A part of tbe password of the current national security director is the word
Shraddha | Rituals, Beliefs, & Traditions | Britannica
britannica.com/topic/shraddha

Livebericht aus der Arztpraxis:
"Aus für Faxgeräte"

The Future Is Nawwwww :ablobattentionreverse:

What is my login passwort for app.element.io?
Looking for a advice.

openvpn client certificate set expiry

>> Commit: Set client and server certificates validity to 10 years (#1235)

github.com/angristan/openvpn-i

10 years is a bit long from perspective, isnt it? Especially for user certificates.

M2M I0T certificates need to be longer valid.

# The SwiftKey incident: A Breach of Privacy

The Reddit user's experience with the SwiftKey keyboard showcased the potential magnitude of a cloud synchronization glitch. What seemed like a minor issue quickly escalated into a data leak involving sensitive information like phone numbers, email addresses, and personal words.

blog.guardianai.io/the-hidden-

The originating question was, if I should simply use the pre-installed keyboard app (swift key). I should have trusted my instincts and use an opensource offline keyboard app.

What's the problem with Windows and ed25519 SSH keys that are generated from git-bash.

Do I have a password manager on my phone? No I use to send them from notebook to phone.

Is this stupid? I don't think so. But I'm open for suggestions.

" *Long-lived access tokens* are valid for 10 years. These are useful for integrating with third-party APIs and webhook-style integrations. "

Is this a good idea from perspecitve? I do not think so, but what is a better way?

Probably we need a standardized endpoint e.g. "renew-token" (like auto discovery)

One of the authors name of RFC 6750 sounds like a spy legend. "**** *****".

Sorry man :D

datatracker.ietf.org/doc/html/

, give that a thought:

"edge computing is the idea of running applications as physically close as possible to where the data is generated"

This is a good idea to circumvent

forbes.com/sites/forbestechcou

The Road to Secure Cryptography: Understanding and Preventing Common Misuses

"Do not invent your own crypto":
A whole talk to by 💪 ☺️

media.ccc.de/v/glt23-374-the-r

I'm writing on a talk about using OpenSSH in industrial environments, and there is a slide that says: Where do you know SSH from?

My question is, where do YOU know OpenSSH from?

Answers appreciated :)

Security by obscurity. We learned about that during study. Burnt into the brain. Don't hide shit, someone will find it on the internet. Then came public key cryptography. 😍

en.wikipedia.org/wiki/Public-k

"The second attack specifically singled out one of the four DevOps engineers, targeting their home computer with a keylogger malware to obtain the credentials and breach the cloud storage environment."

Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.