<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 21 Apr 2026 16:05:31 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Google”</title>
    <link>https://techsnap.systems/tags/google</link>
    <pubDate>Fri, 03 Apr 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>426: Storage Stories</title>
  <link>https://techsnap.systems/426</link>
  <guid isPermaLink="false">658dd254-b721-4281-8415-9357e180e92b</guid>
  <pubDate>Fri, 03 Apr 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/658dd254-b721-4281-8415-9357e180e92b.mp3" length="22528023" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.</itunes:subtitle>
  <itunes:duration>31:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  
Plus we celebrate WireGuard's inclusion in the Linux 5.6 kernel, and fight some exFAT FUD. 
</description>
  <itunes:keywords>WireGuard, Linux 5.6, kernel module, networking, encryption, security, Ubuntu, Debian, Windows, zonefs, Zoned Storage, SMR, Shingled Magnetic Recording, SSD, NVMe, firmware, block device, dm-zoned, filesystems, device mapper, Western Digital, ZFS, RAID, Seagate, Microsoft, Samsung, Google, Andoird, Paragon Software, exFAT, FUD, open source, free software, NTFS, NTFS-3G, SMB, Samba, Cloudfare, crypto, dm-crypt, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-56-features&amp;num=1">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a title="fs: New zonefs file system" rel="nofollow" href="https://lwn.net/Articles/793585/">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow" href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow" href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a title="Linux Kernel Support - ZonedStorage.io" rel="nofollow" href="https://www.zonedstorage.io/introduction/linux-support/">Linux Kernel Support - ZonedStorage.io</a></li><li><a title="dm-zoned" rel="nofollow" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a title="Device Mapper - ZonedStorage.io" rel="nofollow" href="https://zonedstorage.io/linux/dm/#dm-zoned">Device Mapper - ZonedStorage.io</a></li><li><a title=" What are PMR and SMR hard disk drives?" rel="nofollow" href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives"> What are PMR and SMR hard disk drives?</a></li><li><a title="Beware of SMR drives in PMR clothing" rel="nofollow" href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow" href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=New-exFAT-For-Linux-5.7">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow" href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow" href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-56-features&amp;num=1">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a title="fs: New zonefs file system" rel="nofollow" href="https://lwn.net/Articles/793585/">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow" href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow" href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a title="Linux Kernel Support - ZonedStorage.io" rel="nofollow" href="https://www.zonedstorage.io/introduction/linux-support/">Linux Kernel Support - ZonedStorage.io</a></li><li><a title="dm-zoned" rel="nofollow" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a title="Device Mapper - ZonedStorage.io" rel="nofollow" href="https://zonedstorage.io/linux/dm/#dm-zoned">Device Mapper - ZonedStorage.io</a></li><li><a title=" What are PMR and SMR hard disk drives?" rel="nofollow" href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives"> What are PMR and SMR hard disk drives?</a></li><li><a title="Beware of SMR drives in PMR clothing" rel="nofollow" href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow" href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=New-exFAT-For-Linux-5.7">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow" href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow" href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>424: AMD Inside</title>
  <link>https://techsnap.systems/424</link>
  <guid isPermaLink="false">770823cf-5179-4132-91fb-d67d5ddd5ff4</guid>
  <pubDate>Fri, 06 Mar 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/770823cf-5179-4132-91fb-d67d5ddd5ff4.mp3" length="20391102" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.</itunes:subtitle>
  <itunes:duration>28:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  
Plus Mozilla's rollout of DNS over HTTPS has begun, a big milestone for Let's Encrypt, and more. 
</description>
  <itunes:keywords>Performance per watt, power consumption, energy, CPU, AMD, Intel, EPYC, memory encryption, SGX, SME, TSME, TME, MKTME, security, encryption, Let's Encrypt, HTTPS, SSL, TLS, web security, DoH, DNS over HTTPS, DNS, Cloudflare, Mozilla, Firefox, kr00k, KRACK, WiFi, VPN, WPA2, ESET, wireless, Broadcom, Apple, iPhone, Microsoft Edge, Edge, Microsoft, Chrome, Google, Chromium, open source, NextDNS, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow" href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a></li><li><a title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow" href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/">The Facts: Mozilla’s DNS over HTTPs (DoH)</a></li><li><a title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow" href="https://wiki.mozilla.org/Security/DOH-resolver-policy">Security/DOH-resolver-policy - MozillaWiki</a></li><li><a title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a></li><li><a title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow" href="https://letsencrypt.org/2020/02/27/one-billion-certs.html">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a></li><li><a title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow" href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/">Let’s Encrypt: A History - The Morning Paper</a></li><li><a title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow" href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a></li><li><a title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow" href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow" href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a></li><li><a title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow" href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features">Microsoft shares a roadmap for the new Microsoft Edge</a></li><li><a title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow" href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808">Microsoft Edge: Top Feedback Summary for March 4</a></li><li><a title="Download Microsoft Edge Insider Channels" rel="nofollow" href="https://www.microsoftedgeinsider.com/en-us/download/">Download Microsoft Edge Insider Channels</a></li><li><a title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a></li><li><a title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow" href="https://www.eset.com/int/kr00k/">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a></li><li><a title="Kr00k Paper" rel="nofollow" href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf">Kr00k Paper</a></li><li><a title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow" href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a></li><li><a title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow" href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a></li><li><a title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow" href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/">Cloudflare’s Gen X: Servers for an Accelerated Future</a></li><li><a title="Impact of Cache Locality" rel="nofollow" href="https://blog.cloudflare.com/impact-of-cache-locality/">Impact of Cache Locality</a></li><li><a title="Gen X Performance Tuning" rel="nofollow" href="https://blog.cloudflare.com/gen-x-performance-tuning/">Gen X Performance Tuning</a></li><li><a title="Securing Memory at EPYC Scale" rel="nofollow" href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/">Securing Memory at EPYC Scale</a></li><li><a title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow" href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a></li><li><a title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow" href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/">The Facts: Mozilla’s DNS over HTTPs (DoH)</a></li><li><a title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow" href="https://wiki.mozilla.org/Security/DOH-resolver-policy">Security/DOH-resolver-policy - MozillaWiki</a></li><li><a title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a></li><li><a title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow" href="https://letsencrypt.org/2020/02/27/one-billion-certs.html">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a></li><li><a title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow" href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/">Let’s Encrypt: A History - The Morning Paper</a></li><li><a title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow" href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a></li><li><a title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow" href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow" href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a></li><li><a title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow" href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features">Microsoft shares a roadmap for the new Microsoft Edge</a></li><li><a title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow" href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808">Microsoft Edge: Top Feedback Summary for March 4</a></li><li><a title="Download Microsoft Edge Insider Channels" rel="nofollow" href="https://www.microsoftedgeinsider.com/en-us/download/">Download Microsoft Edge Insider Channels</a></li><li><a title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a></li><li><a title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow" href="https://www.eset.com/int/kr00k/">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a></li><li><a title="Kr00k Paper" rel="nofollow" href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf">Kr00k Paper</a></li><li><a title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow" href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a></li><li><a title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow" href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a></li><li><a title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow" href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/">Cloudflare’s Gen X: Servers for an Accelerated Future</a></li><li><a title="Impact of Cache Locality" rel="nofollow" href="https://blog.cloudflare.com/impact-of-cache-locality/">Impact of Cache Locality</a></li><li><a title="Gen X Performance Tuning" rel="nofollow" href="https://blog.cloudflare.com/gen-x-performance-tuning/">Gen X Performance Tuning</a></li><li><a title="Securing Memory at EPYC Scale" rel="nofollow" href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/">Securing Memory at EPYC Scale</a></li><li><a title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>417: Machine Learning Magic</title>
  <link>https://techsnap.systems/417</link>
  <guid isPermaLink="false">88c620a6-0b1c-4698-aac4-ac757b632286</guid>
  <pubDate>Fri, 29 Nov 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/88c620a6-0b1c-4698-aac4-ac757b632286.mp3" length="19052274" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</itunes:subtitle>
  <itunes:duration>26:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks. 
</description>
  <itunes:keywords>OFNP,wireless,wifi,On-Off Noise Power Communication,LORA,WiFi 6,Ubiquiti ,Unifi,Amplifi,Amplifi Alien,mesh wifi,router,home networking,networking,wireless,ethernet,ASUS,AiMesh,OFDMA,Orthogonal Frequency-Division Multiple Access,SmallNetBuilder,Tim Higgins,SSD,storage,IEEE,encryption,cryptography,hardware encryption,BitLocker,LUKS,DBAN,hard disk,hard drive,storage,solid state,Secure Erase,ATA,security,machine learning,AI,artificial intelligence,artificial general intelligence,training,neural network,inference,drunkard's walk,Nvidia,Tesla V100,Matrix multiplication,linear algebra,supercomputers,NPU,TPU,Google,Jeffrey Dean,CPU,GPU,Chip Design,Deep Learning,Intel AVX512,Deep Learning Boost,OpenVINO,ResNet,i9-10980XE,Arvind Narayanan,AIExpert, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>413: The Coffee Shop Problem</title>
  <link>https://techsnap.systems/413</link>
  <guid isPermaLink="false">2c022259-3aec-490f-b2e3-0560336bafce</guid>
  <pubDate>Fri, 04 Oct 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2c022259-3aec-490f-b2e3-0560336bafce.mp3" length="23110449" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
</itunes:subtitle>
  <itunes:duration>32:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. 
</description>
  <itunes:keywords>DoH, DNS, HTTPS, TLS, SSL, DNS-over-HTTPS, Google, Mozilla, Firefox, Cloudflare, encryption, Windows, Chrome, MITM, Man-In-The-Middle, Quad-9, 1.1.1.1, 8.8.8.8, Cloudflare DNS, Google DNS, Wireguard, Wireguard VPN, VPN, WARP, privacy, anonymity, region shifting, mmproxy, tcp, tcp/ip, ip, forwarding, proxy, iptables, HTTP/3, QUIC, udp, 0-RTT, SPDY, networking, network protocol, curl, quiche, rust, chrome canary, canary, startpage, duckduckgo, google search, search engines, cookies, incognito, startmail, web proxy, Chromebook, chromebook support, lenovo, lenovo chromebook, security updates, Quantum computing, quantum computers, quantum supremacy, shor's algorithm, cryptography, public-key cryptography, AMD, AMD Ryzen, Ryzen PRO, Ryzen PRO 3000, memory encryption, devops, sysadmin podcast, jupiter broadcasting, linux academy, techsnap, guardmi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>412: Too Good To Be True</title>
  <link>https://techsnap.systems/412</link>
  <guid isPermaLink="false">d6b4d1e4-a600-45ff-bad6-5d1cd032a4af</guid>
  <pubDate>Fri, 20 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/d6b4d1e4-a600-45ff-bad6-5d1cd032a4af.mp3" length="24913525" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</itunes:subtitle>
  <itunes:duration>34:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.
Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution. 
</description>
  <itunes:keywords>QKD, Quantum key distribution, quantum cryptography, cryptography, security, Chromebooks, ChromeOS, Neverware, CloudreadyOS, google, security updates, 802.11ax, Wifi 5, Wifi 6, WPA3, Wifi, wireless, Sure-Fi, RF Chrip, spread spectrum, industrial iot, iot, the wifi challenge, sysadmin podcast, HVAC, networking, ethernet, low bandwidth, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</p>

<p>Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.</p><p>Links:</p><ul><li><a title="RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/rf-chirp-tech-long-distance-incredible-penetration-low-bandwidth/">RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica</a> &mdash; Recently, I took the company's technology for a spin with a pair of hand-held demo communicators about the size of a kid's walkie-talkie. They don't do much—just light up with a signal strength reading on both devices, whenever a transmit button on either is pressed—but that's enough to get a good indication of whether the tech will work to solve a given problem.</li><li><a title="Wi-Fi 6 Is Officially Here: Certification Program Begins" rel="nofollow" href="https://www.anandtech.com/show/14875/wifi-6-is-officially-here-certification-program-begins">Wi-Fi 6 Is Officially Here: Certification Program Begins</a> &mdash; Finally, along with the launch of the certification program itself, the Wi-Fi Alliance has already certified its first dozen devices. </li><li><a title="Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/say-hello-to-802-11ax-wi-fi-6-device-certification-begins-today/">Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica</a> &mdash; Today, the Wi-Fi Alliance launched its Wi-Fi Certified 6 program, which means that the standard has been completely finalized, and device manufacturers and OEMs can begin the process of having the organization certify their products to carry the Wi-Fi 6 branding.
</li><li><a title="Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge" rel="nofollow" href="https://www.theverge.com/2019/9/14/20865699/pixel-4-xl-leaked-photos-camera-specs">Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge</a></li><li><a title="iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/iphone-11-iphone-11-pro-and-iphone-11-pro-max-hands-on-with-apples-new-phones/">iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica</a></li><li><a title="Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/some-chromebooks-mistakenly-declared-themselves-end-of-life-last-week/">Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica</a> &mdash; A lot of Chromebook and Chromebox users don't realize this, but all ChromeOS devices have an expiration date. Google's original policy was for devices to be supported for five years, but the company has recently extended that time to 6.5 years.

</li><li><a title="LINUX Unplugged 318: Manjaro Levels Up" rel="nofollow" href="https://linuxunplugged.com/318">LINUX Unplugged 318: Manjaro Levels Up</a></li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica</a></li><li><a title="Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka" rel="nofollow" href="https://lahirumadushankablog.wordpress.com/2017/10/01/gentle-intro-to-quantum-key-distribution-qkd/">Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka</a></li><li><a title="The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/articles/2019-01-14/the-super-secure-quantum-cable-hiding-in-the-holland-tunnel">The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg</a> &mdash;  Banks and governments are testing quantum key distribution technology to guard their closest secrets.</li><li><a title="Quantum Key Distribution - QKD" rel="nofollow" href="https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/">Quantum Key Distribution - QKD</a> &mdash; This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature.</li><li><a title="TechSNAP 403: Keeping Systems Simple" rel="nofollow" href="https://techsnap.systems/403">TechSNAP 403: Keeping Systems Simple</a></li><li><a title="Linux Headlines" rel="nofollow" href="https://linuxheadlines.show/">Linux Headlines</a> &mdash; Linux and open source headlines every weekday, in under 3 minutes.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</p>

<p>Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.</p><p>Links:</p><ul><li><a title="RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/rf-chirp-tech-long-distance-incredible-penetration-low-bandwidth/">RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica</a> &mdash; Recently, I took the company's technology for a spin with a pair of hand-held demo communicators about the size of a kid's walkie-talkie. They don't do much—just light up with a signal strength reading on both devices, whenever a transmit button on either is pressed—but that's enough to get a good indication of whether the tech will work to solve a given problem.</li><li><a title="Wi-Fi 6 Is Officially Here: Certification Program Begins" rel="nofollow" href="https://www.anandtech.com/show/14875/wifi-6-is-officially-here-certification-program-begins">Wi-Fi 6 Is Officially Here: Certification Program Begins</a> &mdash; Finally, along with the launch of the certification program itself, the Wi-Fi Alliance has already certified its first dozen devices. </li><li><a title="Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/say-hello-to-802-11ax-wi-fi-6-device-certification-begins-today/">Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica</a> &mdash; Today, the Wi-Fi Alliance launched its Wi-Fi Certified 6 program, which means that the standard has been completely finalized, and device manufacturers and OEMs can begin the process of having the organization certify their products to carry the Wi-Fi 6 branding.
</li><li><a title="Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge" rel="nofollow" href="https://www.theverge.com/2019/9/14/20865699/pixel-4-xl-leaked-photos-camera-specs">Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge</a></li><li><a title="iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/iphone-11-iphone-11-pro-and-iphone-11-pro-max-hands-on-with-apples-new-phones/">iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica</a></li><li><a title="Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/some-chromebooks-mistakenly-declared-themselves-end-of-life-last-week/">Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica</a> &mdash; A lot of Chromebook and Chromebox users don't realize this, but all ChromeOS devices have an expiration date. Google's original policy was for devices to be supported for five years, but the company has recently extended that time to 6.5 years.

</li><li><a title="LINUX Unplugged 318: Manjaro Levels Up" rel="nofollow" href="https://linuxunplugged.com/318">LINUX Unplugged 318: Manjaro Levels Up</a></li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica</a></li><li><a title="Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka" rel="nofollow" href="https://lahirumadushankablog.wordpress.com/2017/10/01/gentle-intro-to-quantum-key-distribution-qkd/">Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka</a></li><li><a title="The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/articles/2019-01-14/the-super-secure-quantum-cable-hiding-in-the-holland-tunnel">The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg</a> &mdash;  Banks and governments are testing quantum key distribution technology to guard their closest secrets.</li><li><a title="Quantum Key Distribution - QKD" rel="nofollow" href="https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/">Quantum Key Distribution - QKD</a> &mdash; This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature.</li><li><a title="TechSNAP 403: Keeping Systems Simple" rel="nofollow" href="https://techsnap.systems/403">TechSNAP 403: Keeping Systems Simple</a></li><li><a title="Linux Headlines" rel="nofollow" href="https://linuxheadlines.show/">Linux Headlines</a> &mdash; Linux and open source headlines every weekday, in under 3 minutes.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>411: Mobile Security Mistakes</title>
  <link>https://techsnap.systems/411</link>
  <guid isPermaLink="false">b9fd8f0e-82a3-44bb-b373-eea0ac62412d</guid>
  <pubDate>Fri, 06 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/b9fd8f0e-82a3-44bb-b373-eea0ac62412d.mp3" length="21338406" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</itunes:subtitle>
  <itunes:duration>29:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs. 
</description>
  <itunes:keywords>iOS, iPhone, mobile, mobile apps, app security, Apple, jailbreak, security, mobile security, exploit chain, zeroday, project zero, google, libxpc, IPC, webkit, malware, android, v4l2, video4linux, privilege escalation, AMD, Epyc, NUMA, benchmarks, exploit market, Zerodium, cpu load balancing, linux, open source, USB, USB4, USB-C, Thunderbolt, USB Power Delivery, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>409: Privacy Perspectives</title>
  <link>https://techsnap.systems/409</link>
  <guid isPermaLink="false">fb83ed86-b76d-4837-ac24-17ceb1f787aa</guid>
  <pubDate>Fri, 09 Aug 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fb83ed86-b76d-4837-ac24-17ceb1f787aa.mp3" length="28249466" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</itunes:subtitle>
  <itunes:duration>39:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.
Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp. 
</description>
  <itunes:keywords>Privacy, privacy badger, ghostery, incognito, private browsing, canvas, webgl, VPN, wireguard, openvpn, browser fingerprinting, panopticlick, amiunique, apple, bluetooth, bluetooth le, bleee, mozilla, firefox, chrome, google, ad-blocking, advertising, adblock plus, ublock, ublock origin, facebook, WhatsApp, encryption, encryption debate, iphone, iOS, security, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>407: Old School Outages</title>
  <link>https://techsnap.systems/407</link>
  <guid isPermaLink="false">a442674d-ddd6-471a-ac89-448f1d9a3284</guid>
  <pubDate>Wed, 10 Jul 2019 22:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a442674d-ddd6-471a-ac89-448f1d9a3284.mp3" length="30618354" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim shares his Nagios tips and Wes chimes in with some modern monitoring tools as we chat monitoring in the wake of some high-profile outages.</itunes:subtitle>
  <itunes:duration>42:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.
Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD. 
</description>
  <itunes:keywords>Ryzen, AMD, Epyc, Intel, CPU, server, server builds, performance, benchmarks, internet, xeon, ecc, outages, google, cloudflare, facebook, microsoft, BGP, regex, deployment, verizon, RKPI, bgp leak, internet infrastructure, monitoring, openNMS, libreNMS, nagios, zabbix, prometheus, riemann, time series, metrics, logs, logging, observability, grafana, netdata, NRPE, old school, sysadmin, infosec, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>392: Keeping up with Kubernetes</title>
  <link>https://techsnap.systems/392</link>
  <guid isPermaLink="false">45523a8f-70a8-4800-a757-964c8f91f645</guid>
  <pubDate>Wed, 12 Dec 2018 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/45523a8f-70a8-4800-a757-964c8f91f645.mp3" length="23364271" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
</itunes:subtitle>
  <itunes:duration>27:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
Plus the biggest stories out of Kubecon, and serverless gets serious. 
</description>
  <itunes:keywords>Kubecon, Kubernetes, Istio, CNCF, etcd, traefik, knative, google, k8s, red hat, ibm, openwhisk, serverless, faas, rook, cloud native, storage, ceph, Helm, Helm hub, Elasticsearch, Chromium OS, Chromium, Event driven, CloudEvent, Containers, Container Vulnerability, GitLab, Crossplane, Control Plane, Multicloud, holiday, christmas, security.christmas, CVE, Security Vulnerability, CVE-2018-1002105, kube-apiserver, websocket, RBAC, HTTP, metrics, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 389: The Future of HTTP</title>
  <link>https://techsnap.systems/389</link>
  <guid isPermaLink="false">a3776de2-0fab-45fc-8d29-dcd0f2e6da03</guid>
  <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a3776de2-0fab-45fc-8d29-dcd0f2e6da03.mp3" length="37053157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</itunes:subtitle>
  <itunes:duration>43:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.
Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router. Special Guest: Jim Salter.
</description>
  <itunes:keywords>BGP, Google, MainOne, China Telecom, BGP Security, RPKI, BGP Leak, BGP Hijack, HTTP, TLS, QUIC, HTTP/3, Encryption, UDP, Spam, Router, UPnP, Botnet, Broadcom, BCMUPnP_Hunter, format string vulnerability, HTTP-over-QUIC, Router Security, WireGuard, Homebrew Router, Wifi, Jim Salter, Ars Technica, Sanoid, Security, Networking, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 382: Domestic Disappointments</title>
  <link>https://techsnap.systems/382</link>
  <guid isPermaLink="false">20c841ff-5ccf-4058-8e2d-f59364827c26</guid>
  <pubDate>Thu, 06 Sep 2018 19:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/20c841ff-5ccf-4058-8e2d-f59364827c26.mp3" length="38035774" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</itunes:subtitle>
  <itunes:duration>44:56</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.
Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. 
 Special Guest: Martin Wimpress.
</description>
  <itunes:keywords>eMail, Elections, Election Security, Espionage, Attachments, Security Keys, CIA, USA, Firewall, China, NSA, Speck, Android, Google, OpenSSH, SSH, Wireshark, CVE, CVSS, Security, TCP, ISP, BGP, 500 mile email, TCP RST, Diffy, Netflix, crypto, cryptography, diffy, netflix, manga, linux, devops, podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
