cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.
This server runs the snac software and there is no automatic sign-up process.
What would you think about a new API endpoint that lets you run unattended upgrades with a simple call like:
/nodes/{node_name}/apt/upgradeAt the moment you need to use the node’s HTML5 console to perform upgrades. Other methods exist such as running unattended Debian upgrade scripts, using patch management tools like #Spacewalk or #QualvoSec, or automating the process with #Ansible over SSH. My idea is to have an API based solution that relies on Proxmox authentication and authorization. This would also allow third party tools such as #ProxLB to provide automated patch management and even handle guest rebalancing in a way that is similar to DRS without requiring direct SSH access.
#Linux #OpenSource #PatchManagement #Security #DevOps #Automation #Ansible #PVE #PVE8 #PVE9
Along with the release of version 26 of every Apple operating system, Apple has also released point release updates for macOS Sequoia and Sonoma, an update to Safari 26 for both of those, and the latest versions of iOS/iPadOS 15, 16, and 18.
So if you have an Apple device, you should update to the latest point release for your current version, even if you are not ready to upgrade to version 26.
Our friends at Karios recently shared why they chose FreeBSD as the foundation of their hardened operating system.
This is another great example of how companies are leveraging FreeBSD to build secure, production-grade infrastructure.
Curious how other organizations are using FreeBSD? Explore our collection of end-user stories to see real-world use cases and learn how FreeBSD is making an impact across industries:
When you have to buy #clothes:
Do you worry about your data being shared?
Are you concerned about your money disappearing?
Upset when the box arrives & the clothing isn't as expected?
I have the solution.
Go to a #shop. Look at the products. Feel them, try them on. Then pay with cash & leave the shop.
A #secure #service that's been available for decades & no #upgrade or #app required.
#digitalexhaustion
#onlineshopping #digital #security #money #shop #data
#clothing #quality #cash #pay
A 7 year old (yes really) has been referred to the National Crime Agency's Cyber Choices programme to understand the consequences of their actions.
I hope the Head of IT at the school / local authority / trust has also been referred to a similar programme for Cyber Security training, because if a 7 year old can hack your systems then they must be wide open.
#Starmer promised no digital ID; it’s not in #Labour manifesto
#DigitalID changes nature of our relationship with state turning #UK into “papers, please” society
It’s inconsistent with values underpinning free society & poses serious risks to privacy, security
Centralised digital ID scheme are honeypot for #hackers creating huge #security #risks for our #data
Britain historically rejected various forms of mandatory ID. We must reject this one
https://bigbrotherwatch.org.uk/campaigns/no2digitalid/#REPORT
In two weeks, at EuroBSDCon, Tom Smyth and I will be giving a Network Management with the OpenBSD Packet Filter Toolset https://events.eurobsdcon.org/2025/talk/FW39CX/ tutorial.
Register via https://2025.eurobsdcon.org/registration.html
#eurobsdcon #zagreb #openbsd #freebsd #pf #packetfilter #networkin #security
#Plex users read up on this: https://forums.plex.tv/t/important-notice-of-security-incident/930523 #Security
"iCloud Calendar invites are being abused to send callback phishing emails disguised as purchase notifications directly from Apple's email servers, making them more likely to bypass spam filters to land in targets' inboxes."
"While there is nothing particularly special about the phishing lure itself, the abuse of the legitimate iCloud Calendar invite feature, Apple's email servers, and an Apple email address adds a sense of legitimacy to the email and also allows it to potentially bypass spam filters as it comes from a trusted source."
Always be careful with unexpected calls to action.
Common problem, though, has been a problem with Google Calendar for ages, too;
In fact, pretty much all spam I get these days is from very persistent fuckers on Google and Microsoft servers, where it is apparently easy mode to stay under the radar, even if the most simplest form of filtering checks would catch it.
@briankrebs
Here's a gift link (valid til Sept. 12) for the story on oregonlive.com just in case anyone has trouble with the "prove you're a human" page for the archive link
#BMW kills #HomeAssistant integration to "protect #security".
https://odysee.com/@rossmanngroup:a/bmw-kills-home-assistant-integration-to:f
If a public foss repo offers a foss setup.sh command line script which, step by step, performs the installation / usage steps the repo readme lists for use at the command line to set up/use the code, what trust measures would you insist upon before downloading and before running the setup.sh script at your local command line? Is there a better way of offering an helpful automated but trustworthy #Heredoc than a scary .sh ?
#ShellProgramming #git #security #codeberg #shellscript #bourneshell
https://www.europesays.com/uk/399623/ Putin warns Western troops in Ukraine will be ‘legitimate targets’ for Russia – POLITICO #AirDefense #Conflict #Defense #EU #Europe #EuropeanDefense #EuropeanDefensePolicy #Kremlin #Maritime #Military #MultinationalDefensePrograms #NATO #Russia #RussiaSanctions #Safety #Security #Ukraine #VladimirPutin #VolodymyrZelenskyy #War #WarInUkraine
Over the past few days Cloudflare has been notified through our vulnerability disclosure program and the certificate transparency mailing list that unauthorized certificates were issued by Fina CA for 1.1.1.1, one of the IP addresses used by our public DNS resolver service.
https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/
This is a general reminder that you don't need Cloudflare or any central DNS provider.
As ab IT professional with >15 years experience, focusing ~4 years on security I'm confident to say:
> UX comes first, security second.
Reason being that people will *always* find a way around your crappy UX and break your imagined, bulletproof security. You do shit UX, you will have shit security.
My upcoming book, The Book of PF 4th edition, is part of B&N’s pre-order sale Sept 3–5! Use code PREORDER25 for 25% off (35% for Premium members).
#bookofpf #bnpreorder #openbsd #freebsd #pf #packetfilter #networking #security #nostarch #barnesandnoble
New Privacy Guides article 🔒 🚩
by me:
They all claim:
"Your privacy is important to us."
But how can we know if that's true?
With all the privacy washing and disinformation around, it becomes increasingly difficult to evaluate who we can trust with our data.
There are red flags, and green(ish) flags, we can look for to help us assess who to trust, or not 🚩
https://www.privacyguides.org/articles/2025/09/03/red-and-green-privacy-flags/
#PrivacyGuides #Privacy #Security #PrivacyWashing #SecurityTheater #Disinformation
Word is now saving ALL of your files to Microsoft's cloud environments (unless you disable it from the settings). Even your local files are copied there so that Microsoft can analyze the file contents with their AI systems.
Instructions on how to disable that from the Word settings: https://techcommunity.microsoft.com/blog/microsoft365insiderblog/save-new-files-automatically-to-the-cloud-in-word-for-windows/4445216
While procrastinating something, I noticed a wave of script kiddie traffic with a browser ID string matching a Github hosted "security scanning" project, but one without contact info. #github #security #scriptkiddies
Should I
Just keep adding them to the webtrash list: | 1 |
Try harder to warn them about above: | 0 |
Name and shame: | 4 |
Don't care, show results: | 0 |
Come to Zagreb September 24-28, 2025 and geek out with other BSD people at EuroBSDcon!
See https://2025.eurobsdcon.org/
Program https://events.eurobsdcon.org/2025/schedule/
Registration https://2025.eurobsdcon.org/registration.html
#openbsd #netbsd #freebsd #zagreb #eurobsdcon #conference #freesoftware #libresoftware #development #devops #sysadmin #networking #security
Study Confirms, Yet Again, That Age Verification Packed With Privacy and Security Risks
Another study is being tossed onto the pile of evidence showing that age verification is a privacy and security nightmare.
#Censorship #News #Privacy #Security #AgeVerification #Australia #study
Microsoft has confirmed that Windows 11 users will not be able to uninstall the controversial “Recall” feature, despite earlier reports suggesting otherwise. Recall, part of the Copilot+ suite announced in May, automatically captures screenshots of user activity on the operating system including sensitive information such as passwords or financial data https://digitalmarketreports.com/news/25091/microsoft-recall-feature-on-windows-11-not-removable-after-all/ Do yourself a favor and get rid of Windows from your life—enough of these greedy companies. #privacy #security
Is it possible to allow sideloading *and* keep users safe? https://lobste.rs/s/lvfpzx #android #security
https://shkspr.mobi/blog/2025/08/is-it-possible-to-allow-sideloading-and-keep-users-safe/
#Microsoft Refuses To Divulge Data Flows To #Police #Scotland - Slashdot
Freedom of Information documents reveal that Microsoft cannot guarantee data #sovereignty , may process data in "hostile" jurisdictions, retains #encryption key control, and blocks vetting of overseas staff -- all leaving the force unable to comply with strict Part 3 data protection rules.
#privacy #security #foia #foi
What's an open-source tool you literally can't live without?
Drop it below. 👇
Remember to boost 🔁 so we get more hidden gems. 🧵🔥
#Linux #Arch #LinuxMint #Fedora #Debian #Ubuntu #Desktop #FOSS #Privacy #Security #OpenSource #Microsoft #Windows #TechNews #CyberSecurity #Tech #Technology #Apple #OS #iOS #MacOS #OperatingSystem
🔮 Pondering my ORB - A look at PolarEdge Adjacent Infrastructure
https://censys.com/blog/pondering-my-orb-a-look-at-polaredge-adjacent-infrastructure
Microsoft can't guarantee data sovereignty
What a surprise. Don’t allow Microsloth to hold your data, don’t store it in the US - that would be a good start.
The next scheduled "Network Management with the OpenBSD Packet Filter Toolset" fullday session is at EuroBSDcon in Zagreb, 2025-09-25 10:30–17:30: https://events.eurobsdcon.org/2025/talk/FW39CX/
register here: https://2025.eurobsdcon.org/registration.html
#openbsd #freebsd #pf #packetfilter #networking #security #eurobsdcon
Public broadcaster #DR said Danish government & #security sources which it didn’t name, as well as unidentified sources in #Greenland & the #US, believe that at least 3 US nationals w/ connections to #Trump have been carrying out #covert #influence operations in the territory.
1 of those people allegedly compiled a list of US-friendly Greenlanders, collected names of people opposed to Trump & got locals to point out cases that could be used to cast #Denmark in a bad light in US media.
I really enjoy @zackwhittaker's weekly newsletter, this week in security, because:
1. It's written at a level I can understand, as person somewhat tech savvy but certainly far from a security expert.
2. It's not on Substack! It was on MailChimp but just moved to Ghost.
3. Each newsletter ends with a cyber cat.
Good stuff; check it out if you're at all interested in security news.
https://this.weekinsecurity.com
This week we wrapped up our 2025 State of the Internet blog series, in which we examined malicious infrastructure through a variety of lenses.
More specifically, we explored coordinated C2 takedowns, malware linked to the DPRK's fraudulent employment operations, lifespans of C2 servers and open web directories, and the use of residential network devices as proxies for malicious activity.
Take a look! I'm biased, but I think these posts make for some fun reading:
https://censys.com/blog/2025-state-of-the-internet-report-summary-and-conclusions