cyb3rkitties, to random
@cyb3rkitties@infosec.exchange avatar

today in “infosec job hunting oddities”: the potential employer who requests three original written references along with the application. :aaaa: :blobcat0_0:

is it me? am i a magnet for weird not in a good way?!

Arataka, to random
@Arataka@esper.lol avatar

Pretty cool interview here with @jerry on and the challenges of scaling an instance with a mass user influx, def recommend checking it out! - https://www.youtube.com/watch?v=vTEC6Gl7l2c

Galletasalada, to random
@Galletasalada@kolektiva.social avatar

Too many people are wearing the wrong hat, it’s actually unethical to help the Feds.

joshin4colours, to random
@joshin4colours@mastodon.social avatar

Hi #infosec people, Friday question: what are some recent/high profile exploits that were based on SQL or command injection attacks?

subm3rge, to random Swedish
@subm3rge@infosec.exchange avatar

If you’re not in the meeting, you’re on the agenda.

jrdepriest, to random
@jrdepriest@infosec.exchange avatar

I'm fulfilling my related Toot quota for the week.
I kid.
**Love you @jerry ** :blobcatheart:​

Silicon Valley’s vision for AI? It’s religion, repackaged. by By Sigal Samuel (@sigalsamuel)

Suppose I told you that in 10 years, the world as you know it will be over. You will live in a sort of paradise. You won’t get sick, or age, or die. Eternal life will be yours! Even better, your mind will be blissfully free of uncertainty — you’ll have access to perfect knowledge. Oh, and you’ll no longer be stuck on Earth. Instead, you can live up in the heavens.
If I told you all this, would you assume that I was a religious preacher or an AI researcher?

--

Mostly, though, the figures spouting a vision of AGI as a kind of techno-eschatology — from Sam Altman, the CEO of ChatGPT-maker OpenAI, to Elon Musk, who wants to link your brain to computers — express their ideas in secular language. They’re either unaware or unwilling to admit that the vision they’re selling derives much of its power from the fact that it’s plugging into age-old religious ideas.

--

The influential ninth-century philosopher John Scotus Eriugena, for example, insisted that part of what it meant for Adam to be formed in God’s image was that he was a creator, a maker. So if we wanted to restore humanity to the God-like perfection of Adam prior to his fall, we’d have to lean into that aspect of ourselves. Eriugena wrote that the “mechanical arts” (a.k.a. technology) were “man’s links with the Divine, their cultivation a means to salvation.”

--

This wasn’t tech for tech’s sake, or for profit’s sake. Instead, tech progress was synonymous with moral progress. By recovering humanity’s original perfection, we could usher in the kingdom of God. As Noble writes, “Technology had come to be identified with transcendence, implicated as never before in the Christian idea of redemption.”

--

Transhumanists, effective altruists, and longtermists have inherited the view that the end times are nigh and that technological progress is our best shot at moral progress. For people operating within this logic, it seems natural to pursue AGI. Even though they view AGI as a top existential risk, they believe we can’t afford not to build it given its potential to catapult humanity out of its precarious earthbound adolescence (which will surely end any minute!) and into a flourishing interstellar adulthood (so many happy people, so much moral value!). Of course we ought to march forward technologically because that means marching forward morally!

--

I recommend reading the whole thing instead of just these excerpts.

kolide, to random
@kolide@infosec.exchange avatar

What kind of content do you think is missing from the infosec.exchange instance?

We could always use more cat content, for one.

Wander, to random
@Wander@packmates.org avatar

Federated wireguard network idea
Any feedback welcome.

Let's keep things stupidly simple and simply hash the domain name to get a unique IPv6 ULA prefix.

Then we would need a stupidly simple backend application to automatically fetch pubkeys and endpoints from DNS and make a request to add each others as peers.

Et voilà, you got a worldwide federated wireguard network resolving private ULA addresses. Sort of an internet on top of the internet .

The DNS entries with the public IPv4 / IPv6 addresses could even be delegated to other domains / endpoints which would act as reverse proxy (either routing or nesting tunnels) for further privacy.

Maybe my approach is too naïve and there are flaws I haven't considered, so don't be afraid to comment.

Exact use cases? Idk, but it sounds nifty.

andysandwich, to random
@andysandwich@infosec.exchange avatar

The breach is the gift that keeps on giving..... You gotta love the low iteration count and low length requirements for older long-time users. I hate to pile on any company that has experienced a breach, but If this doesn't deserve a Picard facepalm... I dunno what does. https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/ -

infoseclogger, to random
@infoseclogger@infosec.exchange avatar

Does anyone have a list of other focused mastodon instances?

catsalad, to random
@catsalad@infosec.exchange avatar

All three fediverse lists for hacker groups/cons/bsides/spaces have been updated. If you know of any I missed, let me know 😺

📌⁠[Bsides & InfoSec Cons by Region](https://infosec.exchange/@catsalad
📌⁠Hacker Meet-ups by Region
📌⁠Hackerspaces by Region

Botticelli, to random
@Botticelli@infosec.exchange avatar

Question if anyone is willing:

Some material I'm studying is differentiating between a "security analyst, an "information security analyst," and a "SOC analyst."

What is the major difference between the three roles if there are significant differences? Up until now I thought they were pretty much synonymous and variations on basically the same job role.

FortunateFool, to random
@FortunateFool@infosec.town avatar

If @jerry is at the beach, who's watching the servers? 👀

#infosec

hiramfromthechi, to random
@hiramfromthechi@mastodon.social avatar

Why privacy matters, reason number 9841365

jfkimmes, to random
@jfkimmes@tinycyber.space avatar

Hi #InfoSec fediverse: Can you recommend "hacker type" people, who still actively post here?

Doesn't have to be particularly infosec related, I simply want my timeline to be filled with more technical/interesting/clever/creative hacker mindset stuff.

Please boost for exposure :)

#FollowRecommendations #tech #hacker

EricWacker, to random
@EricWacker@infosec.exchange avatar

Does anyone in know if, given a set of compromised (student) credentials to a school district’s Google Workspace, whether it’s possible to scan Drive for anything shared with the “Anyone in [domain]” setting and potentially mass-exfiltrate data that way? I would hope that Google would make this type of activity difficult, but cannot rule it out with what I (don’t) know about red team tools.

AAKL, to random
@AAKL@noc.social avatar
kennynajarro, to random
@kennynajarro@infosec.exchange avatar

Hey everyone! My name is Kenny and I'm new to Mastodon infosec scene.

Want to point me in the right direction of some accounts to follow?

As a peace offering, here is Mr.Chedda in all his glory.

SheHacksPurple, to random
@SheHacksPurple@infosec.exchange avatar

What makes you angry in cyber security or ? What ticks you off? And why?

BPlanZ, to random
@BPlanZ@infosec.exchange avatar

I don't say enough how I love the . ! posts. I was attempting to so a post on bsky and it felt like going back in time. Thanks to the community that is here now, enriching our social world with these wonderful long and editable posts!

reginagrogan, to random
@reginagrogan@mastodon.social avatar

I joined the community on for 5 minutes and almost barfed. Tea:

  • no empathy for users
  • creepy dudes
  • pathological need to own other people to feel good? Get therapy Jesus.
  • people generally unsettling and not nice

NOPE. Bye. I will stick to and and and and

This is why women are leaving
Faster than new women are joining. Women talk, but you know that. So when there are weirdos, we warn other women.

MaJ1, to random
@MaJ1@mastodonapp.uk avatar

Hey folks can anyone help @Lstn2urmama.

She has an android tablet and is using a browser to access internet banking.

She suspects that the page she is using is compromised.

I am an Apple bod & dont have the skill set to help on an android platform.

Please reach out to her if your able to help or boost this so it reaches someone who can.

Many thanks ! 🙏 🫶🖖

taeluralexis, to random
@taeluralexis@infosec.exchange avatar

Hi hello lol I have a friend who is in IT help desk and she’s looking to transition into a SOC analyst role without any certs. Do you have any advice for her on how she can maximize her chances/get prepared?

AAKL, to random
@AAKL@noc.social avatar
coleens_, to random
@coleens_@infosec.exchange avatar

remember how upset I was about my shadow ban?

yeah, I'm over sweatin that shit - my experiences this week more than make up for it

I owe a huge thank you to everyone who stopped to tell me that I'm awesome, I'm loved, supported, and appreciated - thank you for your kind words, your anecdotes, and for your hugs!🖤

have a great con everyone

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • uselessserver093
  • Food
  • aaaaaaacccccccce
  • test
  • CafeMeta
  • testmag
  • MUD
  • RhythmGameZone
  • RSS
  • dabs
  • KamenRider
  • TheResearchGuardian
  • KbinCafe
  • Socialism
  • oklahoma
  • SuperSentai
  • feritale
  • All magazines