<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 24 Apr 2026 11:59:05 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Apple”</title>
    <link>https://techsnap.systems/tags/apple</link>
    <pubDate>Fri, 06 Mar 2020 00:15:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>424: AMD Inside</title>
  <link>https://techsnap.systems/424</link>
  <guid isPermaLink="false">770823cf-5179-4132-91fb-d67d5ddd5ff4</guid>
  <pubDate>Fri, 06 Mar 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/770823cf-5179-4132-91fb-d67d5ddd5ff4.mp3" length="20391102" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.</itunes:subtitle>
  <itunes:duration>28:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  
Plus Mozilla's rollout of DNS over HTTPS has begun, a big milestone for Let's Encrypt, and more. 
</description>
  <itunes:keywords>Performance per watt, power consumption, energy, CPU, AMD, Intel, EPYC, memory encryption, SGX, SME, TSME, TME, MKTME, security, encryption, Let's Encrypt, HTTPS, SSL, TLS, web security, DoH, DNS over HTTPS, DNS, Cloudflare, Mozilla, Firefox, kr00k, KRACK, WiFi, VPN, WPA2, ESET, wireless, Broadcom, Apple, iPhone, Microsoft Edge, Edge, Microsoft, Chrome, Google, Chromium, open source, NextDNS, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow" href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a></li><li><a title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow" href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/">The Facts: Mozilla’s DNS over HTTPs (DoH)</a></li><li><a title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow" href="https://wiki.mozilla.org/Security/DOH-resolver-policy">Security/DOH-resolver-policy - MozillaWiki</a></li><li><a title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a></li><li><a title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow" href="https://letsencrypt.org/2020/02/27/one-billion-certs.html">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a></li><li><a title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow" href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/">Let’s Encrypt: A History - The Morning Paper</a></li><li><a title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow" href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a></li><li><a title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow" href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow" href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a></li><li><a title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow" href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features">Microsoft shares a roadmap for the new Microsoft Edge</a></li><li><a title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow" href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808">Microsoft Edge: Top Feedback Summary for March 4</a></li><li><a title="Download Microsoft Edge Insider Channels" rel="nofollow" href="https://www.microsoftedgeinsider.com/en-us/download/">Download Microsoft Edge Insider Channels</a></li><li><a title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a></li><li><a title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow" href="https://www.eset.com/int/kr00k/">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a></li><li><a title="Kr00k Paper" rel="nofollow" href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf">Kr00k Paper</a></li><li><a title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow" href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a></li><li><a title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow" href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a></li><li><a title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow" href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/">Cloudflare’s Gen X: Servers for an Accelerated Future</a></li><li><a title="Impact of Cache Locality" rel="nofollow" href="https://blog.cloudflare.com/impact-of-cache-locality/">Impact of Cache Locality</a></li><li><a title="Gen X Performance Tuning" rel="nofollow" href="https://blog.cloudflare.com/gen-x-performance-tuning/">Gen X Performance Tuning</a></li><li><a title="Securing Memory at EPYC Scale" rel="nofollow" href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/">Securing Memory at EPYC Scale</a></li><li><a title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow" href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a></li><li><a title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow" href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/">The Facts: Mozilla’s DNS over HTTPs (DoH)</a></li><li><a title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow" href="https://wiki.mozilla.org/Security/DOH-resolver-policy">Security/DOH-resolver-policy - MozillaWiki</a></li><li><a title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a></li><li><a title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow" href="https://letsencrypt.org/2020/02/27/one-billion-certs.html">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a></li><li><a title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow" href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/">Let’s Encrypt: A History - The Morning Paper</a></li><li><a title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow" href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a></li><li><a title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow" href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow" href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a></li><li><a title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow" href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features">Microsoft shares a roadmap for the new Microsoft Edge</a></li><li><a title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow" href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808">Microsoft Edge: Top Feedback Summary for March 4</a></li><li><a title="Download Microsoft Edge Insider Channels" rel="nofollow" href="https://www.microsoftedgeinsider.com/en-us/download/">Download Microsoft Edge Insider Channels</a></li><li><a title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a></li><li><a title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow" href="https://www.eset.com/int/kr00k/">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a></li><li><a title="Kr00k Paper" rel="nofollow" href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf">Kr00k Paper</a></li><li><a title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow" href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a></li><li><a title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow" href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a></li><li><a title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow" href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/">Cloudflare’s Gen X: Servers for an Accelerated Future</a></li><li><a title="Impact of Cache Locality" rel="nofollow" href="https://blog.cloudflare.com/impact-of-cache-locality/">Impact of Cache Locality</a></li><li><a title="Gen X Performance Tuning" rel="nofollow" href="https://blog.cloudflare.com/gen-x-performance-tuning/">Gen X Performance Tuning</a></li><li><a title="Securing Memory at EPYC Scale" rel="nofollow" href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/">Securing Memory at EPYC Scale</a></li><li><a title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>422: Multipath Musings</title>
  <link>https://techsnap.systems/422</link>
  <guid isPermaLink="false">7c9cef4d-3995-411c-9613-8e74e8156f5a</guid>
  <pubDate>Fri, 07 Feb 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7c9cef4d-3995-411c-9613-8e74e8156f5a.mp3" length="17013783" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.</itunes:subtitle>
  <itunes:duration>23:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. 
Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled history with certificate renewal. 
</description>
  <itunes:keywords>Automation, Let's Encrypt, SSL, TLS, CacheOut, Microsoft, Teams, Nagios, Monitoring, Linux, WireGuard, VPN, Edge, Edgium, browser wars, Chrome, blink, Chromium, Firefox, open standards, world wide web, Linux 5.6, Ubuntu 20.04, poly1305, Jason Donenfeld, networking, crypto, cryptography, mptcp, Multipath TCP, iOS, Apple, mobile, LTE, 5G, failover, 3GPP, Intel, speculative execution, ZombieLoad, TSX, SGX, cloud, virtualization, buffer overflow, stack smashing, stack canary, ASLR, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>411: Mobile Security Mistakes</title>
  <link>https://techsnap.systems/411</link>
  <guid isPermaLink="false">b9fd8f0e-82a3-44bb-b373-eea0ac62412d</guid>
  <pubDate>Fri, 06 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/b9fd8f0e-82a3-44bb-b373-eea0ac62412d.mp3" length="21338406" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</itunes:subtitle>
  <itunes:duration>29:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs. 
</description>
  <itunes:keywords>iOS, iPhone, mobile, mobile apps, app security, Apple, jailbreak, security, mobile security, exploit chain, zeroday, project zero, google, libxpc, IPC, webkit, malware, android, v4l2, video4linux, privilege escalation, AMD, Epyc, NUMA, benchmarks, exploit market, Zerodium, cpu load balancing, linux, open source, USB, USB4, USB-C, Thunderbolt, USB Power Delivery, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>409: Privacy Perspectives</title>
  <link>https://techsnap.systems/409</link>
  <guid isPermaLink="false">fb83ed86-b76d-4837-ac24-17ceb1f787aa</guid>
  <pubDate>Fri, 09 Aug 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fb83ed86-b76d-4837-ac24-17ceb1f787aa.mp3" length="28249466" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</itunes:subtitle>
  <itunes:duration>39:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.
Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp. 
</description>
  <itunes:keywords>Privacy, privacy badger, ghostery, incognito, private browsing, canvas, webgl, VPN, wireguard, openvpn, browser fingerprinting, panopticlick, amiunique, apple, bluetooth, bluetooth le, bleee, mozilla, firefox, chrome, google, ad-blocking, advertising, adblock plus, ublock, ublock origin, facebook, WhatsApp, encryption, encryption debate, iphone, iOS, security, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 383: The Power of Shame</title>
  <link>https://techsnap.systems/383</link>
  <guid isPermaLink="false">8012b7a1-2660-4bbc-8dda-a09c631b57ab</guid>
  <pubDate>Thu, 13 Sep 2018 21:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/8012b7a1-2660-4bbc-8dda-a09c631b57ab.mp3" length="43811399" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.</itunes:subtitle>
  <itunes:duration>51:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.
Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.
 Special Guest: Allan Jude.
</description>
  <itunes:keywords>Mozilla, GitHub, Javascript, Supply Chain, British Airways, Equifax, SSH, SSH Forwarding, Security Shaming, Project Verify, 2FA, Apple, CSV, SQL, Sysadmin, Devops, Podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.</p>

<p>Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.</p><p>Special Guest: Allan Jude.</p><p>Links:</p><ul><li><a title="Protecting Mozilla’s GitHub Repositories from Malicious Modification" rel="nofollow" href="https://blog.mozilla.org/security/2018/09/11/protecting-mozillas-github-repositories-from-malicious-modification/">Protecting Mozilla’s GitHub Repositories from Malicious Modification</a></li><li><a title="British Airways: Suspect code that hacked fliers &#39;found&#39;" rel="nofollow" href="https://www.bbc.co.uk/news/technology-45481976">British Airways: Suspect code that hacked fliers 'found'</a></li><li><a title="A year later, Equifax lost your data but faced little fallout" rel="nofollow" href="https://techcrunch.com/2018/09/08/equifax-one-year-later-unscathed/">A year later, Equifax lost your data but faced little fallout</a></li><li><a title="Security Implications of SSH Forwarding" rel="nofollow" href="https://slexy.org/view/s24sQBImsz">Security Implications of SSH Forwarding</a></li><li><a title="sshd_config manual" rel="nofollow" href="https://man.openbsd.org/sshd_config.5#GatewayPorts">sshd_config manual</a></li><li><a title="SSH Chaining (for jumphosts)" rel="nofollow" href="http://www.bsdnow.tv/tutorials/ssh-chaining">SSH Chaining (for jumphosts)</a></li><li><a title="Troy Hunt posts a blog where he argues in favour of publicly shaming companies for bad security" rel="nofollow" href="https://www.troyhunt.com/the-effectiveness-of-publicly-shaming-bad-security/">Troy Hunt posts a blog where he argues in favour of publicly shaming companies for bad security</a></li><li><a title="Your phone is NOT your password" rel="nofollow" href="https://krebsonsecurity.com/2018/09/u-s-mobile-giants-want-to-be-your-online-identity/">Your phone is NOT your password</a></li><li><a title="Select Star SQL: an interactive book which aims to be the best place to learn SQL" rel="nofollow" href="https://selectstarsql.com/">Select Star SQL: an interactive book which aims to be the best place to learn SQL</a></li><li><a title="Source Of Evil – A Botnet Code Collection" rel="nofollow" href="https://hackaday.com/2018/09/09/source-of-evil-a-botnet-code-collection/">Source Of Evil – A Botnet Code Collection</a></li><li><a title="xsv: A fast CSV command line toolkit written in Rust" rel="nofollow" href="https://github.com/BurntSushi/xsv">xsv: A fast CSV command line toolkit written in Rust</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.</p>

<p>Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.</p><p>Special Guest: Allan Jude.</p><p>Links:</p><ul><li><a title="Protecting Mozilla’s GitHub Repositories from Malicious Modification" rel="nofollow" href="https://blog.mozilla.org/security/2018/09/11/protecting-mozillas-github-repositories-from-malicious-modification/">Protecting Mozilla’s GitHub Repositories from Malicious Modification</a></li><li><a title="British Airways: Suspect code that hacked fliers &#39;found&#39;" rel="nofollow" href="https://www.bbc.co.uk/news/technology-45481976">British Airways: Suspect code that hacked fliers 'found'</a></li><li><a title="A year later, Equifax lost your data but faced little fallout" rel="nofollow" href="https://techcrunch.com/2018/09/08/equifax-one-year-later-unscathed/">A year later, Equifax lost your data but faced little fallout</a></li><li><a title="Security Implications of SSH Forwarding" rel="nofollow" href="https://slexy.org/view/s24sQBImsz">Security Implications of SSH Forwarding</a></li><li><a title="sshd_config manual" rel="nofollow" href="https://man.openbsd.org/sshd_config.5#GatewayPorts">sshd_config manual</a></li><li><a title="SSH Chaining (for jumphosts)" rel="nofollow" href="http://www.bsdnow.tv/tutorials/ssh-chaining">SSH Chaining (for jumphosts)</a></li><li><a title="Troy Hunt posts a blog where he argues in favour of publicly shaming companies for bad security" rel="nofollow" href="https://www.troyhunt.com/the-effectiveness-of-publicly-shaming-bad-security/">Troy Hunt posts a blog where he argues in favour of publicly shaming companies for bad security</a></li><li><a title="Your phone is NOT your password" rel="nofollow" href="https://krebsonsecurity.com/2018/09/u-s-mobile-giants-want-to-be-your-online-identity/">Your phone is NOT your password</a></li><li><a title="Select Star SQL: an interactive book which aims to be the best place to learn SQL" rel="nofollow" href="https://selectstarsql.com/">Select Star SQL: an interactive book which aims to be the best place to learn SQL</a></li><li><a title="Source Of Evil – A Botnet Code Collection" rel="nofollow" href="https://hackaday.com/2018/09/09/source-of-evil-a-botnet-code-collection/">Source Of Evil – A Botnet Code Collection</a></li><li><a title="xsv: A fast CSV command line toolkit written in Rust" rel="nofollow" href="https://github.com/BurntSushi/xsv">xsv: A fast CSV command line toolkit written in Rust</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 376: Google Don’t Front</title>
  <link>https://techsnap.systems/376</link>
  <guid isPermaLink="false">64ab2677-e4ea-4677-99ee-e849027b0532</guid>
  <pubDate>Thu, 26 Jul 2018 15:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/64ab2677-e4ea-4677-99ee-e849027b0532.mp3" length="30037985" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.</itunes:subtitle>
  <itunes:duration>35:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Google and Amazon recently shutdown Domain Fronting. Their abrupt change has created a building backlash. 
We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.
Plus how road navigation systems can be spoofed with $223  in hardware, and another bad Bluetooth bug. 
</description>
  <itunes:keywords>Domain Fronting, Bluetooth Bug, Diffie-Hellman key exchanges,  Apple, Broadcom, Intel, Qualcomm, Duplicati, off-site backups, HTTPS, HTTPS encrypted tunnel,  Cloudfront</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Google and Amazon recently shutdown Domain Fronting. Their abrupt change has created a building backlash. </p>

<p>We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.</p>

<p>Plus how road navigation systems can be spoofed with $223  in hardware, and another bad Bluetooth bug.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Road navigation systems can be spoofed using $223 equipment" rel="nofollow" href="https://www.hackread.com/road-navigation-systems-can-be-spoofed-using-223-equipment/?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_86">Road navigation systems can be spoofed using $223 equipment</a></li><li><a title="The World Economy Runs on GPS. It Needs a Backup Plan" rel="nofollow" href="https://www.bloomberg.com/news/features/2018-07-25/the-world-economy-runs-on-gps-it-needs-a-backup-plan">The World Economy Runs on GPS. It Needs a Backup Plan</a></li><li><a title="Big bad Bluetooth blunder bug battered – check for security fixes" rel="nofollow" href="https://www.theregister.co.uk/2018/07/24/bluetooth_cryptography_bug/">Big bad Bluetooth blunder bug battered – check for security fixes</a></li><li><a title="Vulnerability Note VU#304725 - Bluetooth Diffie-Hellman key exchange" rel="nofollow" href="https://www.kb.cert.org/vuls/id/304725">Vulnerability Note VU#304725 - Bluetooth Diffie-Hellman key exchange</a></li><li><a title="Domain Fronting " rel="nofollow" href="https://www.hackerfactor.com/blog/index.php?/archives/803-Domain-Fronting.html">Domain Fronting </a></li><li><a title="Domain Fronting Is Critical to the Open Web" rel="nofollow" href="https://blog.torproject.org/domain-fronting-critical-open-web">Domain Fronting Is Critical to the Open Web</a></li><li><a title="Russia Blocks Millions of Amazon and Google IPs in Bungled Attempt to Ban Telegram" rel="nofollow" href="https://gizmodo.com/russia-blocks-millions-of-amazon-and-google-ips-in-bung-1825319498">Russia Blocks Millions of Amazon and Google IPs in Bungled Attempt to Ban Telegram</a></li><li><a title="Blocking-resistant communication through domain fronting" rel="nofollow" href="https://www.bamsoftware.com/papers/fronting/">Blocking-resistant communication through domain fronting</a></li><li><a title="Duplicati gets some love" rel="nofollow" href="https://pastebin.com/q3ub689P">Duplicati gets some love</a></li><li><a title="Duplicati" rel="nofollow" href="https://www.duplicati.com/">Duplicati</a></li><li><a title="Duplicati - Docker Hub" rel="nofollow" href="https://hub.docker.com/r/linuxserver/duplicati/">Duplicati - Docker Hub</a></li><li><a title="Installing Duplicati on Ubunutu Linux" rel="nofollow" href="https://forum.duplicati.com/t/installing-duplicati-on-ubunutu-linux/743">Installing Duplicati on Ubunutu Linux</a></li><li><a title="Ben&#39;s Backup Basics" rel="nofollow" href="https://pastebin.com/mb0WpyuQ">Ben's Backup Basics</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Google and Amazon recently shutdown Domain Fronting. Their abrupt change has created a building backlash. </p>

<p>We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.</p>

<p>Plus how road navigation systems can be spoofed with $223  in hardware, and another bad Bluetooth bug.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Road navigation systems can be spoofed using $223 equipment" rel="nofollow" href="https://www.hackread.com/road-navigation-systems-can-be-spoofed-using-223-equipment/?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_86">Road navigation systems can be spoofed using $223 equipment</a></li><li><a title="The World Economy Runs on GPS. It Needs a Backup Plan" rel="nofollow" href="https://www.bloomberg.com/news/features/2018-07-25/the-world-economy-runs-on-gps-it-needs-a-backup-plan">The World Economy Runs on GPS. It Needs a Backup Plan</a></li><li><a title="Big bad Bluetooth blunder bug battered – check for security fixes" rel="nofollow" href="https://www.theregister.co.uk/2018/07/24/bluetooth_cryptography_bug/">Big bad Bluetooth blunder bug battered – check for security fixes</a></li><li><a title="Vulnerability Note VU#304725 - Bluetooth Diffie-Hellman key exchange" rel="nofollow" href="https://www.kb.cert.org/vuls/id/304725">Vulnerability Note VU#304725 - Bluetooth Diffie-Hellman key exchange</a></li><li><a title="Domain Fronting " rel="nofollow" href="https://www.hackerfactor.com/blog/index.php?/archives/803-Domain-Fronting.html">Domain Fronting </a></li><li><a title="Domain Fronting Is Critical to the Open Web" rel="nofollow" href="https://blog.torproject.org/domain-fronting-critical-open-web">Domain Fronting Is Critical to the Open Web</a></li><li><a title="Russia Blocks Millions of Amazon and Google IPs in Bungled Attempt to Ban Telegram" rel="nofollow" href="https://gizmodo.com/russia-blocks-millions-of-amazon-and-google-ips-in-bung-1825319498">Russia Blocks Millions of Amazon and Google IPs in Bungled Attempt to Ban Telegram</a></li><li><a title="Blocking-resistant communication through domain fronting" rel="nofollow" href="https://www.bamsoftware.com/papers/fronting/">Blocking-resistant communication through domain fronting</a></li><li><a title="Duplicati gets some love" rel="nofollow" href="https://pastebin.com/q3ub689P">Duplicati gets some love</a></li><li><a title="Duplicati" rel="nofollow" href="https://www.duplicati.com/">Duplicati</a></li><li><a title="Duplicati - Docker Hub" rel="nofollow" href="https://hub.docker.com/r/linuxserver/duplicati/">Duplicati - Docker Hub</a></li><li><a title="Installing Duplicati on Ubunutu Linux" rel="nofollow" href="https://forum.duplicati.com/t/installing-duplicati-on-ubunutu-linux/743">Installing Duplicati on Ubunutu Linux</a></li><li><a title="Ben&#39;s Backup Basics" rel="nofollow" href="https://pastebin.com/mb0WpyuQ">Ben's Backup Basics</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 358: A Future Without Servers</title>
  <link>https://techsnap.systems/358</link>
  <guid isPermaLink="false">dd10266c-5d78-43c7-bf71-1d3abb89a7a5</guid>
  <pubDate>Thu, 01 Mar 2018 08:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/dd10266c-5d78-43c7-bf71-1d3abb89a7a5.mp3" length="26781664" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </itunes:subtitle>
  <itunes:duration>36:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. 
Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more! 
</description>
  <content:encoded>
    <![CDATA[<p>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </p>

<p>Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Revamp of &#39;Pwned Passwords&#39; Boosts Privacy and Size of Database" rel="nofollow" href="https://threatpost.com/revamp-of-pwned-passwords-boosts-privacy-and-size-of-database/130082/">Revamp of 'Pwned Passwords' Boosts Privacy and Size of Database</a> &mdash; In V2 of Pwned Passwords, launched last week, Hunt updated his password data set from 320 million passwords to 501 million new passwords, pulled from almost 3,000 breaches over the past year.</li><li><a title="Finding Pwned Passwords with 1Password" rel="nofollow" href="https://blog.agilebits.com/2018/02/22/finding-pwned-passwords-with-1password/">Finding Pwned Passwords with 1Password</a> &mdash; Troy Hunt and his friends from Cloudflare found a brilliant way to check if my password is leaked without ever needing to send my password to their service. Their server never receives enough information to reconstruct my password.</li><li><a title="Troy Hunt: I&#39;ve Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned" rel="nofollow" href="https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/">Troy Hunt: I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned</a></li><li><a title="Apple’s China data migration includes iCloud keys, making data requests easier for authorities" rel="nofollow" href="https://9to5mac.com/2018/02/24/icloud-data-keys-migration/">Apple’s China data migration includes iCloud keys, making data requests easier for authorities</a> &mdash; Now, according to Apple, for the first time the company will store the keys for Chinese iCloud accounts in China itself. That means Chinese authorities will no longer have to use the U.S. courts to seek information on iCloud users and can instead use their own legal system to ask Apple to hand over iCloud data for Chinese users, legal experts said.</li><li><a title="Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow" rel="nofollow" href="https://gizmodo.com/microsoft-s-big-email-privacy-case-heads-to-the-supreme-1823328595">Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow</a> &mdash; The 2013 warrant involved a drug case, and the Justice Department asked Microsoft to turn over emails that were stored in its Ireland data center. Microsoft objected, arguing that the DoJ could not use a domestic warrant to conduct an international search and that it should instead acquire the data through a treaty process with the Irish government.</li><li><a title="Researchers Propose Improved Private Web Browsing System" rel="nofollow" href="https://www.securityweek.com/researchers-propose-improved-private-web-browsing-system">Researchers Propose Improved Private Web Browsing System</a> &mdash; The newly proposed system keeps all the data that the browse loads into memory encrypted until it is displayed on the screen, the researchers say. Users no longer type a URL into the browser, but access the Veil website and enter the URL there. With the help of a blinding server, the Veil format of the requested page is transmitted. </li><li><a title="Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/nearly-8-000-security-flaws-did-not-receive-a-cve-id-in-2017/">Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017</a> &mdash; A record-breaking number of 20,832 vulnerabilities have been discovered in 2017 but only 12,932 of these received an official CVE identifier last year, a Risk Based Security (RBS) report reveals.</li><li><a title="What is Serverless Architecture? What are its criticisms and drawbacks?" rel="nofollow" href="https://medium.com/@MarutiTech/what-is-serverless-architecture-what-are-its-criticisms-and-drawbacks-928659f9899a">What is Serverless Architecture? What are its criticisms and drawbacks?</a> &mdash; Serverless architectures refer to applications that significantly depend on third-party services (knows as Backend as a Service or “BaaS”) or on custom code that’s run in ephemeral containers (Function as a Service or “FaaS”), the best known vendor host of which currently is AWS Lambda.</li><li><a title="Serverless Security: What&#39;s Left to Protect?" rel="nofollow" href="https://www.infoq.com/articles/serverless-security">Serverless Security: What's Left to Protect?</a></li><li><a title="OpenFaaS - Serverless Functions Made Simple" rel="nofollow" href="https://www.openfaas.com/">OpenFaaS - Serverless Functions Made Simple</a> &mdash; Serverless Functions Made Simple for Docker and Kubernetes</li><li><a title="open-lambda: An open source serverless computing platform" rel="nofollow" href="https://github.com/open-lambda/open-lambda">open-lambda: An open source serverless computing platform</a> &mdash; An open source serverless computing platform</li><li><a title="Iron.io - DevOps Solutions from Startups to Enterprise" rel="nofollow" href="https://www.iron.io/">Iron.io - DevOps Solutions from Startups to Enterprise</a></li><li><a title="Apache OpenWhisk is a serverless, open source cloud platform" rel="nofollow" href="https://openwhisk.apache.org/">Apache OpenWhisk is a serverless, open source cloud platform</a></li><li><a title="Feedback: David&#39;s Drive Tips" rel="nofollow" href="https://pastebin.com/iSZgfPuc">Feedback: David's Drive Tips</a></li><li><a title="Question: Alex has BIG cloud storage requirements...." rel="nofollow" href="https://pastebin.com/mY78CNxK">Question: Alex has BIG cloud storage requirements....</a></li><li><a title="Crostini - Linux App Containers on ChromeOS " rel="nofollow" href="https://liliputing.com/2018/02/chromebooks-may-get-native-support-linux-apps-via-crostini.html">Crostini - Linux App Containers on ChromeOS </a> &mdash; In other words, the Crostini/Terminal feature could be to Chrome OS what the Windows Subsystem for Linux is for Windows 10: a way that developers, power users, and Linux enthusiasts can run native Linux software on a device that’s not running a traditional Linux distribution.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </p>

<p>Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Revamp of &#39;Pwned Passwords&#39; Boosts Privacy and Size of Database" rel="nofollow" href="https://threatpost.com/revamp-of-pwned-passwords-boosts-privacy-and-size-of-database/130082/">Revamp of 'Pwned Passwords' Boosts Privacy and Size of Database</a> &mdash; In V2 of Pwned Passwords, launched last week, Hunt updated his password data set from 320 million passwords to 501 million new passwords, pulled from almost 3,000 breaches over the past year.</li><li><a title="Finding Pwned Passwords with 1Password" rel="nofollow" href="https://blog.agilebits.com/2018/02/22/finding-pwned-passwords-with-1password/">Finding Pwned Passwords with 1Password</a> &mdash; Troy Hunt and his friends from Cloudflare found a brilliant way to check if my password is leaked without ever needing to send my password to their service. Their server never receives enough information to reconstruct my password.</li><li><a title="Troy Hunt: I&#39;ve Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned" rel="nofollow" href="https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/">Troy Hunt: I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned</a></li><li><a title="Apple’s China data migration includes iCloud keys, making data requests easier for authorities" rel="nofollow" href="https://9to5mac.com/2018/02/24/icloud-data-keys-migration/">Apple’s China data migration includes iCloud keys, making data requests easier for authorities</a> &mdash; Now, according to Apple, for the first time the company will store the keys for Chinese iCloud accounts in China itself. That means Chinese authorities will no longer have to use the U.S. courts to seek information on iCloud users and can instead use their own legal system to ask Apple to hand over iCloud data for Chinese users, legal experts said.</li><li><a title="Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow" rel="nofollow" href="https://gizmodo.com/microsoft-s-big-email-privacy-case-heads-to-the-supreme-1823328595">Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow</a> &mdash; The 2013 warrant involved a drug case, and the Justice Department asked Microsoft to turn over emails that were stored in its Ireland data center. Microsoft objected, arguing that the DoJ could not use a domestic warrant to conduct an international search and that it should instead acquire the data through a treaty process with the Irish government.</li><li><a title="Researchers Propose Improved Private Web Browsing System" rel="nofollow" href="https://www.securityweek.com/researchers-propose-improved-private-web-browsing-system">Researchers Propose Improved Private Web Browsing System</a> &mdash; The newly proposed system keeps all the data that the browse loads into memory encrypted until it is displayed on the screen, the researchers say. Users no longer type a URL into the browser, but access the Veil website and enter the URL there. With the help of a blinding server, the Veil format of the requested page is transmitted. </li><li><a title="Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/nearly-8-000-security-flaws-did-not-receive-a-cve-id-in-2017/">Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017</a> &mdash; A record-breaking number of 20,832 vulnerabilities have been discovered in 2017 but only 12,932 of these received an official CVE identifier last year, a Risk Based Security (RBS) report reveals.</li><li><a title="What is Serverless Architecture? What are its criticisms and drawbacks?" rel="nofollow" href="https://medium.com/@MarutiTech/what-is-serverless-architecture-what-are-its-criticisms-and-drawbacks-928659f9899a">What is Serverless Architecture? What are its criticisms and drawbacks?</a> &mdash; Serverless architectures refer to applications that significantly depend on third-party services (knows as Backend as a Service or “BaaS”) or on custom code that’s run in ephemeral containers (Function as a Service or “FaaS”), the best known vendor host of which currently is AWS Lambda.</li><li><a title="Serverless Security: What&#39;s Left to Protect?" rel="nofollow" href="https://www.infoq.com/articles/serverless-security">Serverless Security: What's Left to Protect?</a></li><li><a title="OpenFaaS - Serverless Functions Made Simple" rel="nofollow" href="https://www.openfaas.com/">OpenFaaS - Serverless Functions Made Simple</a> &mdash; Serverless Functions Made Simple for Docker and Kubernetes</li><li><a title="open-lambda: An open source serverless computing platform" rel="nofollow" href="https://github.com/open-lambda/open-lambda">open-lambda: An open source serverless computing platform</a> &mdash; An open source serverless computing platform</li><li><a title="Iron.io - DevOps Solutions from Startups to Enterprise" rel="nofollow" href="https://www.iron.io/">Iron.io - DevOps Solutions from Startups to Enterprise</a></li><li><a title="Apache OpenWhisk is a serverless, open source cloud platform" rel="nofollow" href="https://openwhisk.apache.org/">Apache OpenWhisk is a serverless, open source cloud platform</a></li><li><a title="Feedback: David&#39;s Drive Tips" rel="nofollow" href="https://pastebin.com/iSZgfPuc">Feedback: David's Drive Tips</a></li><li><a title="Question: Alex has BIG cloud storage requirements...." rel="nofollow" href="https://pastebin.com/mY78CNxK">Question: Alex has BIG cloud storage requirements....</a></li><li><a title="Crostini - Linux App Containers on ChromeOS " rel="nofollow" href="https://liliputing.com/2018/02/chromebooks-may-get-native-support-linux-apps-via-crostini.html">Crostini - Linux App Containers on ChromeOS </a> &mdash; In other words, the Crostini/Terminal feature could be to Chrome OS what the Windows Subsystem for Linux is for Windows 10: a way that developers, power users, and Linux enthusiasts can run native Linux software on a device that’s not running a traditional Linux distribution.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
