<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 03 Apr 2026 18:56:09 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Netflix”</title>
    <link>https://techsnap.systems/tags/netflix</link>
    <pubDate>Thu, 06 Sep 2018 19:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 382: Domestic Disappointments</title>
  <link>https://techsnap.systems/382</link>
  <guid isPermaLink="false">20c841ff-5ccf-4058-8e2d-f59364827c26</guid>
  <pubDate>Thu, 06 Sep 2018 19:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/20c841ff-5ccf-4058-8e2d-f59364827c26.mp3" length="38035774" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</itunes:subtitle>
  <itunes:duration>44:56</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.
Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. 
 Special Guest: Martin Wimpress.
</description>
  <itunes:keywords>eMail, Elections, Election Security, Espionage, Attachments, Security Keys, CIA, USA, Firewall, China, NSA, Speck, Android, Google, OpenSSH, SSH, Wireshark, CVE, CVSS, Security, TCP, ISP, BGP, 500 mile email, TCP RST, Diffy, Netflix, crypto, cryptography, diffy, netflix, manga, linux, devops, podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 359: Netflix’s Dark Capacity</title>
  <link>https://techsnap.systems/359</link>
  <guid isPermaLink="false">c63e4421-989c-4e30-813c-cb967a5ab29b</guid>
  <pubDate>Thu, 15 Mar 2018 20:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c63e4421-989c-4e30-813c-cb967a5ab29b.mp3" length="23670639" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
</itunes:subtitle>
  <itunes:duration>31:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is.
Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks. 
</description>
  <content:encoded>
    <![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let&#39;s Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Hardcoded Password Found in Cisco Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hardcoded-password-found-in-cisco-software/">Hardcoded Password Found in Cisco Software</a> &mdash; Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.</li><li><a title="Potent malware that hid for six years spread through routers " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/">Potent malware that hid for six years spread through routers </a> &mdash; "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."</li><li><a title="CVE 2018-1057: Authenticated Samba users can change other users&#39; password " rel="nofollow" href="https://www.samba.org/samba/security/CVE-2018-1057.html">CVE 2018-1057: Authenticated Samba users can change other users' password </a> &mdash;  On a Samba 4 AD DC the LDAP server in all versions of Samba from
4.0.0 onwards incorrectly validates permissions to modify passwords
over LDAP allowing authenticated users to change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).</li><li><a title="CVE-2018-1057 - SambaWiki Workarounds " rel="nofollow" href="https://wiki.samba.org/index.php/CVE-2018-1057#Workarounds">CVE-2018-1057 - SambaWiki Workarounds </a> &mdash; Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.</li><li><a title="ACME v2 and Wildcard Certificate Support is Live" rel="nofollow" href="https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579">ACME v2 and Wildcard Certificate Support is Live</a> &mdash; We’re pleased to announce that ACMEv2 and wildcard certificate support is live! </li><li><a title="It just got much easier to wage record-breaking DDoSes " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/it-just-got-much-easier-to-wage-record-breaking-ddoses/">It just got much easier to wage record-breaking DDoSes </a> &mdash; Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.</li><li><a title="The real cause of large DDoS " rel="nofollow" href="https://blog.cloudflare.com/the-root-cause-of-large-ddos-ip-spoofing/">The real cause of large DDoS </a> &mdash; All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. </li><li><a title="Project Nimble – Netflix TechBlog" rel="nofollow" href="https://medium.com/netflix-techblog/project-nimble-region-evacuation-reimagined-d0d0568254d4">Project Nimble – Netflix TechBlog</a> &mdash; We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. </li><li><a title="Follow Up: Alex has a tip for Alex" rel="nofollow" href="https://pastebin.com/g97N8teu">Follow Up: Alex has a tip for Alex</a></li><li><a title="Question: Oliver asks about a fail2ban replacement " rel="nofollow" href="https://pastebin.com/wrGGUyBp">Question: Oliver asks about a fail2ban replacement </a></li><li><a title="S3Scanner" rel="nofollow" href="https://github.com/sa7mon/S3Scanner">S3Scanner</a> &mdash; Scan for open S3 buckets and dump </li><li><a title="Chromium is also a Snap" rel="nofollow" href="https://snapcraft.io/chromium">Chromium is also a Snap</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let&#39;s Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Hardcoded Password Found in Cisco Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hardcoded-password-found-in-cisco-software/">Hardcoded Password Found in Cisco Software</a> &mdash; Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.</li><li><a title="Potent malware that hid for six years spread through routers " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/">Potent malware that hid for six years spread through routers </a> &mdash; "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."</li><li><a title="CVE 2018-1057: Authenticated Samba users can change other users&#39; password " rel="nofollow" href="https://www.samba.org/samba/security/CVE-2018-1057.html">CVE 2018-1057: Authenticated Samba users can change other users' password </a> &mdash;  On a Samba 4 AD DC the LDAP server in all versions of Samba from
4.0.0 onwards incorrectly validates permissions to modify passwords
over LDAP allowing authenticated users to change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).</li><li><a title="CVE-2018-1057 - SambaWiki Workarounds " rel="nofollow" href="https://wiki.samba.org/index.php/CVE-2018-1057#Workarounds">CVE-2018-1057 - SambaWiki Workarounds </a> &mdash; Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.</li><li><a title="ACME v2 and Wildcard Certificate Support is Live" rel="nofollow" href="https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579">ACME v2 and Wildcard Certificate Support is Live</a> &mdash; We’re pleased to announce that ACMEv2 and wildcard certificate support is live! </li><li><a title="It just got much easier to wage record-breaking DDoSes " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/it-just-got-much-easier-to-wage-record-breaking-ddoses/">It just got much easier to wage record-breaking DDoSes </a> &mdash; Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.</li><li><a title="The real cause of large DDoS " rel="nofollow" href="https://blog.cloudflare.com/the-root-cause-of-large-ddos-ip-spoofing/">The real cause of large DDoS </a> &mdash; All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. </li><li><a title="Project Nimble – Netflix TechBlog" rel="nofollow" href="https://medium.com/netflix-techblog/project-nimble-region-evacuation-reimagined-d0d0568254d4">Project Nimble – Netflix TechBlog</a> &mdash; We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. </li><li><a title="Follow Up: Alex has a tip for Alex" rel="nofollow" href="https://pastebin.com/g97N8teu">Follow Up: Alex has a tip for Alex</a></li><li><a title="Question: Oliver asks about a fail2ban replacement " rel="nofollow" href="https://pastebin.com/wrGGUyBp">Question: Oliver asks about a fail2ban replacement </a></li><li><a title="S3Scanner" rel="nofollow" href="https://github.com/sa7mon/S3Scanner">S3Scanner</a> &mdash; Scan for open S3 buckets and dump </li><li><a title="Chromium is also a Snap" rel="nofollow" href="https://snapcraft.io/chromium">Chromium is also a Snap</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 350: Trials of TLS</title>
  <link>https://techsnap.systems/350</link>
  <guid isPermaLink="false">18f0b5cf-66ed-47af-89ca-011c4a0dae68</guid>
  <pubDate>Fri, 29 Dec 2017 08:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/18f0b5cf-66ed-47af-89ca-011c4a0dae68.mp3" length="37195885" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A deep dive into some SMB fundamentals and practical tips to stay on top of suspicious network traffic.
</itunes:subtitle>
  <itunes:duration>50:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The trials and tribulations of the long journey to TLS 1.3, and the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories and the data that was exposed.
Then we do a deep dive into some SMB fundamentals and practical tips to stay on top of suspicious network traffic.
</description>
  <content:encoded>
    <![CDATA[<p>The trials and tribulations of the long journey to TLS 1.3, and the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories and the data that was exposed.</p>

<p>Then we do a deep dive into some SMB fundamentals and practical tips to stay on top of suspicious network traffic.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Why TLS 1.3 isn&#39;t in browsers yet" rel="nofollow" href="https://blog.cloudflare.com/why-tls-1-3-isnt-in-browsers-yet/">Why TLS 1.3 isn't in browsers yet</a> &mdash; It has been over a year since Cloudflare’s TLS 1.3 launch and still, none of the major browsers have enabled TLS 1.3 by default.</li><li><a title="TLS 1.3 middleboxes test" rel="nofollow" href="https://tls13.mitm.watch/">TLS 1.3 middleboxes test</a> &mdash; This page performs some tests to check for middlebox interference with TLS 1.3. For that it requires Adobe Flash and TCP port 843 to be open. If this is not the case, all tests will fail with N/A. </li><li><a title="Drone maker DJI left its private SSL, firmware keys open to world+dog on GitHub FOR YEARS" rel="nofollow" href="https://www.theregister.co.uk/2017/11/16/dji_private_keys_left_github/">Drone maker DJI left its private SSL, firmware keys open to world+dog on GitHub FOR YEARS</a> &mdash; AWS account credentials and firmware AES encryption keys were also exposed on GitHub,</li><li><a title="Data on 123 million US households exposed " rel="nofollow" href="https://nakedsecurity.sophos.com/2017/12/22/data-on-123-million-us-households-exposed/">Data on 123 million US households exposed </a> &mdash; Leaky bucket might be a better description because when opened the database revealed the personal financial data of 123m American households – in effect everyone with an address in the US around the time of the file’s creation in 2013.</li><li><a title="Massive US military social media spying archive left wide open in AWS S3 buckets" rel="nofollow" href="https://www.theregister.co.uk/2017/11/17/us_military_spying_archive_exposed/">Massive US military social media spying archive left wide open in AWS S3 buckets</a> &mdash; Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing "dozens of terabytes" of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest.</li><li><a title="Security Monkey" rel="nofollow" href="https://github.com/Netflix/security_monkey">Security Monkey</a> &mdash; Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. It provides a single UI to browse and search through all of your accounts, regions, and cloud services. The monkey remembers previous states and can show you exactly what changed, and when.</li><li><a title="An Introduction to SMB for Network Security Analysts" rel="nofollow" href="https://401trg.pw/an-introduction-to-smb-for-network-security-analysts/">An Introduction to SMB for Network Security Analysts</a> &mdash; At its most basic, SMB is a protocol to allow devices to perform a number of functions on each other over a (usually local) network.</li><li><a title="StorageCrypter Ransomware: Security Threat or Clickbait?" rel="nofollow" href="https://www.ixsystems.com/blog/storagecrypter/">StorageCrypter Ransomware: Security Threat or Clickbait?</a> &mdash; Hats off to the most buzzword-loaded headline of the year: “StorageCrypt Ransomware Infecting NAS Devices Using SambaCry”. </li><li><a title="DHCPDECLINE Follow Up " rel="nofollow" href="https://slexy.org/view/s2NNasfpFl">DHCPDECLINE Follow Up </a> &mdash; I think I have a hypothesis. When dhclient is offered an IP, it attempts to look it up in dhcpd.leases (under /var), and if /var has errors, the lookup fails and says "not found" (which is what the DHCPDECLINE line says in the log).</li><li><a title="Please keep some BSD" rel="nofollow" href="https://slexy.org/view/s2EING9Vai">Please keep some BSD</a> &mdash; Please don't get too Linux single-minded. Some FreeBSD plugs here and there are welcome.</li><li><a title="Repairing a 1960s mainframe: Fixing the IBM 1401&#39;s core memory and power supply" rel="nofollow" href="http://www.righto.com/2017/12/repairing-1960s-mainframe-fixing-ibm.html">Repairing a 1960s mainframe: Fixing the IBM 1401's core memory and power supply</a> &mdash; Core memory was a popular form of storage in this era as it was relatively fast and inexpensive. Each bit is stored in a tiny magnetized ferrite ring called a core.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The trials and tribulations of the long journey to TLS 1.3, and the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories and the data that was exposed.</p>

<p>Then we do a deep dive into some SMB fundamentals and practical tips to stay on top of suspicious network traffic.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Why TLS 1.3 isn&#39;t in browsers yet" rel="nofollow" href="https://blog.cloudflare.com/why-tls-1-3-isnt-in-browsers-yet/">Why TLS 1.3 isn't in browsers yet</a> &mdash; It has been over a year since Cloudflare’s TLS 1.3 launch and still, none of the major browsers have enabled TLS 1.3 by default.</li><li><a title="TLS 1.3 middleboxes test" rel="nofollow" href="https://tls13.mitm.watch/">TLS 1.3 middleboxes test</a> &mdash; This page performs some tests to check for middlebox interference with TLS 1.3. For that it requires Adobe Flash and TCP port 843 to be open. If this is not the case, all tests will fail with N/A. </li><li><a title="Drone maker DJI left its private SSL, firmware keys open to world+dog on GitHub FOR YEARS" rel="nofollow" href="https://www.theregister.co.uk/2017/11/16/dji_private_keys_left_github/">Drone maker DJI left its private SSL, firmware keys open to world+dog on GitHub FOR YEARS</a> &mdash; AWS account credentials and firmware AES encryption keys were also exposed on GitHub,</li><li><a title="Data on 123 million US households exposed " rel="nofollow" href="https://nakedsecurity.sophos.com/2017/12/22/data-on-123-million-us-households-exposed/">Data on 123 million US households exposed </a> &mdash; Leaky bucket might be a better description because when opened the database revealed the personal financial data of 123m American households – in effect everyone with an address in the US around the time of the file’s creation in 2013.</li><li><a title="Massive US military social media spying archive left wide open in AWS S3 buckets" rel="nofollow" href="https://www.theregister.co.uk/2017/11/17/us_military_spying_archive_exposed/">Massive US military social media spying archive left wide open in AWS S3 buckets</a> &mdash; Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing "dozens of terabytes" of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest.</li><li><a title="Security Monkey" rel="nofollow" href="https://github.com/Netflix/security_monkey">Security Monkey</a> &mdash; Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. It provides a single UI to browse and search through all of your accounts, regions, and cloud services. The monkey remembers previous states and can show you exactly what changed, and when.</li><li><a title="An Introduction to SMB for Network Security Analysts" rel="nofollow" href="https://401trg.pw/an-introduction-to-smb-for-network-security-analysts/">An Introduction to SMB for Network Security Analysts</a> &mdash; At its most basic, SMB is a protocol to allow devices to perform a number of functions on each other over a (usually local) network.</li><li><a title="StorageCrypter Ransomware: Security Threat or Clickbait?" rel="nofollow" href="https://www.ixsystems.com/blog/storagecrypter/">StorageCrypter Ransomware: Security Threat or Clickbait?</a> &mdash; Hats off to the most buzzword-loaded headline of the year: “StorageCrypt Ransomware Infecting NAS Devices Using SambaCry”. </li><li><a title="DHCPDECLINE Follow Up " rel="nofollow" href="https://slexy.org/view/s2NNasfpFl">DHCPDECLINE Follow Up </a> &mdash; I think I have a hypothesis. When dhclient is offered an IP, it attempts to look it up in dhcpd.leases (under /var), and if /var has errors, the lookup fails and says "not found" (which is what the DHCPDECLINE line says in the log).</li><li><a title="Please keep some BSD" rel="nofollow" href="https://slexy.org/view/s2EING9Vai">Please keep some BSD</a> &mdash; Please don't get too Linux single-minded. Some FreeBSD plugs here and there are welcome.</li><li><a title="Repairing a 1960s mainframe: Fixing the IBM 1401&#39;s core memory and power supply" rel="nofollow" href="http://www.righto.com/2017/12/repairing-1960s-mainframe-fixing-ibm.html">Repairing a 1960s mainframe: Fixing the IBM 1401's core memory and power supply</a> &mdash; Core memory was a popular form of storage in this era as it was relatively fast and inexpensive. Each bit is stored in a tiny magnetized ferrite ring called a core.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
