<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 15 Apr 2026 19:06:57 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Docker”</title>
    <link>https://techsnap.systems/tags/docker</link>
    <pubDate>Thu, 29 Nov 2018 14:00:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 391: Firecracker Fundamentals</title>
  <link>https://techsnap.systems/391</link>
  <guid isPermaLink="false">85bdbb45-28a2-4d50-bed1-ade6768e3fa3</guid>
  <pubDate>Thu, 29 Nov 2018 14:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/85bdbb45-28a2-4d50-bed1-ade6768e3fa3.mp3" length="18175107" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different than the options on the market now.</itunes:subtitle>
  <itunes:duration>21:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.
Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.
</description>
  <itunes:keywords>Firecracker, AWS, Amazon, Serverless, Lambda, Fargate, QEMU, KVM, Virtualization, Virtual Machines, VENOM, Rust,  BGP, OpenBSD, RPKI, MITM, dive, Docker, evilginx2, proxy, Sennheiser, TLS, SSL, OpenBGPD, RIPE, LSI, RAID, Allan Jude, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 384: Interplanetary Peers</title>
  <link>https://techsnap.systems/384</link>
  <guid isPermaLink="false">be1b2668-8b45-4297-8043-0f6108bcfe71</guid>
  <pubDate>Fri, 21 Sep 2018 00:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/be1b2668-8b45-4297-8043-0f6108bcfe71.mp3" length="31575819" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.</itunes:subtitle>
  <itunes:duration>37:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.
Plus, Magecart strikes again, Alpine has package problems, and why you shouldn't trust Western Digital's MyCloud.  Special Guest: Jon Spriggs.
</description>
  <itunes:keywords>GovPayNow, Government Payment Service, Data Breach, Magecart, Payment Systems, Javascript, Newegg, WD My Cloud, Western Digital, IPFS, Interplanetary Filesystem, IPNS, DNSLink, Content-addressable storage, Decentralization, Decentralized Storage, Filesystems, Peer-to-Peer, Cloudflare, OrbitDB, Filecoin, Alpine Linux, Docker, DevOps, Sysadmin, Podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jon the Nice Guy joins Wes to discuss all things IPFS. We&#39;ll explore what it does, how it works, and why it might be the best hope for a decentralized internet.</p>

<p>Plus, Magecart strikes again, Alpine has package problems, and why you shouldn&#39;t trust Western Digital&#39;s MyCloud. </p><p>Special Guest: Jon Spriggs.</p><p>Links:</p><ul><li><a title="GovPayNow.com Leaks 14M+ Records" rel="nofollow" href="https://krebsonsecurity.com/2018/09/govpaynow-com-leaks-14m-records/">GovPayNow.com Leaks 14M+ Records</a> &mdash; Government Payment Service Inc. has leaked more than 14 million customer records dating back at least six years, including names, addresses, phone numbers and the last four digits of the payer’s credit card.</li><li><a title="Magecart claims another victim in Newegg merchant data theft" rel="nofollow" href="https://www.zdnet.com/article/magecart-claims-another-victim-in-newegg-merchant-data-theft/">Magecart claims another victim in Newegg merchant data theft</a> &mdash; Researchers from RiskIQ, together with Volexity, revealed that California-based retailer Newegg is the latest well-known merchant to succumb to the threat actors.</li><li><a title="RiskIQ: Another Victim of the Magecart Assault Emerges" rel="nofollow" href="https://www.riskiq.com/blog/labs/magecart-newegg/">RiskIQ: Another Victim of the Magecart Assault Emerges</a></li><li><a title="Password bypass flaw in Western Digital My Cloud drives puts data at risk" rel="nofollow" href="https://techcrunch.com/2018/09/19/password-bypass-flaw-western-digital-my-cloud-drives/">Password bypass flaw in Western Digital My Cloud drives puts data at risk</a> &mdash; A security researcher has published details of a vulnerability in Western Digital’s My Cloud devices, which could allow an attacker to bypass the admin password on the drive, gaining complete control over the user’s data.</li><li><a title="WD MyCloud Metasploit Example" rel="nofollow" href="https://pastecry.pt/dUHB3e#PewMuk%3AUt2Ek3Bee4Rej2Syz5Mek">WD MyCloud Metasploit Example</a></li><li><a title="Cloudflare goes InterPlanetary" rel="nofollow" href="https://blog.cloudflare.com/distributed-web-gateway/">Cloudflare goes InterPlanetary</a> &mdash; Today we’re excited to introduce Cloudflare’s IPFS Gateway, an easy way to access content from the InterPlanetary File System (IPFS) that doesn’t require installing and running any special software on your computer.</li><li><a title="End-to-End Integrity with IPFS" rel="nofollow" href="https://blog.cloudflare.com/e2e-integrity/">End-to-End Integrity with IPFS</a> &mdash; This post describes how to use Cloudflare's IPFS gateway to set up a website which is end-to-end secure, while maintaining the performance and reliability benefits of being served from Cloudflare’s edge network.</li><li><a title="How permanent is data stored on IPFS?" rel="nofollow" href="https://github.com/ipfs/faq/issues/93">How permanent is data stored on IPFS?</a></li><li><a title="Lesson: Add Content to IPFS and Retrieve It · Decentralized Web Primer" rel="nofollow" href="https://flyingzumwalt.gitbooks.io/decentralized-web-primer/content/files-on-ipfs/lessons/add-and-retrieve-file-content.html">Lesson: Add Content to IPFS and Retrieve It · Decentralized Web Primer</a></li><li><a title="Leo Tindall: Putting This Blog on IPFS" rel="nofollow" href="https://ipfs.io/ipns/Qme48wyZ7LaF9gC5693DZyJBtehgaFhaKycESroemD5fNX/post/putting_this_blog_on_ipfs/">Leo Tindall: Putting This Blog on IPFS</a></li><li><a title="A Beginner’s Guide to IPFS" rel="nofollow" href="https://hackernoon.com/a-beginners-guide-to-ipfs-20673fedd3f">A Beginner’s Guide to IPFS</a> &mdash; IPFS consists of several innovations in communication protocols and distributed systems that have been combined to produce a file system like no other.</li><li><a title="Useful resources for using IPFS and building things on top of it" rel="nofollow" href="https://github.com/ipfs/awesome-ipfs">Useful resources for using IPFS and building things on top of it</a></li><li><a title="OrbitDB: Peer-to-Peer Databases for the Decentralized Web" rel="nofollow" href="https://github.com/orbitdb/orbit-db">OrbitDB: Peer-to-Peer Databases for the Decentralized Web</a></li><li><a title="Rebuild Alpine Linux Docker Containers After Package Manager Patch" rel="nofollow" href="https://www.itprotoday.com/linux/time-rebuild-alpine-linux-docker-containers-after-package-manager-patch">Rebuild Alpine Linux Docker Containers After Package Manager Patch</a> &mdash; An attacker could intercept a package request as a Alpine Linux Docker image is being built and add malicious code that target machines would then unpack and run within the Docker container</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jon the Nice Guy joins Wes to discuss all things IPFS. We&#39;ll explore what it does, how it works, and why it might be the best hope for a decentralized internet.</p>

<p>Plus, Magecart strikes again, Alpine has package problems, and why you shouldn&#39;t trust Western Digital&#39;s MyCloud. </p><p>Special Guest: Jon Spriggs.</p><p>Links:</p><ul><li><a title="GovPayNow.com Leaks 14M+ Records" rel="nofollow" href="https://krebsonsecurity.com/2018/09/govpaynow-com-leaks-14m-records/">GovPayNow.com Leaks 14M+ Records</a> &mdash; Government Payment Service Inc. has leaked more than 14 million customer records dating back at least six years, including names, addresses, phone numbers and the last four digits of the payer’s credit card.</li><li><a title="Magecart claims another victim in Newegg merchant data theft" rel="nofollow" href="https://www.zdnet.com/article/magecart-claims-another-victim-in-newegg-merchant-data-theft/">Magecart claims another victim in Newegg merchant data theft</a> &mdash; Researchers from RiskIQ, together with Volexity, revealed that California-based retailer Newegg is the latest well-known merchant to succumb to the threat actors.</li><li><a title="RiskIQ: Another Victim of the Magecart Assault Emerges" rel="nofollow" href="https://www.riskiq.com/blog/labs/magecart-newegg/">RiskIQ: Another Victim of the Magecart Assault Emerges</a></li><li><a title="Password bypass flaw in Western Digital My Cloud drives puts data at risk" rel="nofollow" href="https://techcrunch.com/2018/09/19/password-bypass-flaw-western-digital-my-cloud-drives/">Password bypass flaw in Western Digital My Cloud drives puts data at risk</a> &mdash; A security researcher has published details of a vulnerability in Western Digital’s My Cloud devices, which could allow an attacker to bypass the admin password on the drive, gaining complete control over the user’s data.</li><li><a title="WD MyCloud Metasploit Example" rel="nofollow" href="https://pastecry.pt/dUHB3e#PewMuk%3AUt2Ek3Bee4Rej2Syz5Mek">WD MyCloud Metasploit Example</a></li><li><a title="Cloudflare goes InterPlanetary" rel="nofollow" href="https://blog.cloudflare.com/distributed-web-gateway/">Cloudflare goes InterPlanetary</a> &mdash; Today we’re excited to introduce Cloudflare’s IPFS Gateway, an easy way to access content from the InterPlanetary File System (IPFS) that doesn’t require installing and running any special software on your computer.</li><li><a title="End-to-End Integrity with IPFS" rel="nofollow" href="https://blog.cloudflare.com/e2e-integrity/">End-to-End Integrity with IPFS</a> &mdash; This post describes how to use Cloudflare's IPFS gateway to set up a website which is end-to-end secure, while maintaining the performance and reliability benefits of being served from Cloudflare’s edge network.</li><li><a title="How permanent is data stored on IPFS?" rel="nofollow" href="https://github.com/ipfs/faq/issues/93">How permanent is data stored on IPFS?</a></li><li><a title="Lesson: Add Content to IPFS and Retrieve It · Decentralized Web Primer" rel="nofollow" href="https://flyingzumwalt.gitbooks.io/decentralized-web-primer/content/files-on-ipfs/lessons/add-and-retrieve-file-content.html">Lesson: Add Content to IPFS and Retrieve It · Decentralized Web Primer</a></li><li><a title="Leo Tindall: Putting This Blog on IPFS" rel="nofollow" href="https://ipfs.io/ipns/Qme48wyZ7LaF9gC5693DZyJBtehgaFhaKycESroemD5fNX/post/putting_this_blog_on_ipfs/">Leo Tindall: Putting This Blog on IPFS</a></li><li><a title="A Beginner’s Guide to IPFS" rel="nofollow" href="https://hackernoon.com/a-beginners-guide-to-ipfs-20673fedd3f">A Beginner’s Guide to IPFS</a> &mdash; IPFS consists of several innovations in communication protocols and distributed systems that have been combined to produce a file system like no other.</li><li><a title="Useful resources for using IPFS and building things on top of it" rel="nofollow" href="https://github.com/ipfs/awesome-ipfs">Useful resources for using IPFS and building things on top of it</a></li><li><a title="OrbitDB: Peer-to-Peer Databases for the Decentralized Web" rel="nofollow" href="https://github.com/orbitdb/orbit-db">OrbitDB: Peer-to-Peer Databases for the Decentralized Web</a></li><li><a title="Rebuild Alpine Linux Docker Containers After Package Manager Patch" rel="nofollow" href="https://www.itprotoday.com/linux/time-rebuild-alpine-linux-docker-containers-after-package-manager-patch">Rebuild Alpine Linux Docker Containers After Package Manager Patch</a> &mdash; An attacker could intercept a package request as a Alpine Linux Docker image is being built and add malicious code that target machines would then unpack and run within the Docker container</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 370: Hidden in Plain Sight</title>
  <link>https://techsnap.systems/370</link>
  <guid isPermaLink="false">cbe34348-d2f2-41f1-8480-38bdbc5dd8ce</guid>
  <pubDate>Fri, 01 Jun 2018 08:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cbe34348-d2f2-41f1-8480-38bdbc5dd8ce.mp3" length="43765885" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</itunes:subtitle>
  <itunes:duration>51:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.
Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about. 
</description>
  <content:encoded>
    <![CDATA[<p>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</p>

<p>Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hiding Information in Plain Text - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/tech-talk/computing/software/hiding-information-in-plain-text">Hiding Information in Plain Text - IEEE Spectrum</a></li><li><a title="Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog" rel="nofollow" href="https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/">Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog</a></li><li><a title="When to use git subtree? - Stack Overflow" rel="nofollow" href="https://stackoverflow.com/questions/32407634/when-to-use-git-subtree">When to use git subtree? - Stack Overflow</a></li><li><a title="Ghostery Email Incident Update - Ghostery" rel="nofollow" href="https://www.ghostery.com/blog/ghostery-news/ghostery-email-incident-update/">Ghostery Email Incident Update - Ghostery</a></li><li><a title="Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/05/23/surprise-student-receives-36000-google-bug-bounty-for-rce-flaw/">Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security</a></li><li><a title="SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/nefarious-actors-may-have-abused-routing-protocol-to-spy-on-us-phone-users/">SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica</a></li><li><a title="SnoopSnitch - Apps on Google Play" rel="nofollow" href="https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&amp;hl=en_US">SnoopSnitch - Apps on Google Play</a></li><li><a title="Kubernetes Containerd Integration Goes GA - Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/05/24/kubernetes-containerd-integration-goes-ga/">Kubernetes Containerd Integration Goes GA - Kubernetes</a></li><li><a title="Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware/">Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica</a></li><li><a title="FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers/">FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica</a></li><li><a title="Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/singapore-isp-leaves-1000-routers-open-to-attack/132315/">Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news</a></li><li><a title="Don&#39;t let Frank near the server" rel="nofollow" href="https://pastebin.com/sM9QicJE">Don't let Frank near the server</a></li><li><a title="Dave decides to move some plugs... " rel="nofollow" href="https://pastebin.com/PCNtN439">Dave decides to move some plugs... </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</p>

<p>Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hiding Information in Plain Text - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/tech-talk/computing/software/hiding-information-in-plain-text">Hiding Information in Plain Text - IEEE Spectrum</a></li><li><a title="Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog" rel="nofollow" href="https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/">Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog</a></li><li><a title="When to use git subtree? - Stack Overflow" rel="nofollow" href="https://stackoverflow.com/questions/32407634/when-to-use-git-subtree">When to use git subtree? - Stack Overflow</a></li><li><a title="Ghostery Email Incident Update - Ghostery" rel="nofollow" href="https://www.ghostery.com/blog/ghostery-news/ghostery-email-incident-update/">Ghostery Email Incident Update - Ghostery</a></li><li><a title="Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/05/23/surprise-student-receives-36000-google-bug-bounty-for-rce-flaw/">Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security</a></li><li><a title="SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/nefarious-actors-may-have-abused-routing-protocol-to-spy-on-us-phone-users/">SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica</a></li><li><a title="SnoopSnitch - Apps on Google Play" rel="nofollow" href="https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&amp;hl=en_US">SnoopSnitch - Apps on Google Play</a></li><li><a title="Kubernetes Containerd Integration Goes GA - Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/05/24/kubernetes-containerd-integration-goes-ga/">Kubernetes Containerd Integration Goes GA - Kubernetes</a></li><li><a title="Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware/">Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica</a></li><li><a title="FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers/">FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica</a></li><li><a title="Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/singapore-isp-leaves-1000-routers-open-to-attack/132315/">Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news</a></li><li><a title="Don&#39;t let Frank near the server" rel="nofollow" href="https://pastebin.com/sM9QicJE">Don't let Frank near the server</a></li><li><a title="Dave decides to move some plugs... " rel="nofollow" href="https://pastebin.com/PCNtN439">Dave decides to move some plugs... </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 365: The Unfixable Exploit</title>
  <link>https://techsnap.systems/365</link>
  <guid isPermaLink="false">bebfb1b6-cfe5-4c97-855e-24922aeb957c</guid>
  <pubDate>Tue, 24 Apr 2018 17:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/bebfb1b6-cfe5-4c97-855e-24922aeb957c.mp3" length="33195967" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </itunes:subtitle>
  <itunes:duration>38:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.  
</description>
  <content:encoded>
    <![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/04/23/who_me/">Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register</a> &mdash; ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’</li><li><a title="Spoofing Cell Networks with a USB to VGA Adapter | Hackaday" rel="nofollow" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/">Spoofing Cell Networks with a USB to VGA Adapter | Hackaday</a> &mdash;  Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.</li><li><a title="ShofEL2, a Tegra X1 and Nintendo Switch exploit" rel="nofollow" href="https://fail0verflow.com/blog/2018/shofel2/">ShofEL2, a Tegra X1 and Nintendo Switch exploit</a> &mdash; The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.</li><li><a title="Atlanta spends more than $2 million to recover from ransomware attack" rel="nofollow" href="https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/">Atlanta spends more than $2 million to recover from ransomware attack</a> &mdash; . It appears that firms Secureworks and Ernst &amp; Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.</li><li><a title="Google Chrome 66 Released Today Focuses on Security" rel="nofollow" href="https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/">Google Chrome 66 Released Today Focuses on Security</a> &mdash; The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.</li><li><a title="Where to get started with monitoring?" rel="nofollow" href="https://pastebin.com/bPn1cGLV">Where to get started with monitoring?</a></li><li><a title="defunkt uses a fool tools for his network" rel="nofollow" href="https://pastebin.com/aFmwbguq">defunkt uses a fool tools for his network</a></li><li><a title="Brian shares some love for Zabbix" rel="nofollow" href="https://pastebin.com/z93N6GzR">Brian shares some love for Zabbix</a></li><li><a title="VMware Patches Pwn2Own VM Escape Vulnerabilities" rel="nofollow" href="https://threatpost.com/vmware-patches-pwn2own-vm-escape-vulnerabilities/124629/">VMware Patches Pwn2Own VM Escape Vulnerabilities</a> &mdash; VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.</li><li><a title="balena - A Moby-based container engine for IoT" rel="nofollow" href="https://www.balena.io/">balena - A Moby-based container engine for IoT</a> &mdash; A Moby-based container engine for IoT</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/04/23/who_me/">Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register</a> &mdash; ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’</li><li><a title="Spoofing Cell Networks with a USB to VGA Adapter | Hackaday" rel="nofollow" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/">Spoofing Cell Networks with a USB to VGA Adapter | Hackaday</a> &mdash;  Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.</li><li><a title="ShofEL2, a Tegra X1 and Nintendo Switch exploit" rel="nofollow" href="https://fail0verflow.com/blog/2018/shofel2/">ShofEL2, a Tegra X1 and Nintendo Switch exploit</a> &mdash; The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.</li><li><a title="Atlanta spends more than $2 million to recover from ransomware attack" rel="nofollow" href="https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/">Atlanta spends more than $2 million to recover from ransomware attack</a> &mdash; . It appears that firms Secureworks and Ernst &amp; Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.</li><li><a title="Google Chrome 66 Released Today Focuses on Security" rel="nofollow" href="https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/">Google Chrome 66 Released Today Focuses on Security</a> &mdash; The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.</li><li><a title="Where to get started with monitoring?" rel="nofollow" href="https://pastebin.com/bPn1cGLV">Where to get started with monitoring?</a></li><li><a title="defunkt uses a fool tools for his network" rel="nofollow" href="https://pastebin.com/aFmwbguq">defunkt uses a fool tools for his network</a></li><li><a title="Brian shares some love for Zabbix" rel="nofollow" href="https://pastebin.com/z93N6GzR">Brian shares some love for Zabbix</a></li><li><a title="VMware Patches Pwn2Own VM Escape Vulnerabilities" rel="nofollow" href="https://threatpost.com/vmware-patches-pwn2own-vm-escape-vulnerabilities/124629/">VMware Patches Pwn2Own VM Escape Vulnerabilities</a> &mdash; VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.</li><li><a title="balena - A Moby-based container engine for IoT" rel="nofollow" href="https://www.balena.io/">balena - A Moby-based container engine for IoT</a> &mdash; A Moby-based container engine for IoT</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 356: The Concern with Containers</title>
  <link>https://techsnap.systems/356</link>
  <guid isPermaLink="false">0d9f7516-90f2-4dd5-82e4-3bb92e6de943</guid>
  <pubDate>Thu, 15 Feb 2018 13:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/0d9f7516-90f2-4dd5-82e4-3bb92e6de943.mp3" length="27434183" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </itunes:subtitle>
  <itunes:duration>37:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. 
And the latest jaw-dropping techniques to extract data from air-gapped systems. 
</description>
  <content:encoded>
    <![CDATA[<p>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </p>

<p>And the latest jaw-dropping techniques to extract data from air-gapped systems.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Skype can&#39;t fix a nasty security bug without a massive code rewrite" rel="nofollow" href="http://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/">Skype can't fix a nasty security bug without a massive code rewrite</a> &mdash; The bug grants a low-level user access to every corner of the operating system.</li><li><a title="Zero-day vulnerability in Telegram" rel="nofollow" href="https://securelist.com/zero-day-vulnerability-in-telegram/83800/">Zero-day vulnerability in Telegram</a> &mdash; The special nonprinting right-to-left override (RLO) character is used to reverse the order of the characters that come after that character in the string. In the Unicode character table, it is represented as ‘U+202E’; one area of legitimate use is when typing Arabic text. In an attack, this character can be used to mislead the victim. It is usually used when displaying the name and extension of an executable file: a piece of software vulnerable to this sort of attack will display the filename incompletely or in reverse.</li><li><a title="Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability" rel="nofollow" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1?source=infected.io-telegram">Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability</a> &mdash; After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available. </li><li><a title="Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains" rel="nofollow" href="https://www.forbes.com/sites/ktorpey/2018/02/12/microsoft-to-embrace-decentralized-identity-systems-built-on-bitcoin-and-other-blockchains/#76af78a45ada">Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains</a> &mdash; In a new post today, Microsoft announced their embrace of public blockchains, such as Bitcoin and Ethereum, for use in decentralized identity systems.</li><li><a title="XRballer comments on The Stolen XRB has already been Redistributed/Sold Off" rel="nofollow" href="https://www.reddit.com/r/CryptoCurrency/comments/7wonkf/the_stolen_xrb_has_already_been_redistributedsold/du215tr/">XRballer comments on The Stolen XRB has already been Redistributed/Sold Off</a> &mdash; But this check was only on java-script client side, you find the js which is sending the request, then you inspect element - console, and run the java-script manually, to send a request for withdrawal of a higher amount than in your balance.</li><li><a title="Containers Will Not Fix Your Broken Culture" rel="nofollow" href="https://queue.acm.org/detail.cfm?id=3185224">Containers Will Not Fix Your Broken Culture</a> &mdash; Spoiler alert: the solutions to many difficulties that seem technical can be found by examining our interactions with others. Let's talk about five things you'll want to know when working with those pesky creatures known as humans.</li><li><a title="Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields" rel="nofollow" href="https://arxiv.org/abs/1802.02700">Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields</a> &mdash; In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. </li><li><a title="Feedback: BeyondCorp" rel="nofollow" href="http://pastedown.ctrl-c.us/#RP5t3LFg3gLPAoBi70ua6IyQJGo.markdown">Feedback: BeyondCorp</a></li><li><a title="Feedback: Mgmt" rel="nofollow" href="http://pastedown.ctrl-c.us/#2jhTp3-geBThElev10Bg9oFRHm4.markdown">Feedback: Mgmt</a></li><li><a title="Feedback: SuperMicro Mobo?" rel="nofollow" href="http://pastedown.ctrl-c.us/#U4lx-Ttdf1fcuRyMeWoF6JKsNVo.markdown">Feedback: SuperMicro Mobo?</a></li><li><a title="Super Micro Computer X8DTN+" rel="nofollow" href="https://www.supermicro.com/products/motherboard/QPI/5500/X8DTN_.cfm?IPMI=O">Super Micro Computer X8DTN+</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </p>

<p>And the latest jaw-dropping techniques to extract data from air-gapped systems.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Skype can&#39;t fix a nasty security bug without a massive code rewrite" rel="nofollow" href="http://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/">Skype can't fix a nasty security bug without a massive code rewrite</a> &mdash; The bug grants a low-level user access to every corner of the operating system.</li><li><a title="Zero-day vulnerability in Telegram" rel="nofollow" href="https://securelist.com/zero-day-vulnerability-in-telegram/83800/">Zero-day vulnerability in Telegram</a> &mdash; The special nonprinting right-to-left override (RLO) character is used to reverse the order of the characters that come after that character in the string. In the Unicode character table, it is represented as ‘U+202E’; one area of legitimate use is when typing Arabic text. In an attack, this character can be used to mislead the victim. It is usually used when displaying the name and extension of an executable file: a piece of software vulnerable to this sort of attack will display the filename incompletely or in reverse.</li><li><a title="Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability" rel="nofollow" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1?source=infected.io-telegram">Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability</a> &mdash; After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available. </li><li><a title="Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains" rel="nofollow" href="https://www.forbes.com/sites/ktorpey/2018/02/12/microsoft-to-embrace-decentralized-identity-systems-built-on-bitcoin-and-other-blockchains/#76af78a45ada">Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains</a> &mdash; In a new post today, Microsoft announced their embrace of public blockchains, such as Bitcoin and Ethereum, for use in decentralized identity systems.</li><li><a title="XRballer comments on The Stolen XRB has already been Redistributed/Sold Off" rel="nofollow" href="https://www.reddit.com/r/CryptoCurrency/comments/7wonkf/the_stolen_xrb_has_already_been_redistributedsold/du215tr/">XRballer comments on The Stolen XRB has already been Redistributed/Sold Off</a> &mdash; But this check was only on java-script client side, you find the js which is sending the request, then you inspect element - console, and run the java-script manually, to send a request for withdrawal of a higher amount than in your balance.</li><li><a title="Containers Will Not Fix Your Broken Culture" rel="nofollow" href="https://queue.acm.org/detail.cfm?id=3185224">Containers Will Not Fix Your Broken Culture</a> &mdash; Spoiler alert: the solutions to many difficulties that seem technical can be found by examining our interactions with others. Let's talk about five things you'll want to know when working with those pesky creatures known as humans.</li><li><a title="Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields" rel="nofollow" href="https://arxiv.org/abs/1802.02700">Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields</a> &mdash; In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. </li><li><a title="Feedback: BeyondCorp" rel="nofollow" href="http://pastedown.ctrl-c.us/#RP5t3LFg3gLPAoBi70ua6IyQJGo.markdown">Feedback: BeyondCorp</a></li><li><a title="Feedback: Mgmt" rel="nofollow" href="http://pastedown.ctrl-c.us/#2jhTp3-geBThElev10Bg9oFRHm4.markdown">Feedback: Mgmt</a></li><li><a title="Feedback: SuperMicro Mobo?" rel="nofollow" href="http://pastedown.ctrl-c.us/#U4lx-Ttdf1fcuRyMeWoF6JKsNVo.markdown">Feedback: SuperMicro Mobo?</a></li><li><a title="Super Micro Computer X8DTN+" rel="nofollow" href="https://www.supermicro.com/products/motherboard/QPI/5500/X8DTN_.cfm?IPMI=O">Super Micro Computer X8DTN+</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
