infosex.exchange <3
You are probably looking for the infosec.exchange Mastodon instance
This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.
Discoverability and Archiving
Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.
Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.
Gluttony Section for Search Engines
@troed I go to print shops because I refuse to maintain any commercially available printer, so literally anything that works would be step-up for me.
@sassdawe And Azure probably has more Linux boxes than Windows, so I guess that's OK :)
@pojntfx @mdione Really weird choice indeed. Their FAQ says: "The electronic boards will be purchasable through our distributors." so maybe they plan to provide exceptions for select companies? Can they do that?
@addison It's obvious you have a lot to say :) I think the presentation was also very good (using sokoban as a model is spot on!), it's just that internalizing new perspectives takes time, and I think we were better off getting multiple highlights of ideas instead of working through any one of them during the time given - we have the recording, slides, etc. to dig deeper as we like.
@addison Thanks for the great talk, definitely the most thought provoking one for me from this CCC! Have to watch it like 3 more times to get all the details though 😅
@hanno As another datapoint, MOTW bypasses worth CVE's at MS (e.g. CVE-2025-24061). It's not the same ofc. as an automatic control is bypassed in such cases, but at the same time users could choose to bypass the control after a warning (which the CVE also bypasses).
Next Page