Avatar

𝔻𝕒𝕧𝕖

dotdi@lemmy.world
Joined
0 posts • 18 comments
Direct message

Tor itself was not breached. Rather, the suspects were using an outdated, long-retired app that did not employ some of the protections that are now available, and this, in turn, allowed investigators to carry out the attack.

permalink
report
reply

Als jemand der jahrelang über einer Familie mit 2 Kettenrauchern gewohnt hat, und dessen Balkon bzw. alle Fenster auf der selben Seite wie der Balkon unbenutzbar waren: bitte, bitte strengere Maßnahmen gegen Raucher.

permalink
report
reply

I said it before and I’ll say it again: we need to work harder so that this asshole can buy his 2nd yacht. Have some compassion.

permalink
report
reply

Hard drives (SSDs, etc) are not the only durable storage that can be written to

permalink
report
parent
reply

I am outraged, a plea deal to avoid life imprisonment? What the fuck did I just read?!

This guy trafficked, raped and tortured her, and other underage women. Police did jack shit. And she was supposed to be watching him just walk away? Grotesque.

permalink
report
reply

Best of luck everyone!

I would love to win one of the keys for the Final Fantasy VII Remake.

permalink
report
reply

Yes, I have been eyeing a soft switch into cybersecurity. Maybe not head-over-heels and maybe not entirely, but I do plan to have a significant part of my work to be in infosec.

For context, I am currently working as Tech Lead/Software Architect for a company that has a security-focused product (with an, as of today, 0 incident track record), but I work on design and scalability most days. When involved in security-related tasks, I mostly coordinate and sometimes implement security critical code under the guidance of our (small) security team.

I do have enough insight to have a positive impact on security related discussions on higher levels (think “lol, this proposed change opens up the endpoint to being exploited by x or y”) but not enough to discuss our cryptographic primitives.

In order to get my feet wet, I started doing THM (quite actively, yet I’ve hit a rut with the Windows-focused buffer overflow rooms), and I can say I enjoy it more than I expected.

However, I am unsure what concrete steps I should take after THM.

I’ve been thinking of working towards the OSCP exam, but honestly the certification landscape is quite confusing.

permalink
report
reply

“It is difficult to get a man to understand something, when his salary depends on his not understanding it.”

― Upton Sinclair

permalink
report
reply