infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

@troed I go to print shops because I refuse to maintain any commercially available printer, so literally anything that works would be step-up for me.
this post | permalink
@sassdawe And Azure probably has more Linux boxes than Windows, so I guess that's OK :)
this post | permalink
@pojntfx @mdione Really weird choice indeed. Their FAQ says: "The electronic boards will be purchasable through our distributors." so maybe they plan to provide exceptions for select companies? Can they do that?
this post | permalink
Oh the Technical Specifications on the vendor page lists HP cartridges and something called Inkit (maybe https://inkit.se ?) for ink:

https://www.opentools.studio/

Maybe @rayckeith can clarify?
this post | permalink
Open Printer

https://www.crowdsupply.com/open-tools/open-printer

I've been looking for something like this for a long time! Unfortunately I don't yet see how ink could be supplied, and as @pojntfx points out, the chosen CC license would make establishing a sustainable ecosystem difficult...
this post | permalink
[RSS] The Story of a Perfect Exploit Chain: Six Bugs That Looked Harmless Until They Became Pre-Auth RCE in a Security Appliance

https://mehmetince.net/the-story-of-a-perfect-exploit-chain-six-bugs-that-looked-harmless-until-they-became-pre-auth-rce-in-a-security-appliance/
this post | permalink
@sassdawe Wow congrats!
this post | permalink
@addison It's obvious you have a lot to say :) I think the presentation was also very good (using sokoban as a model is spot on!), it's just that internalizing new perspectives takes time, and I think we were better off getting multiple highlights of ideas instead of working through any one of them during the time given - we have the recording, slides, etc. to dig deeper as we like.
this post | permalink
@addison Thanks for the great talk, definitely the most thought provoking one for me from this CCC! Have to watch it like 3 more times to get all the details though 😅
this post | permalink
@hanno As another datapoint, MOTW bypasses worth CVE's at MS (e.g. CVE-2025-24061). It's not the same ofc. as an automatic control is bypassed in such cases, but at the same time users could choose to bypass the control after a warning (which the CVE also bypasses).
this post | permalink
Next Page