gyptazy.com is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Only tech related content - nothing else!
Admin email
contact@gyptazy.com
Admin account
@gyptazy@gyptazy.com@gyptazy.com

Search results for tag #infosec

AodeRelay boosted

[?]Anthony » 🌐
@abucci@buc.ci

Gradient ascent is superior to generate-and-test in any domain in which you have even a heuristic gradient that is sometimes wrong.

Why people working on software where something serious is at stake would throw out known gradient to use a code generator + testing is beyond my capacity to understand.

https://1password.social/@1password/116580082041363054


    13 ★ 11 ↺
    Sandy S. boosted

    [?]gyptazy » 🌐
    @gyptazy@gyptazy.com

    AI assisted pen testing, coding and arising secvulns. Are we humans still good enough?

    the last weeks we saw more and more security issues coming up. Let's talk!

    Sorry, a pretty long blog post about this...

    https://gyptazy.com/blog/coding-after-ai-are-humans-still-good-enough/


    Let's talk about AI slops - like this image!

    Alt...Let's talk about AI slops - like this image!

    Emoji reactions:
      AodeRelay boosted

      [?]RemADeus » 🌐
      @RemADeus@wehavecookies.social

      Reading this blow post makes you angry at vendor & platform lock in

      Do something about it

      # FIGHT

      Athropy is used here

      fireborn.mataroa.blog/blog/the

      #

        [?]mkb » 🌐
        @mkb@mastodon.social

        Hey, practitioners, are there introductory materials you’d recommend to someone new? I need to ramp up someone new to the field the texts I started with are all pretty dated at this point.

          [?]h3artbl33d :openbsd: :antifa: [Try/Me] » 🌐
          @h3artbl33d@exquisite.social

          About that... We now have a fourth vulnerability: ssh-keysign-pwn. Despite the first three letters, this is a Linux kernel vuln. PoC already available.

            AodeRelay boosted

            [?]PLA_906114 » 🌐
            @PLA_906114@mastodon.illumos.cafe

            All of them need local physical access to the servers right?

            @h3artbl33d

              AodeRelay boosted

              [?]Dendrobatus Azureus » 🌐
              @Dendrobatus_Azureus@mastodon.bsd.cafe

              The more you read this piece of excellent work the more you realize how much energy we, as the Open Source community, the programma's and the users, shall need to put in another to get a proper Balance Again

              Read the section here.

              Source:

              fireborn.mataroa.blog/blog/the

              against

                AodeRelay boosted

                [?]Dendrobatus Azureus » 🌐
                @Dendrobatus_Azureus@mastodon.bsd.cafe

                I knew my browser was chatty but I didn't know that my browser on Android was so chatty and so wonderful with giving out free space

                Space that I need!

                Sources

                sinceyouarrived.world/taken

                  [?]Metin Seven 🎨 » 🌐
                  @metin@graphics.social

                  🧵 Pixel art works, 8/x

                  Isometric pixel illustration for a Dutch infosec company.

                  Stylized isometric pixel artwork of a character operating a rugged laptop in a protected environment, surrounded by walls and security cameras.

                  Alt...Stylized isometric pixel artwork of a character operating a rugged laptop in a protected environment, surrounded by walls and security cameras.

                    [?]mc.fly [he/him] » 🌐
                    @mcfly@milliways.social

                    RE: cyberplace.social/@GossiTheDog

                    This YellowKey Bitlocker Bypass Vulnerability is seriously crazy. As if someone found a government / law enforcement backdoor....

                    AodeRelay boosted

                    [?]Kevin Beaumont » 🌐
                    @GossiTheDog@cyberplace.social

                    So I’ve just had a quick play with this and yes, it works. Essentially BitLocker has a backdoor. github.com/Nightmare-Eclipse/Y

                    Mitigation = BitLocker PIN and BIOS password lock.

                      [?]doboprobodyne » 🌐
                      @doboprobodyne@mathstodon.xyz

                      @stefano Hear, hear. And in n years the ability of bad or indifferent actors to collate data will be fantastically better. Not sure if it helps but I made a throwaway email address with a provider that had an email app of its own, so I could chat to estate agents without risking ++ spam. It was so useful that I kept it. In retrospect, I should have added a second pay as you go sim card. I'd wager that thoughtful clubs might let one use a nickname or non de plume and pay with cash or cryptocurrency. I'm guessing if all this was an option you'd have suggested it, but I thought it worth mentioning in this thread for completeness' sake.

                        AodeRelay boosted

                        [?]Sub_Root » 🌐
                        @Sub_Root@techhub.social

                        @GrapheneOS

                        Hardened OSs like do a great job, but we have a major blind spot: The Hardware.

                        Modern phones are networks of dozens of "black box" computers (UFS, Baseband, Wi-Fi) running proprietary code we can't audit, disable, secure or replace.

                        Why this matters:
                        1️⃣ Persistence: Malware in your UFS/SSD controller survives a factory reset.
                        2️⃣ Tracking: Hardware Attestation acts as an immutable digital fingerprint.
                        3️⃣ Shadow Attacks: Zero-click exploits hit your Wi-Fi or Baseband before the OS can even react.

                        We are calling for . Inspired by the philosophy, we demand:
                        ✅ Open & replaceable firmware for ALL subsystems.
                        ✅ User-controlled hardware toggles.
                        ✅ Trust minimization that includes the manufacturer.

                        It's time to move from "Vendor-Enforced Security" to User Sovereignty.
                        Read the full Open Letter here: pastebin.com/RzRbzhwn

                        The Trojan Guardian means a chip that is Security for the Vendor, but Privacy nightmare for the user.

                        Alt...The Trojan Guardian means a chip that is Security for the Vendor, but Privacy nightmare for the user.

                          AodeRelay boosted

                          [?]Umherstreunender Auflauf » 🌐
                          @lasagne@chaos.social

                          Can someone here breach Shopify in a funny way before someone breaches them in a boring way?

                          They are having an "AI" induced quality meltdown.

                          It is absolutely staggering how many shops run on their systems.

                            AodeRelay boosted

                            [?]Radio Azureus » 🌐
                            @RadioAzureus@mastodon.social

                            Patch your Linux home and production servers / clients

                            Privilege escalation bug

                            Instead of asking yourself why the second bug🥈 in 2 weeks has been found on such a level, be glad that it has been found

                            Just patch and move on

                            Note
                            These bugs only occur local not over the network over the internet.
                            Local_privilege_escalation

                            Sources

                            lists.debian.org/debian-securi

                            security-tracker.debian.org/tr

                            Debian bug tracker

                            Alt...Debian bug tracker

                            Debian patch entry

                            Alt...Debian patch entry

                              AodeRelay boosted

                              [?]Shodan Safari » 🤖 🌐
                              @shodansafari@infosec.exchange

                              ... [SENSITIVE CONTENT]

                              ASN: AS197690
                              Location: Antwerpen, BE
                              Added: 2026-05-03T12:36

                                AodeRelay boosted

                                [?]AmmarSpaces » 🌐
                                @AmmarSpaces@infosec.exchange

                                Moscow shutting down internet in May 5th to May 9th in order to ensure Victory Day parade security.

                                What I want to highlight is, if it is started by one country, the other will follows.

                                First, they banned VPNs, now the west also trying to ban VPNs.

                                What is gonna be next? Digital firewall?

                                I am here just telling we need to prepare and prevent your country to fall into this oblivion of internet freedom.

                                militarnyi.com/en/news/moscow-

                                  AodeRelay boosted

                                  [?]MissConstrue [She/Her (Crone Extraordinaire)] » 🌐
                                  @MissConstrue@mefi.social

                                  Everybody hates . But, despite tech reporting being willing to give the leeway, this new measure is not to stop robocalls, it won’t do a damn thing to stop robocalls. What it does is make burner phones illegal.

                                  Burners are an integral part of many social justice actions. Protestors use them to record and other . We include them in “Go Bags” to let abused women and children escape. They allow for anonymity.

                                  They are a thorn in the side of the panopticon, and they are moving to eliminate them.

                                  Stock up kids.

                                  gizmodo.com/fcc-attempts-to-so

                                  wiley.law/alert-FCC-Proposes-S

                                  mashable.com/article/fcc-propo

                                    AodeRelay boosted

                                    [?]Shaula Evans » 🌐
                                    @ShaulaEvans@zirk.us

                                    New Google Sheets "Chip" feature lets you extract data about people.

                                    My takeaway: if you view a shared Google Sheet while logged into a Google Account, the doc owner (maybe others) can extract your location & phone. 1/n

                                    support.google.com/docs/answer

                                    Google Help screenshot. Text says:

Types of data you can extract

You can extract data from smart chips in your Google Sheets to include information about the
following chips:

People smart chip A
Information comes from domain profiles.
+ Email
+ Name
+ Location*
+ Phone*
« Title*
Note: Information with * are only available to Google Workspace Business Standard, Business Plus,
Enterprise Essentials, Enterprise Standard, Enterprise Plus, Education Fundamentals, Education
Plus, Education Standard, and the Teaching and Learning Upgrade users.

                                    Alt...Google Help screenshot. Text says: Types of data you can extract You can extract data from smart chips in your Google Sheets to include information about the following chips: People smart chip A Information comes from domain profiles. + Email + Name + Location* + Phone* « Title* Note: Information with * are only available to Google Workspace Business Standard, Business Plus, Enterprise Essentials, Enterprise Standard, Enterprise Plus, Education Fundamentals, Education Plus, Education Standard, and the Teaching and Learning Upgrade users.