infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

@da_667 @DaveMWilburn Sounds awesome, will give it a shot, thanks!
this post | permalink
@da_667 @DaveMWilburn " you can just remove it and the entire security center" please elaborate! (or I'm not getting the joke?)
this post | permalink
@gsuberland lowercase v for Volts, atrocious!
this post | permalink
I recently went to my YT history to look up a video I watched earlier. What I found was that shorts are spamming my history even if I never watched them but they appeared on my screen as a recommendation.

I guess this is yet another desperate attempt of #AdTech to artificially boost some metrics that can later justify advertising prices.
this post | permalink
@osxreverser Been there, sorry for your dog :(
this post | permalink
@osxreverser Not many people like digging, so they don't.
this post | permalink
@detective This means that there is a way for a low privileged user to get their data out of this "admin-only" database (like a service running as SYSTEM), right?
this post | permalink
[RSS] CVE-2024-23108: Back Again! Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive, IOCs, and Exploit

https://www.horizon3.ai/attack-research/disclosures/cve-2024-23108-fortinet-fortisiem-2nd-order-command-injection-deep-dive/
this post | permalink
[RSS] Foxit Reader Updater improper certificate validation privilege escalation vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1989

This is CVE-2024-29072
this post | permalink
@swapgs Fixed in the original, thanks!
this post | permalink
Next Page