cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Cablespaghetti's personal snac instance
Admin email
sam@cablespaghetti.dev
Admin account
@sam@cablespaghetti.dev

Search results for tag #security

[?]wtfismyip » 🌐
@wtfismyip@gnu.gl

Good CCC talk - Escaping Containment: A Security Analysis of FreeBSD Jails: media.ccc.de/v/39c3-escaping-c

    [?]Alex@rtnVFRmedia Suffolk UK » 🌐
    @vfrmedia@social.tchncs.de

    The situations way more complex than just a "debate". Psilocybin clearly has benefits for mental health treatment - but taking it off class A schedule 1 creates obvious risks of - especially with the being on the ropes and a lot of disgruntled staff with low morale.

    There have also already been quite a few private nicked and struck off for diversion and/or loose prescription of other

    This needs to be addressed before any change to laws (or even if they do happen, healthcare professionals are going to be too wary of prescribing the stuff anyway for fear of making a career-limiting move or even getting in legal trouble), this is already affecting patients who could benefit from

    bbc.co.uk/news/articles/ckg936

      [?]Peter N. M. Hansteen » 🌐
      @pitrh@mastodon.social

      [?]Tim Mak » 🌐
      @timkmak@journa.host

      GUARANTEES INCLUDE U.S. MILITARY PRESENCE IN : For the first time since Russia's full-scale invasion of Ukraine, the U.S. included the deployment of American troops in Ukraine in security guarantees. ukrinform.ua/rubric-polytics/4

        [?]Nonilex » 🌐
        @Nonilex@masto.ai

        Not sure I believe wil follow through…

        offers 15-year guarantee as part of peace plan, says

        The is offering Ukraine security guarantees for a period of 15 years as part of a proposed peace plan, Ukrainian President Volodymyr Zelensky said Monday, though he said he would prefer an American commitment of up to 50 years to deter from further attempts to seize its neighbor’s land by force.


        apnews.com/article/russia-ukra

          [?]Graham Perrin » 🌐
          @grahamperrin@mastodon.bsd.cafe

          Escaping Containment: A Security Analysis of FreeBSD Jails

          16:15 GMT, UCT, UTC Saturday 2025-12-27

          events.ccc.de/congress/2025/hu @CCC

            [?]GrapheneOS » 🌐
            @GrapheneOS@grapheneos.social

            GrapheneOS version 2025122500 released:

            grapheneos.org/releases#202512

            See the linked release notes for a summary of the improvements over the previous release.

            Forum discussion thread:

            discuss.grapheneos.org/d/29501

              Chewie boosted

              [?]PrivacyDigest » 🌐
              @PrivacyDigest@mas.to

              Inside 's nationwide license plate system | TechCrunch

              We know this because the country’s sprawling license plate-tracking surveillance system has been left to the internet.

              researcher Anurag Sen, who discovered the security lapse, found the license plate surveillance system exposed online without a , allowing anyone access to the data within. It’s not clear how long the system has been public

              techcrunch.com/2025/12/23/insi

                WTL boosted

                [?]Roni Rolle Laukkarinen » 🌐
                @rolle@mementomori.social

                It bugs me every time someone non-technical, from a completely different line of work, says you no longer need to learn to code because you can "build" an app, website, or server in minutes with AI. Nobody performs chiropractic neck manipulations based on AI tips, nobody does professional construction work, or performs surgery with AI... right? (At least, I hope not.) And people usually understand that. So why can't they grasp that you still need to be a professional and actually know what you're doing, with or without an AI? You wouldn't tell a friend to "just do it" when they a) have no idea what you’re asking, and b) don't know how to do it.

                Every line of code is a liability. It's a dangerous world right now, with people mindlessly throwing more and more junk online. Everyone will get hacked eventually.

                  🗳

                  [?]Rachel [She/Her] » 🌐
                  @rachel@transitory.social

                  What to do with TOTP MFA credentials these days?

                  I currently do #1, but it adds complexity.

                  I've seen some recommends for #2, which surprises me a bit. But then again a password manager failure is like catastrophic either way. Also if I think about it, based on the logic of option 1, I shouldn't have the recovery codes in the pw manager db either.

                  Store them in another app/password manager (synced):11
                  Store them in your password manager next to your passwords:16
                  Store them in another app (not-synced):4

                    [?]Paco Hope [He/Him] » 🌐
                    @paco@infosec.exchange

                    I just realised a behavior that pervasive code scanning induces in me. We have a big, shared corporate repo for all company code. We've begun doing really aggressive, continuous scanning and cutting tickets to people on vulnerable code, even if it's not in production or in use.

                    I get it. I understand why. But the behavior it drives in me is that I won't commit anything to the company repo unless (a) I think it's basically perfect, and (b) I'm willing to deal with all the noise if it's not.

                    Scratchpads? Work in progress? prototypes? Not if there's a chance a robot is going to nag the shit out of me for every mistake. Those can just live on my laptop harddrive now, which is not where the business probably wants them.

                      [?]Paco Hope [He/Him] » 🌐
                      @paco@infosec.exchange

                      This season reminds me of a time when I was doing for a financial firm in London. The firm goes into "code freeze" in the first or second week of December until January to minimize the possibility of problems during the holidays.

                      I was doing architecture analysis on an important system. Basically the US SEC had demanded they start using a purpose-built system to track certain numbers (I'll explain in a reply to this) instead of just emailing spreadsheets around. So they had basically built a system that was a spreadsheet in a website. They had one year to comply. This system had not yet launched. If it didn't go live in this last possible week, they'd have to explain to the SEC how, 12 months on, they had failed to deploy anything at all in response to the requirement. (I'm sure I'm being imprecise here, that's the gist of it)

                      1/

                        [?]Aral Balkan » 🌐
                        @aral@mastodon.ar.al

                        Node.js devs, so picture this: you run `npm install` and you get a bunch of packages with audit errors.

                        The only thing I want to know at that point is what’s the root package that these dependencies belong to? (Running npm audit fix is a last resort as I don’t like it fiddling around with the dependencies of nested packages.)

                        It’s also not a straightforward thing to do, but it’s nothing jq and a bit of piping can’t fix:

                        ```bash
                        npm audit --json | jq -r '.vulnerabilities[].name' | xargs -n1 npm ls
                        ```

                        If you’re using fish shell, add an abbr(aviation) or an alias to that with a name like npm-audit-tree and you’re golden ;)

                        ```bash
                        abbr --add --global npm-audit-tree 'npm audit --json | jq -r '.vulnerabilities[].name' | xargs -n1 npm ls'
                        ```

                        (I usually prefer abbreviations to aliases as I like to remember/see the actual command being executed.)

                        Enjoy 💕

                          [?]Tim (Wadhwa-)Brown :donor: » 🌐
                          @timb_machine@infosec.exchange

                          Interesting links of the week:

                          Strategy:

                          * assets.publishing.service.gov. - the UK tries to define what a state threat is (and includes everyone from professional spies to someone who may not even know they pose a risk)

                          Standards:

                          * csrc.nist.gov/pubs/sp/800/82/r - courtesy of @Secure_ICS_OT

                          Threats:

                          * microsoft.com/en-us/security/s - MSFT's take on the landscape

                          Detection:

                          * ip.thc.org/ - @thc don't do things by half... here's a very large IP/DNS database
                          * fortinet.com/blog/threat-resea - Fortinet look at alternate DFIR sources for Windows
                          * troopers.de/downloads/troopers - surprisingly, I have my own take on ACI, but here's one from @ERNW

                          Bugs:

                          * kqx.io/post/qemu-nday/ - popping Qemu like it was 13 years ago
                          * freebsd.org/security/advisorie - FreeBSD AV:A oopsie
                          * projectzero.google/2025/12/and - GOOG discuss a nasty image

                          Exploitation:

                          * hackers-arise.com/sdr-signals- - ever wanted your own 4G LTE playground?
                          * podalirius.net/en/mainframe/as - getting the keys to the museum
                          * caido.io/ - another alternative to Burp, with a focus on multi-stage attacks
                          * arxiv.org/pdf/2512.09882 - AI vs flesh face off

                          Hard hacks:

                          * blog.quarkslab.com/modern-tale - @quarkslab pays €12 for a good time

                          Hardening:

                          * ariadne.space/2025/12/12/rethi - @ariadne discusses their sudo alternative
                          * lpc.events/event/19/contributi - building jails with eBPF
                          * pages.nist.gov/OSCAL/ - an as-code approach to standardised standards

                          ,

                            [?]Lobsters » 🤖 🌐
                            @lobsters@mastodon.social

                            Wen boosted

                            [?]Open Rights Group » 🌐
                            @openrightsgroup@social.openrightsgroup.org

                            Encryption isn't hostile. It's a bedrock of our cybersecurity 🔐

                            The UK's national security laws join a long line of attempts to frame encrypted messaging as something to be broken into pieces.

                            Without it, we're more open to threats from hackers and criminals.

                            techradar.com/vpn/vpn-privacy-

                              [?]GrapheneOS » 🌐
                              @GrapheneOS@grapheneos.social

                              GrapheneOS version 2025121700 released:

                              grapheneos.org/releases#202512

                              See the linked release notes for a summary of the improvements over the previous release.

                              Forum discussion thread:

                              discuss.grapheneos.org/d/29166

                                [?]Metin Seven 🎨 » 🌐
                                @metin@graphics.social

                                [?]Aral Balkan » 🌐
                                @aral@mastodon.ar.al

                                Just updated Node Pebble to support latest release version of Let’s Encrypt’s Pebble testing server.

                                codeberg.org/small-tech/node-p

                                Enjoy!

                                💕

                                  [?]Patch Arcana » 🌐
                                  @patcharcana@furry.engineer

                                  I have some problems about the contemporary push to adopt passkeys everywhere. They're perhaps only half-baked, but I wrote them up anyway.

                                  I never thought I'd become a technical conservative, but I guess spending the best part of a decade as a reliability engineer has taught me to see opportunities for stuff to break.

                                  arcanalabs.ca/essays/tech/2025

                                    [?]Nonilex » 🌐
                                    @Nonilex@masto.ai

                                    said on Sunday that the , & other partners' guarantees instead of membership were a compromise on 's side.

                                    "From the very beginning, Ukraine's desire was to join NATO, these are real security guarantees. Some partners from the US & Europe did not support this direction," he said in answer to questions from reporters in a WhatsApp chat.

                                      [?]Nonilex » 🌐
                                      @Nonilex@masto.ai

                                      "Thus, today, bilateral guarantees between & the , Article 5-like guarantees for us from the US, & security guarantees from European colleagues, as well as other countries — , — are an opportunity to prevent another Russian invasion," said.

                                      "And it is already a compromise from our part," he said, adding that the security guarantees should be legally binding.

                                        [?]Lobsters » 🤖 🌐
                                        @lobsters@mastodon.social

                                        [?]Peter N. M. Hansteen » 🌐
                                        @pitrh@mastodon.social

                                        [?]Alex@rtnVFRmedia Suffolk UK » 🌐
                                        @vfrmedia@social.tchncs.de

                                        A real life scared off a in NW who ran away empty handed (but was still caught via footage and sent to )

                                        bbc.co.uk/news/articles/c62ll4

                                          6 ★ 2 ↺
                                          Mike Sheward boosted

                                          [?]sam » 🌐
                                          @sam@cablespaghetti.dev

                                          Fediverse, I have a rant I need to get off my chest. Groups in Google Workspace is a security nightmare and has been for years! Why has Google STILL not fixed the glaring problems!?

                                          I've had admin powers at 5+ companies' Google Workspace/G Suite over the past decade or so. Every single one had groups which were misconfigured, often so anyone in the whole company could join without approval or see the message history at https://groups.google.com without being a member at all.

                                          This is because for any sensible configuration of Google Groups when using it for email groups you have to use the "Custom" permissions mode. The default Public mode doesn't allow external people to email the group, but does allow the whole company to see all the messages. The default Team mode, has the same problem of everyone being able to see all the messages.

                                          Also let's not forget that dangerous little "Anyone in the organisation can join" toggle at the bottom which is on by default. So any random new starter can join your confidential company directors group and get all the emails sent to it.

                                          Giving Google the benefit of the doubt here, I think the reasoning might be that Google Groups is intended as a kind of company forum, not for private email groups. However that isn't how anyone uses it in my experience...


                                          Screenshot of the default Google Group settings for team mode

                                          Alt...Screenshot of the default Google Group settings for team mode

                                          Screenshot of the default Google Group settings for public mode

                                          Alt...Screenshot of the default Google Group settings for public mode