infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

@cR0w https://gitlab.com/brutaldon/brutaldon
this post | permalink
@cR0w Took a while until I found elinks that I briefly experimented with: https://github.com/rkd77/elinks

During my search I stumbled upon browsh, that looks pretty cool: https://github.com/browsh-org/browsh (Edit: meh, it runs FF in the background...)

(Tried neither with Mastodon, just ICYMI)
this post | permalink
@mttaggart https://github.com/mozilla/bedrock/commit/d459addab846d8144b61939b7f4310eb80c5470e#diff-a24e74e4595fa85440a2f4e7e5dcfe68aba6e1e593aef05a2d35581a91423847L60
this post | permalink
@mttaggart Also, the recent git diffs...
this post | permalink
@cR0w Also, it's on the Change Password interface that implies post-auth, yet PR:N...
this post | permalink
[RSS] The io_uring Promotion in kernelCTF And Two Vulnerabilities Analysis

https://u1f383.github.io/linux/2025/02/28/the-io_uring-promotion-in-kernelCTF-and-two-vulnerabilities-analysis.html
this post | permalink
Why is it that every time I touch an analysis tool I find a blocker bug, but when I touch the target I actually want to analyze...

https://www.youtube.com/watch?v=4G6QDNC4jPs
this post | permalink
@VoltPaperScissors @marove @VVoidCamp We're going to have so much fun with this (and not just with kids)! Thank you!
this post | permalink
@Aurimas @tychotithonus At least you don't have to deal with this in case of CrowdStrike :)
this post | permalink
@tychotithonus I think this dilemma is equivalent to the USGOV vs. Kaspersky case. After some point you have to trust your supply chain. If that's not reasonable, you cut ties.

(I know this is not an answer, but my gut tells me this isn't really a technical problem to solve)
this post | permalink
Next Page