cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Cablespaghetti's personal snac instance
Admin email
sam@cablespaghetti.dev
Admin account
@sam@cablespaghetti.dev

Search results for tag #security

[?]Nonilex »
@Nonilex@masto.ai

“My conversations with him are very pleasant, & then the missiles go off at night,” said of . Clearly sensitive about his turnaround, Trump added of Putin: “He fooled Clinton, Bush, Obama, Biden — he didn’t fool me.”
[invert that last statement for the truth]

    [?]Nonilex »
    @Nonilex@masto.ai

    is convinced he has the battlefield momentum & has been prepared for to lose his patience, NYT reported last week. For all of Trump’s Russia-friendly rhetoric earlier this year, he refused to make the major concessions that Putin wanted, such as pushing Ukraine to give up more territory & limit the future size of its military.

    nytimes.com/2025/07/09/world/e

      [?]Rory McCune »
      @raesene@infosec.exchange

      Just published another part of our long running series on fundamentals. This time looking at how Kubernetes cluster's use PKI. I know when I started the idea that every cluster had three different certificate authorities came as a bit of a surprise!

      securitylabs.datadoghq.com/art

        [?]Roni Laukkarinen »
        @rolle@mementomori.social

        I'm still on some commercial platforms, but I've given up on X, Facebook, and WhatsApp. Sometimes I wish I could have made different choices when I started my online journey in the 90s, and not have my full name and details out there to some extent. I'm in too deep. There's some safety in knowing certain things - security-wise, to protect myself. But it's horrifying to think about people who don't take those precautions. Many are just prey for the black and gray hats.

        I often choose not to post about these things on commercial social media because it's seen as fearmongering and insensitive. I wish I could warn everyone, but most do not care until something bad happens.

          [?]This Is My Glasgow »
          @thisismyglasgow@mastodon.scot

          This unusual T-shaped keyhole (left) is part of an Odell's nightlatch. It's at the entrance to an 1850s tenement on Kelvingrove Street and is only the second I've found in the wild in Glasgow.

          Cont./

          The unusual t-shaped keyhole for an Odell's nightlatch, with an example of the internal workings of such a latch and one of its keys.

          Alt...The unusual t-shaped keyhole for an Odell's nightlatch, with an example of the internal workings of such a latch and one of its keys.

            [?]Wen »
            @Wen@mastodon.scot

            Perusing a paper paper for once I saw this advert for WhatsApp.

            No I can believe the content of your message can not be read, but by using it, your address book is theirs, your messages sent/received are logged and you will be tracked wherever you are - and whatever you are buying.

            That’s what they really want.

            Go - it makes sense

            Advert for WharsApp, woman’s face, hidden message, text reads


No one, not even WhatsApp, can see or hear your personal messages.
WhatsApp
from CO Meta

            Alt...Advert for WharsApp, woman’s face, hidden message, text reads No one, not even WhatsApp, can see or hear your personal messages. WhatsApp from CO Meta

              [?]Chad McCullough »
              @cmccullough@polymaths.social

              Well, great. Now @bitwarden is going to ad AI bullshit to their services. I left Bitwarden a few months back for different reasons but I'm kind of glad that I did. I switched to @1password@1password.social. If they add AI to their services (are they already?), I'm just going to call it quits on all of them and just move completely to @keepassxc@fosstodon.org. I can simply just host my own with Keepassxc and not have to worry about any AI crap. I'm using Keepassxc now but not for everything. That might change in the very near future.

              https://nerds.xyz/2025/07/bitwarden-mcp-server-secure-ai/

              #passwordmanager #privacy #security

                [?]Peter N. M. Hansteen »
                @pitrh@mastodon.social

                Yes, The Book of PF, 4th Edition Is Coming Soon nxdomain.no/~peter/yes_the_boo

                Long rumored and eagerly anticipated by some, the fourth edition of The Book of PF is now available for preorder nostarch.com/book-of-pf-4th-ed

                  [?]erAck »
                  @erAck@social.tchncs.de

                  Adrianna Tan boosted

                  [?]Scott Murray :neurodiversity: »
                  @scott@sfba.social

                  If you have a , take a quick break, so your printer doesn’t get commandeered into a botnet! 🖨️💪

                  1. Check if your printer model is on this list and has updated firmware available:

                  support.brother.com/g/s/id/sec

                  2. If new firmware is available, download the appropriate updater here:

                  support.brother.com/g/b/midlin

                  3. Story for context:

                  securityweek.com/new-vulnerabi

                    Miah Johnson boosted

                    [?]Peter N. M. Hansteen »
                    @pitrh@mastodon.social

                    Long rumored, eagerly anticipated by some, you can now PREORDER "The Book of PF, 4th edition" nostarch.com/book-of-pf-4th-ed for the most up to date guide to the OpenBSD and FreeBSD networking toolset

                      [?]Liam @ GamingOnLinux 🐧🎮 »
                      @gamingonlinux@mastodon.social

                      [?]Sindarina, Edge Case Detective »
                      @sindarina@ngmx.com

                      The Node.js Project just pre-announced security updates, to be released next week, on Tuesday, July 15th;

                      "The 24.x release line of Node.js is vulnerable to 2 high severity issues. The 22.x release line of Node.js is vulnerable to 1 high severity issues. The 20.x release line of Node.js is vulnerable to 1 high severity issues."

                      nodejs.org/en/blog/vulnerabili

                        [?]Chewie »
                        @chewie@mammut.gogreenit.net

                        [?]Nonilex »
                        @Nonilex@masto.ai

                        The most recent report, issued in 2023, included an interactive atlas that zoomed down to the county level. It found that is affecting people’s , & livelihoods in every corner of the country in different ways, with minority & Native American communities often disproportionately at risk.

                          [?]Em :official_verified: »
                          @Em0nM4stodon@infosec.exchange

                          What is your favorite app for
                          Multifactor Authentication, and why do you like it most? 2️⃣✌️👀

                            [?]Mark Stosberg »
                            @markstos@urbanists.social

                            [?]nixCraft 🐧 »
                            @nixCraft@mastodon.social

                            Internet traffic, visualized with a opensource app which comfortably monitor your Internet traffic. It is a cross-platform and reliable app for your needs github.com/GyulyVGC/sniffnet

                            A screenshot of sniffnet Application to comfortably monitor your Internet traffic.

                            Alt...A screenshot of sniffnet Application to comfortably monitor your Internet traffic.

                              [?]mle✨ »
                              @mle@infosec.exchange

                              "Censys has made a list of some of the ICS products commonly targeted by Iranian hackers and scanned the internet to determine how widespread they are and whether their owners and operators have taken steps to secure them in recent months."

                              securityweek.com/iranian-hacke

                              censys.com/blog/ics-iran-expos

                              Table depicting exposure of four different device types known to be of interest or targeted by Iranian actors, including Unitronics, Orpak SiteOmat, Red Lion, and Tridium Niagara. During the 6 month period from January through June 2025, Orpak SiteOmat is the only software that saw a decrease in exposures, dropping from 158 in January to 123 in June.

                              Alt...Table depicting exposure of four different device types known to be of interest or targeted by Iranian actors, including Unitronics, Orpak SiteOmat, Red Lion, and Tridium Niagara. During the 6 month period from January through June 2025, Orpak SiteOmat is the only software that saw a decrease in exposures, dropping from 158 in January to 123 in June.

                                [?]hexa- »
                                @hexa@chaos.social

                                24.11 is now officially unmaintained and will not receive bugfixes and updates any more.

                                Time to to nixos-25.05 if you haven't yet.

                                github.com/NixOS/infra/pull/76

                                  [?]mle✨ »
                                  @mle@infosec.exchange

                                  It’s not often my worlds collide like this, but this is pretty wild.

                                  Coros Pace 3 doesn’t enforce Bluetooth pairing to a device, which leads to a cascading series of things that one could do when rogue connecting to the watch.

                                  All of these are pretty terrible, but I can’t shake the image of someone spectating near the end of a race and disrupting someone’s hard-earned GPS file for their race. Obviously access to health and training data is way more severe, and there are devices and systems way more critical than someone’s GPS watch, but the fact that any of this is even possible is jarring.

                                  On top of this, Coros’s initial response of “we’ll get to it by the end of 2025” is wildly unacceptable. They’ve since clarified their timeline (which is more aggressive) but they didn’t handle this well at all from what I’m reading.

                                  blog.syss.com/posts/bluetooth-

                                  dcrainmaker.com/2025/06/coros-

                                  Summary of COROS PACE 3 Bluetooth security vulnerabilities. An unauthenticated attacker within Bluetooth range could hijack a user’s account, access all data, eavesdrop on sensitive data, manipulate device configuration, factory reset or crash the device, and interrupt running activities causing data loss. The analysis also noted security-relevant differences between the COROS iOS and Android apps.

                                  Alt...Summary of COROS PACE 3 Bluetooth security vulnerabilities. An unauthenticated attacker within Bluetooth range could hijack a user’s account, access all data, eavesdrop on sensitive data, manipulate device configuration, factory reset or crash the device, and interrupt running activities causing data loss. The analysis also noted security-relevant differences between the COROS iOS and Android apps.

                                    [?]Peter N. M. Hansteen »
                                    @pitrh@mastodon.social

                                    Confirmed: There will be a full day PF tutorial "Network Management with the OpenBSD Packet Filter Toolset" at 2025 in .

                                    Details to emerge via 2025.eurobsdcon.org/, and expect more goodies to be announced!

                                      6 ★ 2 ↺
                                      Mike Sheward boosted

                                      [?]sam »
                                      @sam@cablespaghetti.dev

                                      Fediverse, I have a rant I need to get off my chest. Groups in Google Workspace is a security nightmare and has been for years! Why has Google STILL not fixed the glaring problems!?

                                      I've had admin powers at 5+ companies' Google Workspace/G Suite over the past decade or so. Every single one had groups which were misconfigured, often so anyone in the whole company could join without approval or see the message history at https://groups.google.com without being a member at all.

                                      This is because for any sensible configuration of Google Groups when using it for email groups you have to use the "Custom" permissions mode. The default Public mode doesn't allow external people to email the group, but does allow the whole company to see all the messages. The default Team mode, has the same problem of everyone being able to see all the messages.

                                      Also let's not forget that dangerous little "Anyone in the organisation can join" toggle at the bottom which is on by default. So any random new starter can join your confidential company directors group and get all the emails sent to it.

                                      Giving Google the benefit of the doubt here, I think the reasoning might be that Google Groups is intended as a kind of company forum, not for private email groups. However that isn't how anyone uses it in my experience...


                                      Screenshot of the default Google Group settings for team mode

                                      Alt...Screenshot of the default Google Group settings for team mode

                                      Screenshot of the default Google Group settings for public mode

                                      Alt...Screenshot of the default Google Group settings for public mode

                                        [?]gyptazy »
                                        @gyptazy@mastodon.gyptazy.com

                                        Building Your Own PKI with Step-CA – From Root CA to Proxmox Integration with ACME!

                                        In this we create an own, decentralized PKE with , enable and integrate a node to obtain a certificate.

                                        gyptazy.com/building-your-own-

                                          [?]Wen »
                                          @Wen@mastodon.scot

                                          @theferret Could I respectfully suggest you post full links - not shortened ones. Malicious actors can use them to redirect the viewer to harmful sites and not everyones browser/computer is adequately locked down.

                                          It does not cost more in your 500 letter posting than a shortened/onscured link.

                                            woollypigs boosted

                                            [?]Shaula Evans »
                                            @ShaulaEvans@zirk.us

                                            I had the foolihardiness to ask a tech question on Mastodon last night (what was I thinking???) that devolved into a side quest. I am going to even more foolhardily try again:

                                            With Android rolling out updates that wedge Gemini into everything, what do I need to do to remove/disable/nuke from outer space all aspects of Gemini as much as possible?

                                            🚨 Without changing phones / getting a second phone / installing a new OS. 1/n

                                              [?]Paco Hope #resist »
                                              @paco@infosec.exchange

                                              Exhibit eleventy bajillion that medical software is awful. I find this funny for a few reasons.

                                              One, it references Little Bobby Tables' lesser known cousin @GNAME@.

                                              Second, it doesn't tell me who, what, where, when, why. All I have is literally the patient name. My son. I don't know the date of the procedure, the cost, what they sent my insurance, what my insurance said. Nothing. It's just "you owe us money. Please give us all your insurance details."

                                              Third, I suspect is to blame here. If you want to protect your patient data, don't let the invoicing people have all that data. I sorta get it. But then letters like this are pretty useless. There is absolutely no way I'm writing down all my info and just shipping it to them to see what happens. This is billing, after all. It's the only thing with a higher error rate than an LLM.

                                              Photo of a letter. It has the UVA logo at the top and UVA Health. You can see redacted name and address places. It opens with Dear @GNAME@ and basically goes on to say they did something and want my info.

                                              Alt...Photo of a letter. It has the UVA logo at the top and UVA Health. You can see redacted name and address places. It opens with Dear @GNAME@ and basically goes on to say they did something and want my info.

                                                [?]Paco Hope #resist »
                                                @paco@infosec.exchange

                                                If you made some kind of intercepting HTTP/HTTPS proxy (thinking of a use case here), you could make it search for these URLs in the streams of HTTP and HTML that are passing through the proxy. Copy down the full URLs and asynchronously issue your own requests for the same URLs and store your own copy of the resulting files. The end user still gets their copy and nobody can tell it's happening. You'd almost certainly be able to do this because the links would surely be valid at the time the proxy sees them, and would work if the proxy immediately issued its request for its own copy.

                                                The only way to really detect this happening is for the bucket owner to look at the S3 object logs in CloudTrail and see more than 1 fetch of that URL. Of course, someone with network connectivity issues could issue the request more than once. But a systematic pattern of duplicate fetches would indicate hijinks. The end user can't detect this happening to them. But, of course, you're MitM'ing their internet connection, so that could be detected.


                                                4/end

                                                  [?]Paco Hope #resist »
                                                  @paco@infosec.exchange

                                                  If you know how these things work, I haven't told you anything new or useful yet. Maybe I won't. But the thing I think is important and frequently overlooked is that expiration time. Too short (5 seconds) and your user might not click the link before it expires. Too long (86400 seconds, i.e., one day) and this file is available far longer than you intended.

                                                  So looking at the X-Amz-Expires header in is a good thing, especially if you're doing a . Those URLs can be passed from device to device (e.g., you can Slack it to a colleague or SMS it to a friend and it will work). So you want to counsel anyone who uses them to try hard to tune the expiration as short as is reasonably practical. That expiration is all of the security control on that link.

                                                  [edit: I left out something important]
                                                  I see these URLs with 86400 as the expiration time a lot and often. If you're a developer, look at what you're setting them to. If you're a , this is a thing to warn your customer about.

                                                  3/

                                                    [?]Nicd »
                                                    @nicd@masto.ahlcode.fi

                                                    insinuator.net/2025/06/airoha-

                                                    > [...] these vulnerabilities allow attackers to fully take over the headphones via Bluetooth. No authentication or pairing is required. The vulnerabilities can be triggered via Bluetooth BR/EDR or Bluetooth Low Energy (BLE). Being in Bluetooth range is the only precondition. It is possible to read and write the device’s RAM and flash. [...] hijack established trust relationships with other devices, such as the phone paired to the headphones.

                                                      [?]Electronic Frontier Foundation »
                                                      @eff@mastodon.social

                                                      A variety of US federal and state laws give cops the power to get your data from online services. This overview goes over how they work, and how they can be mitigated.
                                                      eff.org/deeplinks/2025/06/how-

                                                        Adrianna Tan boosted

                                                        [?]Aral Balkan »
                                                        @aral@mastodon.ar.al

                                                        Thanking the @letsencrypt folks for the excellent work they do, and especially for their upcoming support for security certificates for IP addresses which is nothing short of revolutionary for the future of the (Small) Web.

                                                        community.letsencrypt.org/t/ge

                                                          [?]C. »
                                                          @cazabon@mindly.social

                                                          I learned something today: Google's Gemini "AI" on phones accesses your data from "Phones, Messages, WhatsApp" and other stuff whether you have Gemini turned on or not. It just keeps the data longer if you turn it on. Oh, and lets it be reviewed by humans (!) for Google's advantage in training "AI" etc.

                                                          But this only came to my attention because of an upcoming change: it's going to start keeping your data long-term even if you turn it "off": " will soon be able to help you use Phone, , , and Utilities on your phone, whether your Gemini Apps Activity is on or off."

                                                          This is, of course, a and .

                                                          If this is baked into Android, and therefore not removable, I'd have to say I'd recommend against using Android at all starting July 7th.

                                                          extremetech.com/mobile/gemini-

                                                            Jon Seager boosted

                                                            [?]Canonical Ubuntu »
                                                            @ubuntu@ubuntu.social

                                                            One of our goals was making Network Time Security (NTS) the default in Chrony, not just for Ubuntu 25.04 Plucky Puffin, but beyond.

                                                            We’ve now reached that milestone as part of the ongoing development of Ubuntu 25.10 Questing Quokka.

                                                            Read more about it in our Ubuntu Server Gazette: discourse.ubuntu.com/t/ubuntu-

                                                            Network Time Security and chrony as defaults: As part of the ongoing development of Ubuntu 25.10 Questing Quokka

                                                            Alt...Network Time Security and chrony as defaults: As part of the ongoing development of Ubuntu 25.10 Questing Quokka

                                                              Jon Seager boosted

                                                              [?]OS-SCI »
                                                              @os_sci@mastodon.social

                                                              Ubuntu 25.10 is boosting security with Chrony + NTS for secure time sync, replacing systemd-timesync. A safer, more reliable time management system is coming! dub.sh/GKhixGZ

                                                                [?]Nonilex »
                                                                @Nonilex@masto.ai

                                                                says it used the same number of bombs the used on Iran’s facilities

                                                                Iran's top body said in a statement that its armed forces used the same number of bombs that the US had used in attacking Iran’s nuclear facilities.

                                                                It also said the US base was far from urban facilities & residential areas in .

                                                                It added that the action did not pose any threat to "our friendly & brotherly" neighbour Qatar.

                                                                  [?]Nonilex »
                                                                  @Nonilex@masto.ai

                                                                  , , , the & have all closed their airspace in light of the attacks.

                                                                  A US Dept official confirmed that fired multiple short- & medium-range missiles at Air Base in Qatar, & a damage assessment is underway. The official spoke on condition of anonymity to discuss matters.

                                                                    Back to top - More...