Skip Navigation

Posts
71
Comments
578
Joined
4 yr. ago

Bit-breaker working in cybersecurity/IT. Only languages I know are English and Programming ones.

Sometimes I write things about technology.


If I told you the SHA256 for this sentence starts with 'c, 5, four, a, and a', would you believe me?

  • People don't generally quit bad jobs, they stick it out for whatever reason. They do quit having a bad boss though.

  • There's a really nice high level overview of TOP/MFA by OWASP

    They say:

    There is no definitive "best way" to do this, and what is appropriate will vary hugely based on the security of the application, and also the level of control over the users. Solutions that work for a corporate application where all the staff know each other are unlikely to be feasible for a publicly available application with thousands of users all over the world. Every recovery method has its own advantages and disadvantages, and these need to be evaluated in the context of the application.

    Some suggestions of possible methods include:

    • Providing the user with a number of single-use recovery codes when they first setup MFA.
    • Requiring the user to setup multiple types of MFA (such as a digital certificate, OTP core and phone number for SMS), so that they are unlikely to lose access to all of them at once.
    • Mailing a one-use recovery code (or new hardware token) to the user's registered address.
    • Requiring the user contact the support team and having a rigorous process in place to verify their identity.
    • Requiring another trusted user to vouch for them.

    The most important thing I think is, the MFA reset should have a different method and flow than the password reset option. Figure if an attacker attempts the 'forgot password' method, it's assumed they have access to the users email. Therefore, you don't want to send a 'reset MFA' in the same manner. The password recovery flow should be separate to the MFA recovery flow by using some form of out-of-band verification such as sending a password reset link within a "forgotten password email" containing a randomly generated and unique token that allows the user to reset the password only. The MFA recovery flow should work in a different manner. If you are offering TOTP only, I suggest offering a fallback method in place such as a list of "backup codes" of valid OTPs that the user needs to keep safe, and is obtained when first enrolling in MFA, or otherwise an OTP sent via SMS with a short expiration time. Ask for the TOTP while entering a new password. The reset link would be useless for the attacker.

  • Unnecessary. It's a damn text editor. Leave it simple.

  • Add it to the list of illegal shit his administration has been doing.

  • A computer (AI) can never be held accountable. Therefore, a computer (AI) must never make any human decision.

  • And yet the prices for consumers will not reflect such. MOAR PROFITS! YAY.

  • “I wanted to be a good boy,” Trump said, describing his relative restraint

    AAHahahahaaaaaaaaaahhaaaaaaaaaaaaa. Oh, what a POS.

  • What error messages are yo getting?

    Back in the day I used tintin and even got a stripped down copy working on android. That experience I don't recommend.

  • Deleted

    Permanently Deleted

    Jump
  • Praise be to Odin.

  • Deleted

    Permanently Deleted

    Jump
  • Fun? Lua, Odin, nim, zig.

    Impractical? Brain fuck.

  • Definitely need to learn the key concepts and processes first. But give nfpm a try.

  • What TUI browser are you using? With browsh or carbonyl (which uses a headless firefox or chrome instance, respectively) I am able to login and view any sites requiring javascript, as well as logging in to Lemmy/Beehaw

  • Buy our warplanes or we're gonna bomb you.

    What the actual Shit???!!

  • Lemmy.ca now upgaded to 0.19.15

    Jump
  • Noticed any issues during the upgrade?

  • Don't worry, they "fixed it".

  • Lynx is awesome but not really suited for modern web pages. I've used lynx, elinks, browsh, and w3m. Tried chawan and brow6el. I really like browsh, but it uses a headless firefox though, so not really CLI/TUI. This is the newest CLI based browser I found, but I suppose it's not a true CLI either; using chromium blob under the hood.

  • Music @beehaw.org

    Rafferty - White flower

    open.spotify.com /track/68bLpWhZivilbacdheOIQz
  • Music @beehaw.org

    Bottom of a Bottle - Butcher Babies

    open.spotify.com /track/5z7dtFHg2AxZmaowYc03FV
  • Beehaw Support @beehaw.org

    Beehaws Lemmy upgrade

  • Technology @beehaw.org

    How I Got Hacked: A Warning about Malicious PoCs

    chocapikk.com /posts/2025/s1nk/
  • Socialism @beehaw.org

    This ‘College Protester’ Isn’t Real. It’s an AI-Powered Undercover Bot for Cops

    www.wired.com /story/massive-blue-overwatch-ai-personas-police-suspects/
  • Security News @infosec.pub

    US Gov Funding Expires for MITRE- Cyber Vulnerability Database

    krebsonsecurity.com /2025/04/funding-expires-for-key-cyber-vulnerability-database/
  • Fediverse @midwest.social

    Pixelfed leaks private posts from other Fediverse instances

    fokus.cool /2025/03/25/pixelfed-vulnerability.html
  • Gaming @beehaw.org

    3,700 hrs in Rimworld - my current colony

  • LGBTQ+ @beehaw.org

    New trans friendly social media site

    t4t.social
  • Mathematics @lemmy.ml

    Kelly Can’t Fail - betting strategy

    win-vector.com /2024/12/19/kelly-cant-fail/
  • Web Development @programming.dev

    Myths about only using 'Single Page App' methods to build interactive web sites

    htmx.org /essays/you-cant/
  • Chat @beehaw.org

    How's your week going, Beeple?

  • Music @beehaw.org

    I'm A King Bee - The Stone Foxes

    open.spotify.com /track/01RPOnIW38TuFv0CvHdVmz
  • Programming @programming.dev

    A Rant about Front-end Development

    blog.frankmtaylor.com /2024/06/20/a-rant-about-front-end-development/
  • Technology @beehaw.org

    Concurrency models of Rust and Golang

    kerkour.com /rust-vs-go-concurrency-models-stackfull-vs-stackless-coroutines
  • Fediverse @midwest.social

    Encrypted DMs Are Coming to ActivityPub

    wedistribute.org /2024/05/encrypted-dms-activitypub/
  • Music @beehaw.org

    Music for the week - 18th March 2024

    open.spotify.com /playlist/1nC1lCZjGdCPx6pAueDohz
  • /c/cybersecurity - Cybersecurity News & Discussion @lemmy.ml

    An alternative approach to incident reporting

    archive.today /1W8V9
  • cybersecurity @infosec.pub

    AnyDesk - Cybersecurity incident, public statement

    anydesk.com /en/public-statement
  • Beehaw Support @beehaw.org

    Community Popularity