cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Cablespaghetti's personal snac instance
Admin email
sam@cablespaghetti.dev
Admin account
@sam@cablespaghetti.dev

Search results for tag #security

Paco Hope boosted

[?]Metin Seven 🎨 » 🌐
@metin@graphics.social

[?]LWN.net » 🌐
@lwn@fedi.lwn.net

[?]LWN.net » 🌐
@lwn@fedi.lwn.net

mle✨ boosted

[?]mle✨ » 🌐
@mle@infosec.exchange

Last summer I looked at the Internet exposure of a few devices that have historically been the subject of attacks by Iranian threat actors. Given continued activity in the region, I refreshed that data and took another look at exposures.

Good news: all four device/software types showed at least a slight decrease in exposures since last June, even if we aren't entirely sure why.

More details + graphs here: censys.com/blog/ics-iran-part-

    [?]Hylke Bons 🥜 » 🌐
    @hbons@mastodon.social

    if you like this, I'm aiming to provide at least one project with an app icon every week.

    honoured to have gained around 40 supporters in my first jobless month! ❤️

    your sponsorship will help me keep this up. :)

    mastodon.social/@hbons/1161661

    [?]Hylke Bons 🥜 » 🌐
    @hbons@mastodon.social

    hey everyone,

    you may have guessed reading between the lines, but I lost my job in the recent tech layoffs…

    also burnt out and realised I need to go back to working on stuff I care about.

    I hope to gather enough small monthly sponsors to at least cover the bills, so I can:

    - 🖥️ create beautiful apps for /

    - ✏️ provide free support to projects

    if you like my work, please consider $1/month to make this possible?

    thank you. :)

    github.com/sponsors/hbons

        [?]Wen » 🌐
        @Wen@mastodon.scot

        [?]Paco Hope [He/Him] » 🌐
        @paco@infosec.exchange

        This article about ‘s CLI is also hysterical (in a making me want to give up and join a commune kind of hysterical) because of the anthropomorphising of the AI.

        What is the most frustrating aspect of LLMs? Many would use the anthropomorphic term “hallucination.” Apparently are bad but “dreams” are good?

        When a user goes idle or manually tells Anthropic to sleep at the end of a session, the AutoDream system would tell Claude Code that “you are performing a dream—a reflective pass over your memory files.”

        “Why does my code say that Wonder Woman is running a taco truck downtown and I’m the only person who can save her dog?” Oh. Right. It was dreaming.

          [?]Paco Hope [He/Him] » 🌐
          @paco@infosec.exchange

          We can quit and just go farm potatoes or something. After 25 years of one of the most talked-about tech companies invents a daemon process that

          makes use of a file-based “memory system” designed to allow for persistent operation across user sessions.

          Sure. Just store your system instructions in a random text file.

          Why are we installing endpoint protection on this system?

          Why do we verify cryptographic signatures on software updates to this system?

          Why are we building a zero trust security environment?

          Why do we do scan email to avoid social engineering emails?

          Our AI-assisted users are gonna YOLO right past all that. And if they can’t get past our controls, this agentic Frankenstein will write itself some markdown and work quietly in the background figuring out how to bypass something the user couldn’t bypass on their own.

          This is in 2026

            chfkch :nixos: :rust: boosted

            [?]Hylke Bons 🥜 » 🌐
            @hbons@mastodon.social

            done! drew the rest of the f***ing owl.

            App icon for BitRitter in the GNOME icon style. A light blue shield with a thick darker blue border. Overlayed is a password field.

            Alt...App icon for BitRitter in the GNOME icon style. A light blue shield with a thick darker blue border. Overlayed is a password field.

              [?]Fedora Project » 🌐
              @fedora@fosstodon.org

              TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks. What if you could set up your own CA to reduce your exposure?

              ➡️ fedoramagazine.org/make-a-priv

                [?]LWN.net » 🌐
                @lwn@fedi.lwn.net

                [?]Rich Stein (he/him) » 🌐
                @RunRichRun@mastodon.social

                Great distraction from the Epstein files and the thickening quagmire in Iran — but it's not going to lower gas prices nor help with the midterms:
                U.S. plans a witch hunt — err... antifa summit.

                Deflect and distract. 🙁
                reuters.com/world/us/us-counte
                h/t @Nonilex
                masto.ai/@Nonilex/116323980616

                  [?]LWN.net » 🌐
                  @lwn@fedi.lwn.net

                  Vulnerability Research Is Cooked (sockpuppet.org)

                  lwn.net/Articles/1065586/

                    [?]LWN.net » 🌐
                    @lwn@fedi.lwn.net

                    [?]Larvitz :fedora: :redhat: » 🌐
                    @Larvitz@burningboard.net

                    Running your own identity provider is all fun and games until you're debugging OIDC token flows at 2 AM.

                    If you want to deploy Keycloak 26 the right way - with proper network isolation, no plaintext passwords, and systemd-native declarative configs. I just published a new deep-dive.

                    We're ditching compose files and building a production-ready, daemonless stack using Podman Quadlets and systemd.

                    Read the full guide here: blog.hofstede.it/keycloak-26-o

                      [?]Liminal witch 🧙‍♀️ Sarah [She/sie/tema] » 🌐
                      @xgebi@hachyderm.io

                      [?]IAintShootinMis » 🌐
                      @iaintshootinmis@digitaldarkage.cc

                      maintainer has lost control of their account. Malicious versions 1.14.1 and 0.30.4 have been published which include a RAT.

                      NPM has pulled the effected versions and the payload. Time to clean up and see if you were effected.

                      StepSecurity has an awesome write up on this issue with

                      Link follows this toot.

                        [?]ArcaneChat » 🌐
                        @arcanechat@fosstodon.org

                        Keep in contact with colleagues without having to give your phone number

                        With you can also keep separated profiles, one for family and more intimate friends and other for people you don't have so close relation with

                        ArcaneChat: Welcome to private chatting

                        Alt...ArcaneChat: Welcome to private chatting

                          [?]🇩🇪 🇺🇦 🇨🇦:nonazis: » 🌐
                          @ManyRoads@mstdn.social

                          [?]LWN.net » 🌐
                          @lwn@fedi.lwn.net

                          Chewie boosted

                          [?]Brian Greenberg :verified: » 🌐
                          @brian_greenberg@infosec.exchange

                          I teach cybersecurity. And I genuinely don't know what to tell my students after this one. Federal reviewers spent years trying to get basic encryption documentation from Microsoft for its GCC High government cloud. They couldn't get it. One reviewer called the system a "pile of spaghetti pies," with data traveling from point A to point B the way you'd get from Chicago to New York: a bus to St. Louis, a ferry to Pittsburgh, and a flight to Newark. Each leg is a potential hijacking. They knew this. They said this out loud in writing. Then they approved it anyway in December 2024, because too many agencies were already using it. 🔐 That's not a security review. That's a hostage negotiation. Two things in this story should make every CISO and CIO uncomfortable:

                          🧩 Microsoft built its federal cloud on top of decades of legacy code that it apparently can't fully document itself
                          👮 "Digital escorts" often ex-military with minimal software engineering backgrounds are the firewall between Chinese engineers working on the system and classified U.S. networks 🤦🏻‍♂️

                          The scariest line in the whole ProPublica investigation isn't the "pile of shit" quote. It's this: FedRAMP determined that refusing authorization wasn't feasible because agencies were already using the product. Read that again. The security review process reached a conclusion based on sunk cost, not risk. Ex Post Facto Fallacy

                          If that logic holds, the compliance framework is just documentation theater. And right now, CISA is being hollowed out, so there are fewer people left to even run the theater.

                          arstechnica.com/information-te

                            [?]Brian Greenberg :verified: » 🌐
                            @brian_greenberg@infosec.exchange

                            Oh boy. Stanford researchers scanned 10 million web pages and found API keys just sitting in the public-facing code. That's 1,748 active credentials from major providers exposed in live website code, mostly inside JavaScript files. Not in old test environments. Not in a forgotten repo. In the live, running site. Banks. Healthcare providers. "Not just small companies, but some very large companies," according to the lead researcher. And some of those credentials had been sitting there for years. Not the first time I've seen something like this. 🤦🏻‍♂️

                            The thing is that most orgs are scanning their source code but not their deployed sites. 😳 Those are two different things, and most leaks originate during the build process. A key gets baked in somewhere between development and production, and nobody catches it because the scan already ran upstream. Meanwhile, GitGuardian counted over 28 million new hardcoded secrets exposed in public GitHub commits in 2025 alone. This isn't a one-time research finding it's a systemic habit that needs to change.

                            🔍 When did your team last scan the live site, not just the codebase?
                            🏦 If you're in a regulated industry, that question just became a compliance question too

                            newscientist.com/article/25201

                              [?]ArcaneChat » 🌐
                              @arcanechat@fosstodon.org

                              if you are looking for a messenger to use with the kids, take a look at

                              no SIM card needed, no phone number required for registration, easy setup, just set a name

                              kids can NOT be discovered by strangers

                              No public groups or channels, kids can NOT discover inappropriate content

                              just the family chat

                                [?]LWN.net » 🌐
                                @lwn@fedi.lwn.net

                                [$] The many failures leading to the LiteLLM compromise

                                LiteLLM is a gateway library providing access to a number of large language models (LLMs); it is popular and widely used. On March 24, the word went out that the version of LiteLL [...]

                                lwn.net/Articles/1064693/

                                  [?]LWN.net » 🌐
                                  @lwn@fedi.lwn.net

                                  The telnyx packages on PyPI have been compromised

                                  lwn.net/Articles/1065059/

                                    [?]LWN.net » 🌐
                                    @lwn@fedi.lwn.net

                                    [?]LWN.net » 🌐
                                    @lwn@fedi.lwn.net

                                    [?]LWN.net » 🌐
                                    @lwn@fedi.lwn.net

                                    [$] Collaboration for battling security incidents

                                    The keynote for Sun Security Con 2026 (SunSecCon) was given by Farzan Karimi on how incident handling can go awry because of a lack of collaboration between the "good guys"—which s [...]

                                    lwn.net/Articles/1063459/

                                      [?]LWN.net » 🌐
                                      @lwn@fedi.lwn.net

                                      Setting up a Tor Relay at National Taiwan Normal University (Tor Blog)

                                      lwn.net/Articles/1064671/

                                        [?]LWN.net » 🌐
                                        @lwn@fedi.lwn.net

                                        Raff Karva boosted

                                        [?]Steve Woods » 🌐
                                        @wood5y@mastodonapp.uk

                                        "The FCC notes that miscreants have exploited security flaws in routers to disrupt networks or steal intellectual property, and routers are also implicated in the Volt, Flax, and Salt Typhoon cyberattacks.

                                        There is an element of hypocrisy in all this because American intelligence agencies were previously caught intercepting Cisco-made routers on their way to customers and updating their firmware to deploy espionage tools."

                                        theregister.com/2026/03/24/fcc?

                                          [?]Tom :damnified: » 🌐
                                          @thomas@metalhead.club

                                          Heute: eBPF und Seccomp 🧑‍💻

                                          Screenshot of C code with BPF Macros

                                          Alt...Screenshot of C code with BPF Macros

                                            [?]Brian Greenberg :verified: » 🌐
                                            @brian_greenberg@infosec.exchange

                                            🚨 The FCC bans all routers made outside the U.S. — So basically all routers.

                                            Most people buy a router and never think about it again. That box in the corner that handles every password and video call you make. The FCC is now worried that some of these devices are actually open doors for foreign governments. Shocked! 🫢

                                            Regulators are looking at TP-Link to see if they pose a threat to national security. Recent reports show hackers used these devices to build massive botnets. You might find yourself shopping for new hardware if these bans take effect.

                                            🧠 Regulators are weighing a ban on specific foreign routers.
                                            ⚡ Security experts found flaws that allow remote access.
                                            🎓 This move follows previous restrictions on Chinese tech firms.
                                            🔍 Check your hardware brand before the new rules arrive.

                                            mashable.com/article/us-fcc-fo

                                              [?]Tom :damnified: » 🌐
                                              @thomas@metalhead.club

                                              Learned _a lot_ about namespaces and the corresponding Linux syscalls today 😵‍💫🤯

                                              security

                                                [?]LWN.net » 🌐
                                                @lwn@fedi.lwn.net

                                                [?]LWN.net » 🌐
                                                @lwn@fedi.lwn.net

                                                [?]Ricardo Martín :bsdhead: » 🌐
                                                @ricardo@mastodon.bsd.cafe

                                                RE: ec.social-network.europa.eu/@E

                                                What an effing joke.
                                                This Cyber Resilience Act (CRA) dumps mandatory cybersecurity requirements on manufacturers using FOSS, while the @EUCommission guts and cancels even its already pathetic, support for FOSS projects.
                                                Add the total pants-down surrender on issues like , the gutting of citizen safeguards through the changes to and 2.0:
                                                An absolute disgrace

                                                [?]European Commission » 🌐
                                                @EUCommission@ec.social-network.europa.eu

                                                Europe champions digital freedom and its open source community.

                                                We have introduced a tailored approach to boost open source development across EU countries and ensure it is safe from cyber threats.

                                                We only apply security rules to software used in commercial activities.

                                                We are also creating open source software stewards to support security with a light-touch regime and no administrative fines.

                                                Find out more 👇
                                                link.europa.eu/Jc7hBy

                                                The image features the phrase "Be open. Be bold. Be" written in white text centered against a deep blue background. Below the word "Be," there is a circle of twelve golden yellow stars, which is the iconic emblem of the European Union.

                                                Alt...The image features the phrase "Be open. Be bold. Be" written in white text centered against a deep blue background. Below the word "Be," there is a circle of twelve golden yellow stars, which is the iconic emblem of the European Union.

                                                  RevK :verified_r: boosted

                                                  [?]Open Rights Group » 🌐
                                                  @openrightsgroup@social.openrightsgroup.org

                                                  Instead of handing government contracts to predatory Big Tech, the UK should ensure we have control of our digital infrastructure.

                                                  Even secure systems are fragile if a foreign company or power can pull the plug.

                                                  Sign our petition for a digital sovereignty strategy that priorities UK open source ⬇️

                                                  you.38degrees.org.uk/petitions

                                                    Chewie boosted

                                                    [?]Open Rights Group » 🌐
                                                    @openrightsgroup@social.openrightsgroup.org

                                                    The UK’s reliance on US Big Tech is a national security issue ⚠️

                                                    But the UK is giving the controversial spyware company Palantir more contracts and more access to our data.

                                                    We're increasingly vulnerable to companies that lock us in to proprietary systems, creating dependency not independence.

                                                    theguardian.com/technology/202

                                                      [?]LWN.net » 🌐
                                                      @lwn@fedi.lwn.net

                                                      [?]Zak :1password: » 🌐
                                                      @zak@infosec.exchange

                                                      When was the last time you checked for a firmware update for your networking hardware? Is your router running up to date software?

                                                        [?]Lobsters » 🤖 🌐
                                                        @lobsters@mastodon.social

                                                        H&R Block tax software installs a TLS root certificate with bundled private key lobste.rs/s/d5nvf5
                                                        news.ycombinator.com/item?id=4

                                                          [?]Larvitz » 🌐
                                                          @Larvitz@mastodon.bsd.cafe

                                                          Exciting news. I've just pushed a collection of ports for the Card ecosystem to Codeberg.

                                                          Includes:
                                                          - openpgp-card-tools (oct)
                                                          - openpgp-card-tools-git (oct-git)
                                                          - openpgp-card-ssh-agent

                                                          I'm currently polishing them for official submission to the freebsd ports tree this April!

                                                          A huge thank you to @hko for these excellent tools!

                                                          codeberg.org/Larvitz/freebsd-o

                                                            Back to top - More...