Ryan is one of my favorite persons in the #PHP community. I cannot imagine what he and his family must be going through. They face expensive medical bills and more ahead. If you can help financially, please do so.

gofundme.com/f/support-ryans-b…

#php

We are part of the #ZOOOMProject consortium, a #HorizonEU project with the purpose of promoting open technologies. 🚀

💡 Recently, the :fsfe: #FSFE legal team produced 4 chapters in 2 comprehensive reports, dealing with many topics, and providing empirical data on #FreeSoftware topics in 🇪🇺 in relation to critical technologies, such as AI.

📃 Check them out!
🔸 zooom4u.eu/wp-content/uploads/…
🔹 zooom4u.eu/wp-content/uploads/…

⚠ NGI Zero Commons Fund 2nd call ⚠

Are you developing or contributing to #FreeSoftware that contributes to the vision of the Next Generation Internet?

💥 You might be eligible for the @nlnetlabs funds!

💡 Find out more information and how to apply here: ⤵️

nlnet.nl/news/2024/20240401-ca…

unemployed

Sensitive content

This entry was edited (1 year ago)

Hey! Let's talk about #SSH and #security!

If you've ever looked at SSH server logs you know what I'm about to say: Any SSH server connected to the public Internet is getting bombarded by constant attempts to log in. Not just a few of them. A *lot* of them. Sometimes even dozens per second. And this problem is not going away; it is, in fact, getting worse. And attackers' behavior is changing.

The graph attached to this post shows the number of attempted SSH logins per day to one of @cloudlab s clusters over a four-year period. It peaks at about 3.4 million login attempts per day.

This is part of a study we did on our production system, using logs of more than 640 million login attempts, covering more than 1,500 hosts on our side and observing more than 840 thousand incoming IP addresses.

A paper presenting our analysis and a new, highly effective means to block SSH brute force attacks ("Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them") will be presented next week at #NSDI24 by @sachindhke . The full paper is at flux.utah.edu/paper/singh-nsdi…

Let's dive in. 🧵

in reply to Rob Ricci

I've got a big picture question that may sound silly: What's the point in blocking the attacks?

If you've got user accounts with weak passwords, then that is a problem that should probably be addressed with higher priority than the frequency of attacks.

If you've only got users with strong public keys, then attacks won't succeed anyway. Blocking them will save you some resources, but will also redirect the attackers to weaker targets. Isn't it overall better to just tank the attacks?

in reply to some fedifriend

@samgai Not a silly question at all, it's a great question!

One reason to block ssh brute force attempts is that you may have devices on your network that you don't know are vulnerable: for example, we see lots of attempts to attack IoT devices, such as a big spike of attempts to log in to accounts associated with the Dauha backdoors when those were revealed. We also see lots fo attempts to log into routers from various vendors (Unifi, MikroTik, and Huawei).

Another is that in some cases, you don't have full control over your users. The facility we operate is cloud-like in the sense that we do control the initial configurations of sshd and can force users to use good passwords, but after that, they have root and can - and do - change configurations or set local passwords in a way that makes the vulnerable.

A third reason is that a lot of these attacks are *probably* coming from botnets that are launching a range of different kinds of attacks. So if you can easily recognize them as ssh attackers, you can block them completely, possibly saving yourself from other attacks.

Finally, they consume resources on the target machine - maybe not a lot, but heavy attacks can have a significant impact, and we want to keep this impact low.

I set myself the task to design and print 50 birds using a custom LEGO letterpress technique. This was in 2018. Figured it would take a year or so. I finished the last print earlier this year :-D

Presenting the complete series for the first time in an exhibiton in the workplace where the prints were made. Opening this weekend:

royscholten.nl/50-birds/

Come! :-)

_
#letterpress #printmaking #LEGOletterpress #MastoArt #birds

Hallo Quick-Freeze! ❤️😍❤️😍 netzpolitik.org/2024/einigung-…
This entry was edited (1 year ago)

We're often asked "When can I use Thunderbird in my browser?" It's a logical question! After all, Thunderbird was built on top of Firefox technologies, right?

Let's have a quick chat about it:

PeerTube: tilvids.com/w/fUUkxQCFvVJdPgxx…

YouTube: youtu.be/LQwgG2sLIVE

#Thunderbird #Firefox #Webmail

:ynh: :jabberxmpp:

#YunoHost devs are testing #Prosody as #xmpp #jabber replacement for metronome to get better integration with the system and better compliance with jabber standards. Also new default features as A/V calls.

It's on early development, without ETA!!

great news IMO 👌

thank you 🙏 🧙

in reply to Tuta

5. One engineer from a firm acquired by Microsoft in 2020 was working on a compromised laptop and in 2021 accessed the corporate network from that machine. It's not certain that this laptop was the root cause, but Microsoft published an update in March 2024 which stated a “compromised engineering account” is the “leading hypothesis” for the cause of the breach.

🧵6/7

in reply to Tuta

6. Instead of letting this compromise go unnoticed, Microsoft should have run a proper security assessment of the firm's network after its acquisition - which it didn't.

More on this hack and what the US government has to say about it: tuta.com/blog/microsoft-china-…

🧵7/7

Last year, the @sovtechfund fund invited us, the Sequoia PGP Project, to join their new Bug Resilience Program.

Today, I'm pleased to announce that we are publicly launching our bug bounty program with rewards of up to €10,000 for novel, security-relevant issues in Sequoia applications, libraries, or specifications. #pgp

sequoia-pgp.org/blog/2024/04/1…

👉 Still not sure what to make of Meta's 'Pay or Okay' model?

Researcheres at Utrecht University have come to the conclusion that it violates the GDPR, as it fails to ensure that consent is freely given.

📝 Read the full paper here: papers.ssrn.com/sol3/papers.cf…

Love ❤️ #LibreOffice? Come and meet the worldwide community that makes it, at local events! For instance, we were recently at the InstallFest 2024 conference in Prague: blog.documentfoundation.org/bl… #foss #OpenSource

Revolut does not have a UK banking licence.

If you are a victim of fraud you'll be SOL.

Best advice; close your account and move conventional bank elsewhere.

Please boost to make people in the UK aware.

theguardian.com/money/2024/apr…

#fraud

Our new Chief Technology Officer, Gerald Hartig, is being interviewed on Vision Australia Radio tonight at 8:10pm AEST (About 1hr 15mins after I post this). You can tune in online at: player.listenlive.co/65731/

#NVDA #ScreenReader #Accessibility #Interview #News #A11y