sourcerer

joined 1 year ago
 

What Is Pretexting in Cyber Security? [Easy Guide & Examples]

by Spencer Abel

https://www.stationx.net/what-is-pretexting-in-cyber-security/

@offtopic
#security

4
The Story of VisiCalc (mastodon.bsd.cafe)
submitted 6 months ago* (last edited 6 months ago) by [email protected] to c/[email protected]
 

Reproducible builds - pros/cons

Instructor allowed me to quote his take on Pros and Cons of reproducible builds. Because, i found this very informative i want to share with others.

Original author: Nathan House (Station X)

"Reproducible builds involve a compilation process that generates the same binary or executable output for a given source code, regardless of the building environment. This approach offers various pros and cons when it comes to security, privacy, and anonymity.

Pros:

  1. Trustworthiness: Reproducible builds ensure that the released binary is built from the published source code, allowing users to trust the software without having to compile it themselves.

  2. Tamper detection: Any attempts to introduce backdoors or malware during the build process can be detected, as the output can be verified against the expected result.

  3. Collaborative verification: Multiple parties can independently verify the builds, increasing confidence in the software's integrity.

  4. Supply chain security: Reproducible builds can help mitigate supply chain attacks by ensuring the integrity of the code throughout the development, build, and distribution process.

Cons:

  1. Increased complexity: Implementing reproducible builds can be complex and time-consuming, requiring consistent build environments and careful management of dependencies.

  2. Limited scope: Reproducible builds only ensure the integrity of the build process and do not guarantee that the source code is free of vulnerabilities or malicious code.

  3. False sense of security: Users may assume that reproducible builds imply that the software is entirely secure, while they only guarantee that the build process is consistent and hasn't been tampered with.

  4. Overhead: Maintaining a reproducible build environment may introduce additional overhead for developers, potentially slowing down the development process.

Overall, reproducible builds can significantly enhance security, privacy, and anonymity in the software development process. However, their implementation requires careful planning and may introduce challenges and complexities that need to be managed effectively."

#security #privacy #linux #reproducible_builds

@offtopic

3
submitted 6 months ago* (last edited 6 months ago) by [email protected] to c/[email protected]
 

A detailed guide to TrueNAS and OpenZFS

by Jason Rose

https://jro.io/truenas/

#openzfs #truenas @offtopic

 

Why Emoji are More Complicated Than You Think

by Dylan Beattie

https://www.youtube.com/watch?v=QddjMBzyJUQ

@offtopic

 

IT Security Weekend Catch Up – March 1, 2024

by badcyber

https://badcyber.com/it-security-weekend-catch-up-march-1-2024/

@security #security

2
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

"How I Built a Car In a Box "

article by Julien Rakotomalala

https://blog.quarkslab.com/how-i-built-a-car-in-a-box.html

@offtopic #car #electronics

2
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

"Hacking Casino | How Math Beats the Casino Odds"

by Sumsub

No matter how good You are, they will show You a exit doors... Don't gamble!

I loved part with blackjack and it's my favorite one!

https://www.youtube.com/watch?v=87Fg2EX4gHk

#casino #hacking #math
@offtopic

 
[–] [email protected] 2 points 1 year ago
view more: ‹ prev next ›