responses about installing it before, never knew why.
this post | permalink
Next Page