<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 08 Apr 2026 04:18:48 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Sysadmin Podcast”</title>
    <link>https://techsnap.systems/tags/sysadmin%20podcast</link>
    <pubDate>Fri, 29 May 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>430: All Good Things</title>
  <link>https://techsnap.systems/430</link>
  <guid isPermaLink="false">697f849c-00de-4c27-9231-6c039bb93a67</guid>
  <pubDate>Fri, 29 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/697f849c-00de-4c27-9231-6c039bb93a67.mp3" length="37553551" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</itunes:subtitle>
  <itunes:duration>52:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.
Plus our favorite features from Fedora 32, and why Wes loves DNF. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, Fedora, Fedora 32, Fedora Workstation, Ubuntu, Anaconda, Wayland, X11, Red Hat, CentOS, DNF, blivet, systemd, Linux, GNOME, Dash to Dock, Matthew Miller, LTS, rolling release, FUSE, OOM, EarlyOOM, ZFS, OpenZFS, DKMS, PPA, RAID, RAIDz, raid6, copy-on-write, vdev, storage, hard drive, SSD, HDD, spindle count, zpool, parity, filesystem, throughput, iops, chunk, block size, benchmarking</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</p>

<p>Plus our favorite features from Fedora 32, and why Wes loves DNF.</p><p>Links:</p><ul><li><a title="What&#39;s new in Fedora 32 Workstation" rel="nofollow" href="https://fedoramagazine.org/whats-new-fedora-32-workstation/">What's new in Fedora 32 Workstation</a></li><li><a title="Fedora 32 ChangeSet" rel="nofollow" href="https://fedoraproject.org/wiki/Releases/32/ChangeSet">Fedora 32 ChangeSet</a></li><li><a title="Linux distro review: Fedora Workstation 32" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/linux-distro-review-fedora-workstation-32/">Linux distro review: Fedora Workstation 32</a></li><li><a title="TechSNAP 428: RAID Reality Check" rel="nofollow" href="https://techsnap.systems/428">TechSNAP 428: RAID Reality Check</a></li><li><a title="ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/zfs-versus-raid-eight-ironwolf-disks-two-filesystems-one-winner/">ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="Find Jim on 2.5 Admins" rel="nofollow" href="https://2.5admins.com/">Find Jim on 2.5 Admins</a></li><li><a title="Find Wes on LINUX Unplugged" rel="nofollow" href="https://linuxunplugged.com/">Find Wes on LINUX Unplugged</a></li><li><a title="TechSNAP 1: First episode of TechSNAP (in 2011!)" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE">TechSNAP 1: First episode of TechSNAP (in 2011!)</a></li><li><a title="TechSNAP 300: End of the Allan and Chris era (2017)" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">TechSNAP 300: End of the Allan and Chris era (2017)</a></li><li><a title="TechSNAP 301: Enter Dan and Wes " rel="nofollow" href="https://www.jupiterbroadcasting.com/106086/the-next-generation-techsnap-301/">TechSNAP 301: Enter Dan and Wes </a></li><li><a title="TechSNAP 347: A Farewell to Dan" rel="nofollow" href="https://www.jupiterbroadcasting.com/120317/a-farewell-to-dan-techsnap-347/">TechSNAP 347: A Farewell to Dan</a></li><li><a title="TechSNAP 348: Chris is back!" rel="nofollow" href="https://www.jupiterbroadcasting.com/120687/server-neglect-techsnap-348/">TechSNAP 348: Chris is back!</a></li><li><a title="TechSNAP 389: Jim&#39;s first time as a guest" rel="nofollow" href="https://www.jupiterbroadcasting.com/128101/the-future-of-http-techsnap-389/">TechSNAP 389: Jim's first time as a guest</a></li><li><a title="TechSNAP 390: Jim&#39;s second guest appearance" rel="nofollow" href="https://techsnap.systems/390">TechSNAP 390: Jim's second guest appearance</a></li><li><a title="TechSNAP 393: Chris says goodbye" rel="nofollow" href="https://www.jupiterbroadcasting.com/128656/back-to-our-roots-techsnap-393/">TechSNAP 393: Chris says goodbye</a></li><li><a title="TechSNAP 395: Jim joins the show" rel="nofollow" href="https://www.jupiterbroadcasting.com/128941/the-acme-era-techsnap-395/">TechSNAP 395: Jim joins the show</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</p>

<p>Plus our favorite features from Fedora 32, and why Wes loves DNF.</p><p>Links:</p><ul><li><a title="What&#39;s new in Fedora 32 Workstation" rel="nofollow" href="https://fedoramagazine.org/whats-new-fedora-32-workstation/">What's new in Fedora 32 Workstation</a></li><li><a title="Fedora 32 ChangeSet" rel="nofollow" href="https://fedoraproject.org/wiki/Releases/32/ChangeSet">Fedora 32 ChangeSet</a></li><li><a title="Linux distro review: Fedora Workstation 32" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/linux-distro-review-fedora-workstation-32/">Linux distro review: Fedora Workstation 32</a></li><li><a title="TechSNAP 428: RAID Reality Check" rel="nofollow" href="https://techsnap.systems/428">TechSNAP 428: RAID Reality Check</a></li><li><a title="ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/zfs-versus-raid-eight-ironwolf-disks-two-filesystems-one-winner/">ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="Find Jim on 2.5 Admins" rel="nofollow" href="https://2.5admins.com/">Find Jim on 2.5 Admins</a></li><li><a title="Find Wes on LINUX Unplugged" rel="nofollow" href="https://linuxunplugged.com/">Find Wes on LINUX Unplugged</a></li><li><a title="TechSNAP 1: First episode of TechSNAP (in 2011!)" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE">TechSNAP 1: First episode of TechSNAP (in 2011!)</a></li><li><a title="TechSNAP 300: End of the Allan and Chris era (2017)" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">TechSNAP 300: End of the Allan and Chris era (2017)</a></li><li><a title="TechSNAP 301: Enter Dan and Wes " rel="nofollow" href="https://www.jupiterbroadcasting.com/106086/the-next-generation-techsnap-301/">TechSNAP 301: Enter Dan and Wes </a></li><li><a title="TechSNAP 347: A Farewell to Dan" rel="nofollow" href="https://www.jupiterbroadcasting.com/120317/a-farewell-to-dan-techsnap-347/">TechSNAP 347: A Farewell to Dan</a></li><li><a title="TechSNAP 348: Chris is back!" rel="nofollow" href="https://www.jupiterbroadcasting.com/120687/server-neglect-techsnap-348/">TechSNAP 348: Chris is back!</a></li><li><a title="TechSNAP 389: Jim&#39;s first time as a guest" rel="nofollow" href="https://www.jupiterbroadcasting.com/128101/the-future-of-http-techsnap-389/">TechSNAP 389: Jim's first time as a guest</a></li><li><a title="TechSNAP 390: Jim&#39;s second guest appearance" rel="nofollow" href="https://techsnap.systems/390">TechSNAP 390: Jim's second guest appearance</a></li><li><a title="TechSNAP 393: Chris says goodbye" rel="nofollow" href="https://www.jupiterbroadcasting.com/128656/back-to-our-roots-techsnap-393/">TechSNAP 393: Chris says goodbye</a></li><li><a title="TechSNAP 395: Jim joins the show" rel="nofollow" href="https://www.jupiterbroadcasting.com/128941/the-acme-era-techsnap-395/">TechSNAP 395: Jim joins the show</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>429: Curious About Caddy</title>
  <link>https://techsnap.systems/429</link>
  <guid isPermaLink="false">a30bad27-ffe4-4dd7-a499-0117167b9f4e</guid>
  <pubDate>Fri, 15 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a30bad27-ffe4-4dd7-a499-0117167b9f4e.mp3" length="22145590" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</itunes:subtitle>
  <itunes:duration>30:45</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, Caddy, https, Let's Encrypt, Apache, NGINX, web server, internet, web, containers, Traefik, Wordpress, packaging, Debian, certbot, TLS, OCSP, security, automation, cloud, reverse proxy, Comet Lake, CPU, Intel, 14nm, 10nm, base clock rate, gigahertz wars, lithography, 5.0 GHz, single-core, Celeron, Pentium, Intel Core, i3, i5, i7, Ice Lake, hyperthreading, turbo max boost, thermal velocity boost, power management, CPU cooling, TDP, thermal design power, integrated graphics, AMD, 5G, Ligado, wireless communication, GPS, US Military, Pentagon, Defense Department, L-Band spectrum, spoofing, software-defined radio, FCC, IoT, mobile broadband, LightSquared</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel&#39;s Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</p><p>Links:</p><ul><li><a title="Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/caddy-offers-tls-https-and-more-in-one-dependency-free-go-web-server/">Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server</a></li><li><a title="Caddy 2" rel="nofollow" href="https://caddyserver.com/v2">Caddy 2</a></li><li><a title="Caddy v2 Improvements [slightly out of date]" rel="nofollow" href="https://github.com/caddyserver/caddy/wiki/v2:-Improvements">Caddy v2 Improvements [slightly out of date]</a></li><li><a title="Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy" rel="nofollow" href="https://github.com/caddyserver/caddy/issues/2786">Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy</a></li><li><a title="Revert &quot;Implement Caddy-Sponsors HTTP response header&quot; by lol768 · Pull Request #1866 · caddyserver/caddy" rel="nofollow" href="https://github.com/caddyserver/caddy/pull/1866">Revert "Implement Caddy-Sponsors HTTP response header" by lol768 · Pull Request #1866 · caddyserver/caddy</a></li><li><a title="Intel’s 10th generation desktop CPUs have arrived—still on 14nm" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/intels-comet-lake-desktop-cpus-are-here/">Intel’s 10th generation desktop CPUs have arrived—still on 14nm</a></li><li><a title="Intel Comet Lake 10th Gen CPU release date, specs, price, and performance" rel="nofollow" href="https://www.pcgamer.com/intel-comet-lake-release-date-specs-performance/">Intel Comet Lake 10th Gen CPU release date, specs, price, and performance</a></li><li><a title="10th Gen Intel® Core™ Desktop Processors" rel="nofollow" href="https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-desktop-brief.html">10th Gen Intel® Core™ Desktop Processors</a></li><li><a title="US military is furious at FCC over 5G plan that could interfere with GPS" rel="nofollow" href="https://arstechnica.com/tech-policy/2020/05/millions-of-gps-devices-at-risk-from-fcc-approved-5g-network-military-says/">US military is furious at FCC over 5G plan that could interfere with GPS</a></li><li><a title="The Pentagon&#39;s fight to kill Ligado&#39;s 5G network" rel="nofollow" href="https://www.cnet.com/news/the-pentagons-fight-to-kill-ligados-5g-network/">The Pentagon's fight to kill Ligado's 5G network</a></li><li><a title="FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT" rel="nofollow" href="https://www.fcc.gov/document/fcc-approves-ligado-l-band-application-facilitate-5g-iot">FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel&#39;s Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</p><p>Links:</p><ul><li><a title="Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/caddy-offers-tls-https-and-more-in-one-dependency-free-go-web-server/">Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server</a></li><li><a title="Caddy 2" rel="nofollow" href="https://caddyserver.com/v2">Caddy 2</a></li><li><a title="Caddy v2 Improvements [slightly out of date]" rel="nofollow" href="https://github.com/caddyserver/caddy/wiki/v2:-Improvements">Caddy v2 Improvements [slightly out of date]</a></li><li><a title="Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy" rel="nofollow" href="https://github.com/caddyserver/caddy/issues/2786">Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy</a></li><li><a title="Revert &quot;Implement Caddy-Sponsors HTTP response header&quot; by lol768 · Pull Request #1866 · caddyserver/caddy" rel="nofollow" href="https://github.com/caddyserver/caddy/pull/1866">Revert "Implement Caddy-Sponsors HTTP response header" by lol768 · Pull Request #1866 · caddyserver/caddy</a></li><li><a title="Intel’s 10th generation desktop CPUs have arrived—still on 14nm" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/intels-comet-lake-desktop-cpus-are-here/">Intel’s 10th generation desktop CPUs have arrived—still on 14nm</a></li><li><a title="Intel Comet Lake 10th Gen CPU release date, specs, price, and performance" rel="nofollow" href="https://www.pcgamer.com/intel-comet-lake-release-date-specs-performance/">Intel Comet Lake 10th Gen CPU release date, specs, price, and performance</a></li><li><a title="10th Gen Intel® Core™ Desktop Processors" rel="nofollow" href="https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-desktop-brief.html">10th Gen Intel® Core™ Desktop Processors</a></li><li><a title="US military is furious at FCC over 5G plan that could interfere with GPS" rel="nofollow" href="https://arstechnica.com/tech-policy/2020/05/millions-of-gps-devices-at-risk-from-fcc-approved-5g-network-military-says/">US military is furious at FCC over 5G plan that could interfere with GPS</a></li><li><a title="The Pentagon&#39;s fight to kill Ligado&#39;s 5G network" rel="nofollow" href="https://www.cnet.com/news/the-pentagons-fight-to-kill-ligados-5g-network/">The Pentagon's fight to kill Ligado's 5G network</a></li><li><a title="FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT" rel="nofollow" href="https://www.fcc.gov/document/fcc-approves-ligado-l-band-application-facilitate-5g-iot">FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>428: RAID Reality Check</title>
  <link>https://techsnap.systems/428</link>
  <guid isPermaLink="false">5556e3df-292d-4b0b-8e25-27f071862c06</guid>
  <pubDate>Fri, 01 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/5556e3df-292d-4b0b-8e25-27f071862c06.mp3" length="25930419" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</itunes:subtitle>
  <itunes:duration>36:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.
Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, EPYC, Threadripper, AMD, 7FX2, CPU, per-core performance, Intel, Threadripper, TDP, energy efficiency, RAID, md-raid, ZFS, hard disk performance, iops, hard drive, storage, Seagate, Iron Wolf, raidz, raidz2, RAID-5, RAID-6, RAID-10, ZFS, backups, fio, benchmarking, data integrity, BGP, Cloudflare, networking, RPKI, security, cryptography, route leak, routing, isbgpsafeyet, internet, systemd, systemd timers, cron, email, monitoring, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>427: Gigahertz Games</title>
  <link>https://techsnap.systems/427</link>
  <guid isPermaLink="false">809b6258-3513-4344-a965-b854e8c78fd3</guid>
  <pubDate>Fri, 17 Apr 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/809b6258-3513-4344-a965-b854e8c78fd3.mp3" length="37075823" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</itunes:subtitle>
  <itunes:duration>51:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.
Plus Intel's surprisingly overclockable laptop CPU, why you shouldn't freak out about 5G, and the incredible creativity of the Demoscene. 
</description>
  <itunes:keywords>AMD, Ryzen 9, Asus Zephyrus G14, Intel, 10th-generation, Comet Lake, H-series, overclocking, gaming laptop, 20.04, Ubuntu, Focal Fossa, Wi-Fi, FCC, Wi-Fi 6e, Wi-Fi 6, wireless spectrum, 6Ghz, 5G, cell towers, coronavirus, COVID-19, FreeBSD, Unix, GhostBSD, GNOME, MATE, ZFS on root, BSD, PC-BSD, Void Linux, Project Trident, MOD, s3m, tracker, Demoscene, Amiga, assembly, computer graphics, Farbrausch, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</p>

<p>Plus Intel&#39;s surprisingly overclockable laptop CPU, why you shouldn&#39;t freak out about 5G, and the incredible creativity of the Demoscene.</p><p>Links:</p><ul><li><a title="Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/asus-rog-zephyrus-g14-ryzen-7nm-mobile-is-here-and-its-awesome/">Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome</a></li><li><a title="Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/linux-on-laptops-asus-zephyrus-g14-with-ryzen-9-4900hs/">Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS</a></li><li><a title="Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/intels-10th-generation-h-series-laptop-cpus-break-5-ghz/">Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica</a></li><li><a title="Wi-Fi 6E becomes official—the FCC will vote on rules this month" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/fcc-will-vote-on-rules-for-1-2ghz-of-new-wi-fi-6e-spectrum-on-april-23/">Wi-Fi 6E becomes official—the FCC will vote on rules this month</a></li><li><a title="Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers" rel="nofollow" href="https://arstechnica.com/science/2020/04/in-the-uk-pandemic-panic-has-people-burning-cell-phone-towers/">Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers</a></li><li><a title="Not-actually Linux distro review: FreeBSD 12.1-RELEASE" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-freebsd-12-1-release/">Not-actually Linux distro review: FreeBSD 12.1-RELEASE</a></li><li><a title="Not actually Linux distro review deux: GhostBSD" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/">Not actually Linux distro review deux: GhostBSD</a></li><li><a title="MOD (file format) - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/MOD_(file_format)">MOD (file format) - Wikipedia</a></li><li><a title="AT&amp;T.MOD (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=UspabZp09_Q">AT&amp;T.MOD (YouTube)</a></li><li><a title="DJ Moses Rising—Ice Cream Trance (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=RDDkGZWkEn0">DJ Moses Rising—Ice Cream Trance (YouTube)</a></li><li><a title="Farbrausch—The Product (64K Intro, 2000)" rel="nofollow" href="https://www.youtube.com/watch?v=Y3n3c_8Nn2Y">Farbrausch—The Product (64K Intro, 2000)</a></li><li><a title="Farbrausch—Poem to a Horse (64K Intro, 2002)" rel="nofollow" href="https://www.youtube.com/watch?v=gNOJhEX9YT0">Farbrausch—Poem to a Horse (64K Intro, 2002)</a></li><li><a title="Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity" rel="nofollow" href="http://demoscene-the-art-of-coding.net/2020/04/15/breakthrough-finland-accepts-demoscene-on-their-national-list-of-intangible-cultural-heritage-of-humanity/">Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</p>

<p>Plus Intel&#39;s surprisingly overclockable laptop CPU, why you shouldn&#39;t freak out about 5G, and the incredible creativity of the Demoscene.</p><p>Links:</p><ul><li><a title="Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/asus-rog-zephyrus-g14-ryzen-7nm-mobile-is-here-and-its-awesome/">Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome</a></li><li><a title="Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/linux-on-laptops-asus-zephyrus-g14-with-ryzen-9-4900hs/">Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS</a></li><li><a title="Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/intels-10th-generation-h-series-laptop-cpus-break-5-ghz/">Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica</a></li><li><a title="Wi-Fi 6E becomes official—the FCC will vote on rules this month" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/fcc-will-vote-on-rules-for-1-2ghz-of-new-wi-fi-6e-spectrum-on-april-23/">Wi-Fi 6E becomes official—the FCC will vote on rules this month</a></li><li><a title="Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers" rel="nofollow" href="https://arstechnica.com/science/2020/04/in-the-uk-pandemic-panic-has-people-burning-cell-phone-towers/">Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers</a></li><li><a title="Not-actually Linux distro review: FreeBSD 12.1-RELEASE" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-freebsd-12-1-release/">Not-actually Linux distro review: FreeBSD 12.1-RELEASE</a></li><li><a title="Not actually Linux distro review deux: GhostBSD" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/">Not actually Linux distro review deux: GhostBSD</a></li><li><a title="MOD (file format) - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/MOD_(file_format)">MOD (file format) - Wikipedia</a></li><li><a title="AT&amp;T.MOD (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=UspabZp09_Q">AT&amp;T.MOD (YouTube)</a></li><li><a title="DJ Moses Rising—Ice Cream Trance (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=RDDkGZWkEn0">DJ Moses Rising—Ice Cream Trance (YouTube)</a></li><li><a title="Farbrausch—The Product (64K Intro, 2000)" rel="nofollow" href="https://www.youtube.com/watch?v=Y3n3c_8Nn2Y">Farbrausch—The Product (64K Intro, 2000)</a></li><li><a title="Farbrausch—Poem to a Horse (64K Intro, 2002)" rel="nofollow" href="https://www.youtube.com/watch?v=gNOJhEX9YT0">Farbrausch—Poem to a Horse (64K Intro, 2002)</a></li><li><a title="Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity" rel="nofollow" href="http://demoscene-the-art-of-coding.net/2020/04/15/breakthrough-finland-accepts-demoscene-on-their-national-list-of-intangible-cultural-heritage-of-humanity/">Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>426: Storage Stories</title>
  <link>https://techsnap.systems/426</link>
  <guid isPermaLink="false">658dd254-b721-4281-8415-9357e180e92b</guid>
  <pubDate>Fri, 03 Apr 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/658dd254-b721-4281-8415-9357e180e92b.mp3" length="22528023" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.</itunes:subtitle>
  <itunes:duration>31:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  
Plus we celebrate WireGuard's inclusion in the Linux 5.6 kernel, and fight some exFAT FUD. 
</description>
  <itunes:keywords>WireGuard, Linux 5.6, kernel module, networking, encryption, security, Ubuntu, Debian, Windows, zonefs, Zoned Storage, SMR, Shingled Magnetic Recording, SSD, NVMe, firmware, block device, dm-zoned, filesystems, device mapper, Western Digital, ZFS, RAID, Seagate, Microsoft, Samsung, Google, Andoird, Paragon Software, exFAT, FUD, open source, free software, NTFS, NTFS-3G, SMB, Samba, Cloudfare, crypto, dm-crypt, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-56-features&amp;num=1">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a title="fs: New zonefs file system" rel="nofollow" href="https://lwn.net/Articles/793585/">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow" href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow" href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a title="Linux Kernel Support - ZonedStorage.io" rel="nofollow" href="https://www.zonedstorage.io/introduction/linux-support/">Linux Kernel Support - ZonedStorage.io</a></li><li><a title="dm-zoned" rel="nofollow" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a title="Device Mapper - ZonedStorage.io" rel="nofollow" href="https://zonedstorage.io/linux/dm/#dm-zoned">Device Mapper - ZonedStorage.io</a></li><li><a title=" What are PMR and SMR hard disk drives?" rel="nofollow" href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives"> What are PMR and SMR hard disk drives?</a></li><li><a title="Beware of SMR drives in PMR clothing" rel="nofollow" href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow" href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=New-exFAT-For-Linux-5.7">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow" href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow" href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-56-features&amp;num=1">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a title="fs: New zonefs file system" rel="nofollow" href="https://lwn.net/Articles/793585/">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow" href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow" href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a title="Linux Kernel Support - ZonedStorage.io" rel="nofollow" href="https://www.zonedstorage.io/introduction/linux-support/">Linux Kernel Support - ZonedStorage.io</a></li><li><a title="dm-zoned" rel="nofollow" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a title="Device Mapper - ZonedStorage.io" rel="nofollow" href="https://zonedstorage.io/linux/dm/#dm-zoned">Device Mapper - ZonedStorage.io</a></li><li><a title=" What are PMR and SMR hard disk drives?" rel="nofollow" href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives"> What are PMR and SMR hard disk drives?</a></li><li><a title="Beware of SMR drives in PMR clothing" rel="nofollow" href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow" href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=New-exFAT-For-Linux-5.7">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow" href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow" href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>425: Ryzen Gets Real</title>
  <link>https://techsnap.systems/425</link>
  <guid isPermaLink="false">fc127e6a-cc96-408c-ae38-8049074a8f34</guid>
  <pubDate>Fri, 20 Mar 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fc127e6a-cc96-408c-ae38-8049074a8f34.mp3" length="23682530" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.</itunes:subtitle>
  <itunes:duration>32:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root. 
Plus Let's Encrypt's certificate validation mix-up, Intel's questionable new power supply design, and more. 
</description>
  <itunes:keywords>Let's Encrypt, Boulder, Go, HTTPS, TLS, CAA, DNS, ACME, automation, Intel, AMD, Ryzen, Ryzen 4000, laptop, mobile processors, CPU, GPU, computer hardware, gaming, integrated graphics, graphics, battery life, Lenovo, Ryzen Mobile, ATX12VO, power supply, PSU, motherboard, electronics, iXsystems, TrueNAS, FreeNAS, TrueNAS Core, ZFS, fusion pools, storage, zsys, 20.04, Ubuntu, Canonical, snapshots, APT, sanoid, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at AMD&#39;s upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04&#39;s approach to ZFS on root. </p>

<p>Plus Let&#39;s Encrypt&#39;s certificate validation mix-up, Intel&#39;s questionable new power supply design, and more.</p><p>Links:</p><ul><li><a title="Let&#39;s Encrypt changes course on certificate revocation" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/lets-encrypt-holds-off-on-revocation-of-certificates/">Let's Encrypt changes course on certificate revocation</a></li><li><a title="Revoking certain certificates on March 4" rel="nofollow" href="https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864">Revoking certain certificates on March 4</a></li><li><a title="Let&#39;s Encrypt: Incomplete revocation for CAA rechecking bug" rel="nofollow" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1619179#c7">Let's Encrypt: Incomplete revocation for CAA rechecking bug</a></li><li><a title="Pass authzModel by value, not reference" rel="nofollow" href="https://github.com/letsencrypt/boulder/pull/4690/files#diff-2285b0268539881fde96d9928ecef358R1412">Pass authzModel by value, not reference</a></li><li><a title="The Complete Guide to CAA Records" rel="nofollow" href="https://jasonofflorida.com/the-complete-guide-to-caa-records/">The Complete Guide to CAA Records</a></li><li><a title="DNS Certification Authority Authorization" rel="nofollow" href="https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization">DNS Certification Authority Authorization</a></li><li><a title="AMD&#39;s 7nm Ryzen 4000 laptop processors are finally here" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/amds-7nm-ryzen-4000-laptop-processors-are-finally-here/">AMD's 7nm Ryzen 4000 laptop processors are finally here</a></li><li><a title="How Intel is changing the future of power supplies with its ATX12VO spec" rel="nofollow" href="https://www.pcworld.com/article/3518831/how-intels-changing-the-future-of-power-supplies-with-its-atx12vo-spec.html">How Intel is changing the future of power supplies with its ATX12VO spec</a></li><li><a title="Single Rail Power Supply ATX12VO Design Guide" rel="nofollow" href="https://www.intel.com/content/dam/www/public/us/en/documents/guides/single-rail-power-supply-platform-atx12vo-design-guide.pdf">Single Rail Power Supply ATX12VO Design Guide</a></li><li><a title="FreeNAS and TrueNAS are Unifying" rel="nofollow" href="https://www.ixsystems.com/blog/freenas-truenas-unification/">FreeNAS and TrueNAS are Unifying</a></li><li><a title="FreeNAS and TrueNAS are Unifying [Video Announcement]" rel="nofollow" href="https://www.youtube.com/watch?v=0gK2g8g0btI">FreeNAS and TrueNAS are Unifying [Video Announcement]</a></li><li><a title="Ubuntu 20.04&#39;s zsys adds ZFS snapshots to package management" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/ubuntu-20-04s-zsys-adds-zfs-snapshots-to-package-management/">Ubuntu 20.04's zsys adds ZFS snapshots to package management</a></li><li><a title="ubuntu/zsys: zsys daemon and client for zfs systems" rel="nofollow" href="https://github.com/ubuntu/zsys">ubuntu/zsys: zsys daemon and client for zfs systems</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at AMD&#39;s upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04&#39;s approach to ZFS on root. </p>

<p>Plus Let&#39;s Encrypt&#39;s certificate validation mix-up, Intel&#39;s questionable new power supply design, and more.</p><p>Links:</p><ul><li><a title="Let&#39;s Encrypt changes course on certificate revocation" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/lets-encrypt-holds-off-on-revocation-of-certificates/">Let's Encrypt changes course on certificate revocation</a></li><li><a title="Revoking certain certificates on March 4" rel="nofollow" href="https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864">Revoking certain certificates on March 4</a></li><li><a title="Let&#39;s Encrypt: Incomplete revocation for CAA rechecking bug" rel="nofollow" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1619179#c7">Let's Encrypt: Incomplete revocation for CAA rechecking bug</a></li><li><a title="Pass authzModel by value, not reference" rel="nofollow" href="https://github.com/letsencrypt/boulder/pull/4690/files#diff-2285b0268539881fde96d9928ecef358R1412">Pass authzModel by value, not reference</a></li><li><a title="The Complete Guide to CAA Records" rel="nofollow" href="https://jasonofflorida.com/the-complete-guide-to-caa-records/">The Complete Guide to CAA Records</a></li><li><a title="DNS Certification Authority Authorization" rel="nofollow" href="https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization">DNS Certification Authority Authorization</a></li><li><a title="AMD&#39;s 7nm Ryzen 4000 laptop processors are finally here" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/amds-7nm-ryzen-4000-laptop-processors-are-finally-here/">AMD's 7nm Ryzen 4000 laptop processors are finally here</a></li><li><a title="How Intel is changing the future of power supplies with its ATX12VO spec" rel="nofollow" href="https://www.pcworld.com/article/3518831/how-intels-changing-the-future-of-power-supplies-with-its-atx12vo-spec.html">How Intel is changing the future of power supplies with its ATX12VO spec</a></li><li><a title="Single Rail Power Supply ATX12VO Design Guide" rel="nofollow" href="https://www.intel.com/content/dam/www/public/us/en/documents/guides/single-rail-power-supply-platform-atx12vo-design-guide.pdf">Single Rail Power Supply ATX12VO Design Guide</a></li><li><a title="FreeNAS and TrueNAS are Unifying" rel="nofollow" href="https://www.ixsystems.com/blog/freenas-truenas-unification/">FreeNAS and TrueNAS are Unifying</a></li><li><a title="FreeNAS and TrueNAS are Unifying [Video Announcement]" rel="nofollow" href="https://www.youtube.com/watch?v=0gK2g8g0btI">FreeNAS and TrueNAS are Unifying [Video Announcement]</a></li><li><a title="Ubuntu 20.04&#39;s zsys adds ZFS snapshots to package management" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/ubuntu-20-04s-zsys-adds-zfs-snapshots-to-package-management/">Ubuntu 20.04's zsys adds ZFS snapshots to package management</a></li><li><a title="ubuntu/zsys: zsys daemon and client for zfs systems" rel="nofollow" href="https://github.com/ubuntu/zsys">ubuntu/zsys: zsys daemon and client for zfs systems</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>424: AMD Inside</title>
  <link>https://techsnap.systems/424</link>
  <guid isPermaLink="false">770823cf-5179-4132-91fb-d67d5ddd5ff4</guid>
  <pubDate>Fri, 06 Mar 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/770823cf-5179-4132-91fb-d67d5ddd5ff4.mp3" length="20391102" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.</itunes:subtitle>
  <itunes:duration>28:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  
Plus Mozilla's rollout of DNS over HTTPS has begun, a big milestone for Let's Encrypt, and more. 
</description>
  <itunes:keywords>Performance per watt, power consumption, energy, CPU, AMD, Intel, EPYC, memory encryption, SGX, SME, TSME, TME, MKTME, security, encryption, Let's Encrypt, HTTPS, SSL, TLS, web security, DoH, DNS over HTTPS, DNS, Cloudflare, Mozilla, Firefox, kr00k, KRACK, WiFi, VPN, WPA2, ESET, wireless, Broadcom, Apple, iPhone, Microsoft Edge, Edge, Microsoft, Chrome, Google, Chromium, open source, NextDNS, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow" href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a></li><li><a title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow" href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/">The Facts: Mozilla’s DNS over HTTPs (DoH)</a></li><li><a title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow" href="https://wiki.mozilla.org/Security/DOH-resolver-policy">Security/DOH-resolver-policy - MozillaWiki</a></li><li><a title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a></li><li><a title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow" href="https://letsencrypt.org/2020/02/27/one-billion-certs.html">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a></li><li><a title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow" href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/">Let’s Encrypt: A History - The Morning Paper</a></li><li><a title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow" href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a></li><li><a title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow" href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow" href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a></li><li><a title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow" href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features">Microsoft shares a roadmap for the new Microsoft Edge</a></li><li><a title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow" href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808">Microsoft Edge: Top Feedback Summary for March 4</a></li><li><a title="Download Microsoft Edge Insider Channels" rel="nofollow" href="https://www.microsoftedgeinsider.com/en-us/download/">Download Microsoft Edge Insider Channels</a></li><li><a title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a></li><li><a title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow" href="https://www.eset.com/int/kr00k/">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a></li><li><a title="Kr00k Paper" rel="nofollow" href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf">Kr00k Paper</a></li><li><a title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow" href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a></li><li><a title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow" href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a></li><li><a title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow" href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/">Cloudflare’s Gen X: Servers for an Accelerated Future</a></li><li><a title="Impact of Cache Locality" rel="nofollow" href="https://blog.cloudflare.com/impact-of-cache-locality/">Impact of Cache Locality</a></li><li><a title="Gen X Performance Tuning" rel="nofollow" href="https://blog.cloudflare.com/gen-x-performance-tuning/">Gen X Performance Tuning</a></li><li><a title="Securing Memory at EPYC Scale" rel="nofollow" href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/">Securing Memory at EPYC Scale</a></li><li><a title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow" href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a></li><li><a title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow" href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/">The Facts: Mozilla’s DNS over HTTPs (DoH)</a></li><li><a title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow" href="https://wiki.mozilla.org/Security/DOH-resolver-policy">Security/DOH-resolver-policy - MozillaWiki</a></li><li><a title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a></li><li><a title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow" href="https://letsencrypt.org/2020/02/27/one-billion-certs.html">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a></li><li><a title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow" href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/">Let’s Encrypt: A History - The Morning Paper</a></li><li><a title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow" href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a></li><li><a title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow" href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow" href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a></li><li><a title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow" href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features">Microsoft shares a roadmap for the new Microsoft Edge</a></li><li><a title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow" href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808">Microsoft Edge: Top Feedback Summary for March 4</a></li><li><a title="Download Microsoft Edge Insider Channels" rel="nofollow" href="https://www.microsoftedgeinsider.com/en-us/download/">Download Microsoft Edge Insider Channels</a></li><li><a title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a></li><li><a title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow" href="https://www.eset.com/int/kr00k/">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a></li><li><a title="Kr00k Paper" rel="nofollow" href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf">Kr00k Paper</a></li><li><a title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow" href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a></li><li><a title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow" href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a></li><li><a title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow" href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/">Cloudflare’s Gen X: Servers for an Accelerated Future</a></li><li><a title="Impact of Cache Locality" rel="nofollow" href="https://blog.cloudflare.com/impact-of-cache-locality/">Impact of Cache Locality</a></li><li><a title="Gen X Performance Tuning" rel="nofollow" href="https://blog.cloudflare.com/gen-x-performance-tuning/">Gen X Performance Tuning</a></li><li><a title="Securing Memory at EPYC Scale" rel="nofollow" href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/">Securing Memory at EPYC Scale</a></li><li><a title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>423: Hopeful for HAMR</title>
  <link>https://techsnap.systems/423</link>
  <guid isPermaLink="false">579b3028-f4b8-408a-ad04-ee0f8d017f78</guid>
  <pubDate>Fri, 21 Feb 2020 18:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/579b3028-f4b8-408a-ad04-ee0f8d017f78.mp3" length="21313956" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.</itunes:subtitle>
  <itunes:duration>29:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. 
Plus Jim's journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about. 
</description>
  <itunes:keywords>Ubuntu, 18.04.4, 18.04, LTS, Linux, WiFi, hardware enablement, maintenance release, Clear Linux OS, Linux desktop, Intel, Clear Linux, benchmarks, performance, swupd, ZFS, ZFS on Linux, ZoL, MobaXterm,  LRU, WSL, Windows, Microsoft, L2ARC, ARC, filesystems, cache, caching, HDD, storage, hard drives, HAMR, SMR, MAMR, Seagate, Western Digital, latency, throughput, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. </p>

<p>Plus Jim&#39;s journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.</p><p>Links:</p><ul><li><a title="Ubuntu 18.04.4 LTS: here&#39;s what&#39;s new" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/ubuntu-18-04-4-lts-released-wednesday-heres-whats-new/">Ubuntu 18.04.4 LTS: here's what's new</a> &mdash; It's not as shiny and exciting as entirely new versions, of course, but it does pack in some worthwhile security and bugfix upgrades, as well as support for more and newer hardware.</li><li><a title="18.04.4 - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes/ChangeSummary/18.04.4">18.04.4 - Ubuntu Wiki</a></li><li><a title="MobaXterm" rel="nofollow" href="https://mobaxterm.mobatek.net/">MobaXterm</a> &mdash; Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more.</li><li><a title="Linux distro review: Intel’s own Clear Linux OS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/linux-distro-review-intels-own-clear-linux-os/?comments=1">Linux distro review: Intel’s own Clear Linux OS</a> &mdash; There's not much question that Clear Linux is your best bet if you want to turn in the best possible benchmark numbers. The question not addressed here is, what's it like to run Clear Linux as a daily driver? We were curious, so we took it for a spin.</li><li><a title="Clear Linux* Project" rel="nofollow" href="https://clearlinux.org/">Clear Linux* Project</a> &mdash; Clear Linux OS is an open source, rolling release Linux distribution optimized for performance and security, from the Cloud to the Edge, designed for customization, and manageability.</li><li><a title="swupd — Documentation for Clear Linux* project" rel="nofollow" href="https://docs.01.org/clearlinux/latest/guides/clear/swupd.html">swupd — Documentation for Clear Linux* project</a></li><li><a title="clr-boot-manager: Kernel &amp; Boot Loader Management" rel="nofollow" href="https://github.com/clearlinux/clr-boot-manager">clr-boot-manager: Kernel &amp; Boot Loader Management</a></li><li><a title="Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/9745">Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs</a></li><li><a title="Persistent L2ARC might be coming to ZFS on Linux" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/zfs-on-linux-should-get-a-persistent-ssd-read-cache-feature-soon/">Persistent L2ARC might be coming to ZFS on Linux</a> &mdash; The primary ARC is kept in system RAM, but an L2ARC device can be created from one or more fast disks. In a ZFS pool with one or more L2ARC devices, when blocks are evicted from the primary ARC in RAM, they are moved down to L2ARC rather than being thrown away entirely. In the past, this feature has been of limited value, both because indexing a large L2ARC occupies system RAM which could have been better used for primary ARC and because L2ARC was not persistent across reboots.</li><li><a title="Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/pull/9582">Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs</a> &mdash; This feature implements a light-weight persistent L2ARC metadata structure that allows L2ARC contents to be recovered after a reboot. This significantly eases the impact a reboot has on read performance on systems with large caches.</li><li><a title="LINUX Unplugged 303: Stateless and Dateless" rel="nofollow" href="https://linuxunplugged.com/303">LINUX Unplugged 303: Stateless and Dateless</a> &mdash; We visit Intel to figure out what Clear Linux is all about and explain a few tricks that make it unique.</li><li><a title="LINUX Unplugged Blog: Clear Linux OS 2019" rel="nofollow" href="https://linuxunplugged.com/articles/clear-linux-os-2019">LINUX Unplugged Blog: Clear Linux OS 2019</a></li><li><a title="HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/hamr-dont-hurt-em-laser-assisted-hard-drives-are-coming-in-2020/">HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020</a> &mdash; Although the 2012 "just around the corner" HAMR drives seem to have been mostly vapor, the technology is a reality now. Seagate has been trialing 16TB HAMR drives with select customers for more than a year and claims that the trials have proved that its HAMR drives are "plug and play replacements" for traditional CMR drives, requiring no special care and having no particular poor use cases compared to the drives we're all used to.</li><li><a title="HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units" rel="nofollow" href="https://blog.seagate.com/craftsman-ship/hamr-milestone-seagate-achieves-16tb-capacity-on-internal-hamr-test-units/">HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units</a></li><li><a title="Western Digital debuts 18TB and 20TB near-MAMR disk drives" rel="nofollow" href="https://blocksandfiles.com/2019/09/03/western-digital-18tb-and-20tb-mamr-disk-drives/">Western Digital debuts 18TB and 20TB near-MAMR disk drives</a></li><li><a title="Previously on TechSNAP 341: HAMR Time" rel="nofollow" href="https://techsnap.systems/341">Previously on TechSNAP 341: HAMR Time</a> &mdash; We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details &amp; some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology &amp; take a mini deep dive into the world of elliptic curve cryptography.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. </p>

<p>Plus Jim&#39;s journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.</p><p>Links:</p><ul><li><a title="Ubuntu 18.04.4 LTS: here&#39;s what&#39;s new" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/ubuntu-18-04-4-lts-released-wednesday-heres-whats-new/">Ubuntu 18.04.4 LTS: here's what's new</a> &mdash; It's not as shiny and exciting as entirely new versions, of course, but it does pack in some worthwhile security and bugfix upgrades, as well as support for more and newer hardware.</li><li><a title="18.04.4 - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes/ChangeSummary/18.04.4">18.04.4 - Ubuntu Wiki</a></li><li><a title="MobaXterm" rel="nofollow" href="https://mobaxterm.mobatek.net/">MobaXterm</a> &mdash; Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more.</li><li><a title="Linux distro review: Intel’s own Clear Linux OS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/linux-distro-review-intels-own-clear-linux-os/?comments=1">Linux distro review: Intel’s own Clear Linux OS</a> &mdash; There's not much question that Clear Linux is your best bet if you want to turn in the best possible benchmark numbers. The question not addressed here is, what's it like to run Clear Linux as a daily driver? We were curious, so we took it for a spin.</li><li><a title="Clear Linux* Project" rel="nofollow" href="https://clearlinux.org/">Clear Linux* Project</a> &mdash; Clear Linux OS is an open source, rolling release Linux distribution optimized for performance and security, from the Cloud to the Edge, designed for customization, and manageability.</li><li><a title="swupd — Documentation for Clear Linux* project" rel="nofollow" href="https://docs.01.org/clearlinux/latest/guides/clear/swupd.html">swupd — Documentation for Clear Linux* project</a></li><li><a title="clr-boot-manager: Kernel &amp; Boot Loader Management" rel="nofollow" href="https://github.com/clearlinux/clr-boot-manager">clr-boot-manager: Kernel &amp; Boot Loader Management</a></li><li><a title="Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/9745">Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs</a></li><li><a title="Persistent L2ARC might be coming to ZFS on Linux" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/zfs-on-linux-should-get-a-persistent-ssd-read-cache-feature-soon/">Persistent L2ARC might be coming to ZFS on Linux</a> &mdash; The primary ARC is kept in system RAM, but an L2ARC device can be created from one or more fast disks. In a ZFS pool with one or more L2ARC devices, when blocks are evicted from the primary ARC in RAM, they are moved down to L2ARC rather than being thrown away entirely. In the past, this feature has been of limited value, both because indexing a large L2ARC occupies system RAM which could have been better used for primary ARC and because L2ARC was not persistent across reboots.</li><li><a title="Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/pull/9582">Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs</a> &mdash; This feature implements a light-weight persistent L2ARC metadata structure that allows L2ARC contents to be recovered after a reboot. This significantly eases the impact a reboot has on read performance on systems with large caches.</li><li><a title="LINUX Unplugged 303: Stateless and Dateless" rel="nofollow" href="https://linuxunplugged.com/303">LINUX Unplugged 303: Stateless and Dateless</a> &mdash; We visit Intel to figure out what Clear Linux is all about and explain a few tricks that make it unique.</li><li><a title="LINUX Unplugged Blog: Clear Linux OS 2019" rel="nofollow" href="https://linuxunplugged.com/articles/clear-linux-os-2019">LINUX Unplugged Blog: Clear Linux OS 2019</a></li><li><a title="HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/hamr-dont-hurt-em-laser-assisted-hard-drives-are-coming-in-2020/">HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020</a> &mdash; Although the 2012 "just around the corner" HAMR drives seem to have been mostly vapor, the technology is a reality now. Seagate has been trialing 16TB HAMR drives with select customers for more than a year and claims that the trials have proved that its HAMR drives are "plug and play replacements" for traditional CMR drives, requiring no special care and having no particular poor use cases compared to the drives we're all used to.</li><li><a title="HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units" rel="nofollow" href="https://blog.seagate.com/craftsman-ship/hamr-milestone-seagate-achieves-16tb-capacity-on-internal-hamr-test-units/">HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units</a></li><li><a title="Western Digital debuts 18TB and 20TB near-MAMR disk drives" rel="nofollow" href="https://blocksandfiles.com/2019/09/03/western-digital-18tb-and-20tb-mamr-disk-drives/">Western Digital debuts 18TB and 20TB near-MAMR disk drives</a></li><li><a title="Previously on TechSNAP 341: HAMR Time" rel="nofollow" href="https://techsnap.systems/341">Previously on TechSNAP 341: HAMR Time</a> &mdash; We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details &amp; some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology &amp; take a mini deep dive into the world of elliptic curve cryptography.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>422: Multipath Musings</title>
  <link>https://techsnap.systems/422</link>
  <guid isPermaLink="false">7c9cef4d-3995-411c-9613-8e74e8156f5a</guid>
  <pubDate>Fri, 07 Feb 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7c9cef4d-3995-411c-9613-8e74e8156f5a.mp3" length="17013783" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.</itunes:subtitle>
  <itunes:duration>23:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. 
Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled history with certificate renewal. 
</description>
  <itunes:keywords>Automation, Let's Encrypt, SSL, TLS, CacheOut, Microsoft, Teams, Nagios, Monitoring, Linux, WireGuard, VPN, Edge, Edgium, browser wars, Chrome, blink, Chromium, Firefox, open standards, world wide web, Linux 5.6, Ubuntu 20.04, poly1305, Jason Donenfeld, networking, crypto, cryptography, mptcp, Multipath TCP, iOS, Apple, mobile, LTE, 5G, failover, 3GPP, Intel, speculative execution, ZombieLoad, TSX, SGX, cloud, virtualization, buffer overflow, stack smashing, stack canary, ASLR, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>421: Firewall Fun</title>
  <link>https://techsnap.systems/421</link>
  <guid isPermaLink="false">34f7722c-c7da-4f86-a8f9-14e67de6d899</guid>
  <pubDate>Fri, 24 Jan 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/34f7722c-c7da-4f86-a8f9-14e67de6d899.mp3" length="18463600" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </itunes:subtitle>
  <itunes:duration>25:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. 
Plus a look back at Apollo-era audio that's still relevant today with the surprising story of the Quindar tones. 
</description>
  <itunes:keywords>Windows, Windows Update, Patch Tuesday, Microsoft, cryptography, EternalBlue, crypt32.dll, CryptoAPI spoofing, RDP, RDP Gateway, RDP client, NSA, National Security Administration, patching, security, vulnerability, ECC, elliptic curve cryptography, Windows 10, certificate validation, OPNsense, pfSense, pf, BSD, iptables, Linux, Netgate, Netgear, networking, routing, security gateway, firewall appliance, x86, ARM, Unix, MITM, VPN, firewall, CVE-2020-0601, NASA, Apollo, moon, space, Quindar, Quindar Tones, phreaking, telephony, hacking, Captain Crunch whistle, 2600, nmap, Crystal Method, John Draper, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow" href="https://www.us-cert.gov/ncas/alerts/aa20-014a">Critical Vulnerabilities in Microsoft Windows Operating Systems</a></li><li><a title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow" href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a></li><li><a title="NSA discovers a serious flaw in Windows 10" rel="nofollow" href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/">NSA discovers a serious flaw in Windows 10</a></li><li><a title="Exploiting CVE-2020-0601" rel="nofollow" href="https://blog.sean-wright.com/exploiting-cve-2020-0601/">Exploiting CVE-2020-0601</a></li><li><a title="CVE-2020-0601 POC" rel="nofollow" href="https://github.com/ollypwn/cve-2020-0601">CVE-2020-0601 POC</a></li><li><a title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow" href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA Cybersecurity Advisory on CryptoAPI Flaw</a></li><li><a title="Why can’t I get to the internet on my new OPNsense install?! - Jim&#39;s Blog" rel="nofollow" href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a></li><li><a title="OPNsense: a true open source security platform and more" rel="nofollow" href="https://opnsense.org">OPNsense: a true open source security platform and more</a></li><li><a title="There&#39;s An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow" href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a></li><li><a title="Quindar Tones" rel="nofollow" href="https://www.hq.nasa.gov/alsj/quindar.html">Quindar Tones</a></li><li><a title="Cap&#39;n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow" href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow" href="https://www.us-cert.gov/ncas/alerts/aa20-014a">Critical Vulnerabilities in Microsoft Windows Operating Systems</a></li><li><a title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow" href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a></li><li><a title="NSA discovers a serious flaw in Windows 10" rel="nofollow" href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/">NSA discovers a serious flaw in Windows 10</a></li><li><a title="Exploiting CVE-2020-0601" rel="nofollow" href="https://blog.sean-wright.com/exploiting-cve-2020-0601/">Exploiting CVE-2020-0601</a></li><li><a title="CVE-2020-0601 POC" rel="nofollow" href="https://github.com/ollypwn/cve-2020-0601">CVE-2020-0601 POC</a></li><li><a title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow" href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA Cybersecurity Advisory on CryptoAPI Flaw</a></li><li><a title="Why can’t I get to the internet on my new OPNsense install?! - Jim&#39;s Blog" rel="nofollow" href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a></li><li><a title="OPNsense: a true open source security platform and more" rel="nofollow" href="https://opnsense.org">OPNsense: a true open source security platform and more</a></li><li><a title="There&#39;s An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow" href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a></li><li><a title="Quindar Tones" rel="nofollow" href="https://www.hq.nasa.gov/alsj/quindar.html">Quindar Tones</a></li><li><a title="Cap&#39;n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow" href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>413: The Coffee Shop Problem</title>
  <link>https://techsnap.systems/413</link>
  <guid isPermaLink="false">2c022259-3aec-490f-b2e3-0560336bafce</guid>
  <pubDate>Fri, 04 Oct 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2c022259-3aec-490f-b2e3-0560336bafce.mp3" length="23110449" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
</itunes:subtitle>
  <itunes:duration>32:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. 
</description>
  <itunes:keywords>DoH, DNS, HTTPS, TLS, SSL, DNS-over-HTTPS, Google, Mozilla, Firefox, Cloudflare, encryption, Windows, Chrome, MITM, Man-In-The-Middle, Quad-9, 1.1.1.1, 8.8.8.8, Cloudflare DNS, Google DNS, Wireguard, Wireguard VPN, VPN, WARP, privacy, anonymity, region shifting, mmproxy, tcp, tcp/ip, ip, forwarding, proxy, iptables, HTTP/3, QUIC, udp, 0-RTT, SPDY, networking, network protocol, curl, quiche, rust, chrome canary, canary, startpage, duckduckgo, google search, search engines, cookies, incognito, startmail, web proxy, Chromebook, chromebook support, lenovo, lenovo chromebook, security updates, Quantum computing, quantum computers, quantum supremacy, shor's algorithm, cryptography, public-key cryptography, AMD, AMD Ryzen, Ryzen PRO, Ryzen PRO 3000, memory encryption, devops, sysadmin podcast, jupiter broadcasting, linux academy, techsnap, guardmi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>412: Too Good To Be True</title>
  <link>https://techsnap.systems/412</link>
  <guid isPermaLink="false">d6b4d1e4-a600-45ff-bad6-5d1cd032a4af</guid>
  <pubDate>Fri, 20 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/d6b4d1e4-a600-45ff-bad6-5d1cd032a4af.mp3" length="24913525" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</itunes:subtitle>
  <itunes:duration>34:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.
Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution. 
</description>
  <itunes:keywords>QKD, Quantum key distribution, quantum cryptography, cryptography, security, Chromebooks, ChromeOS, Neverware, CloudreadyOS, google, security updates, 802.11ax, Wifi 5, Wifi 6, WPA3, Wifi, wireless, Sure-Fi, RF Chrip, spread spectrum, industrial iot, iot, the wifi challenge, sysadmin podcast, HVAC, networking, ethernet, low bandwidth, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</p>

<p>Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.</p><p>Links:</p><ul><li><a title="RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/rf-chirp-tech-long-distance-incredible-penetration-low-bandwidth/">RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica</a> &mdash; Recently, I took the company's technology for a spin with a pair of hand-held demo communicators about the size of a kid's walkie-talkie. They don't do much—just light up with a signal strength reading on both devices, whenever a transmit button on either is pressed—but that's enough to get a good indication of whether the tech will work to solve a given problem.</li><li><a title="Wi-Fi 6 Is Officially Here: Certification Program Begins" rel="nofollow" href="https://www.anandtech.com/show/14875/wifi-6-is-officially-here-certification-program-begins">Wi-Fi 6 Is Officially Here: Certification Program Begins</a> &mdash; Finally, along with the launch of the certification program itself, the Wi-Fi Alliance has already certified its first dozen devices. </li><li><a title="Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/say-hello-to-802-11ax-wi-fi-6-device-certification-begins-today/">Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica</a> &mdash; Today, the Wi-Fi Alliance launched its Wi-Fi Certified 6 program, which means that the standard has been completely finalized, and device manufacturers and OEMs can begin the process of having the organization certify their products to carry the Wi-Fi 6 branding.
</li><li><a title="Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge" rel="nofollow" href="https://www.theverge.com/2019/9/14/20865699/pixel-4-xl-leaked-photos-camera-specs">Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge</a></li><li><a title="iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/iphone-11-iphone-11-pro-and-iphone-11-pro-max-hands-on-with-apples-new-phones/">iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica</a></li><li><a title="Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/some-chromebooks-mistakenly-declared-themselves-end-of-life-last-week/">Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica</a> &mdash; A lot of Chromebook and Chromebox users don't realize this, but all ChromeOS devices have an expiration date. Google's original policy was for devices to be supported for five years, but the company has recently extended that time to 6.5 years.

</li><li><a title="LINUX Unplugged 318: Manjaro Levels Up" rel="nofollow" href="https://linuxunplugged.com/318">LINUX Unplugged 318: Manjaro Levels Up</a></li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica</a></li><li><a title="Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka" rel="nofollow" href="https://lahirumadushankablog.wordpress.com/2017/10/01/gentle-intro-to-quantum-key-distribution-qkd/">Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka</a></li><li><a title="The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/articles/2019-01-14/the-super-secure-quantum-cable-hiding-in-the-holland-tunnel">The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg</a> &mdash;  Banks and governments are testing quantum key distribution technology to guard their closest secrets.</li><li><a title="Quantum Key Distribution - QKD" rel="nofollow" href="https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/">Quantum Key Distribution - QKD</a> &mdash; This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature.</li><li><a title="TechSNAP 403: Keeping Systems Simple" rel="nofollow" href="https://techsnap.systems/403">TechSNAP 403: Keeping Systems Simple</a></li><li><a title="Linux Headlines" rel="nofollow" href="https://linuxheadlines.show/">Linux Headlines</a> &mdash; Linux and open source headlines every weekday, in under 3 minutes.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</p>

<p>Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.</p><p>Links:</p><ul><li><a title="RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/rf-chirp-tech-long-distance-incredible-penetration-low-bandwidth/">RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica</a> &mdash; Recently, I took the company's technology for a spin with a pair of hand-held demo communicators about the size of a kid's walkie-talkie. They don't do much—just light up with a signal strength reading on both devices, whenever a transmit button on either is pressed—but that's enough to get a good indication of whether the tech will work to solve a given problem.</li><li><a title="Wi-Fi 6 Is Officially Here: Certification Program Begins" rel="nofollow" href="https://www.anandtech.com/show/14875/wifi-6-is-officially-here-certification-program-begins">Wi-Fi 6 Is Officially Here: Certification Program Begins</a> &mdash; Finally, along with the launch of the certification program itself, the Wi-Fi Alliance has already certified its first dozen devices. </li><li><a title="Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/say-hello-to-802-11ax-wi-fi-6-device-certification-begins-today/">Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica</a> &mdash; Today, the Wi-Fi Alliance launched its Wi-Fi Certified 6 program, which means that the standard has been completely finalized, and device manufacturers and OEMs can begin the process of having the organization certify their products to carry the Wi-Fi 6 branding.
</li><li><a title="Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge" rel="nofollow" href="https://www.theverge.com/2019/9/14/20865699/pixel-4-xl-leaked-photos-camera-specs">Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge</a></li><li><a title="iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/iphone-11-iphone-11-pro-and-iphone-11-pro-max-hands-on-with-apples-new-phones/">iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica</a></li><li><a title="Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/some-chromebooks-mistakenly-declared-themselves-end-of-life-last-week/">Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica</a> &mdash; A lot of Chromebook and Chromebox users don't realize this, but all ChromeOS devices have an expiration date. Google's original policy was for devices to be supported for five years, but the company has recently extended that time to 6.5 years.

</li><li><a title="LINUX Unplugged 318: Manjaro Levels Up" rel="nofollow" href="https://linuxunplugged.com/318">LINUX Unplugged 318: Manjaro Levels Up</a></li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica</a></li><li><a title="Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka" rel="nofollow" href="https://lahirumadushankablog.wordpress.com/2017/10/01/gentle-intro-to-quantum-key-distribution-qkd/">Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka</a></li><li><a title="The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/articles/2019-01-14/the-super-secure-quantum-cable-hiding-in-the-holland-tunnel">The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg</a> &mdash;  Banks and governments are testing quantum key distribution technology to guard their closest secrets.</li><li><a title="Quantum Key Distribution - QKD" rel="nofollow" href="https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/">Quantum Key Distribution - QKD</a> &mdash; This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature.</li><li><a title="TechSNAP 403: Keeping Systems Simple" rel="nofollow" href="https://techsnap.systems/403">TechSNAP 403: Keeping Systems Simple</a></li><li><a title="Linux Headlines" rel="nofollow" href="https://linuxheadlines.show/">Linux Headlines</a> &mdash; Linux and open source headlines every weekday, in under 3 minutes.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>411: Mobile Security Mistakes</title>
  <link>https://techsnap.systems/411</link>
  <guid isPermaLink="false">b9fd8f0e-82a3-44bb-b373-eea0ac62412d</guid>
  <pubDate>Fri, 06 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/b9fd8f0e-82a3-44bb-b373-eea0ac62412d.mp3" length="21338406" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</itunes:subtitle>
  <itunes:duration>29:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs. 
</description>
  <itunes:keywords>iOS, iPhone, mobile, mobile apps, app security, Apple, jailbreak, security, mobile security, exploit chain, zeroday, project zero, google, libxpc, IPC, webkit, malware, android, v4l2, video4linux, privilege escalation, AMD, Epyc, NUMA, benchmarks, exploit market, Zerodium, cpu load balancing, linux, open source, USB, USB4, USB-C, Thunderbolt, USB Power Delivery, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>410: Epyc Encryption</title>
  <link>https://techsnap.systems/410</link>
  <guid isPermaLink="false">31d2ecad-fd20-405f-bbbe-e2e6bc566e0c</guid>
  <pubDate>Fri, 23 Aug 2019 00:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/31d2ecad-fd20-405f-bbbe-e2e6bc566e0c.mp3" length="36093724" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.</itunes:subtitle>
  <itunes:duration>50:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.
Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack. 
</description>
  <itunes:keywords>AMD, AMD rome, amd epyc, CPU, intel, comet lake, ice lake, cpu benchmarks, SGX, SEV, SEM, security, encryption, virtualization, memory encryption, intel me, amd psp, windows, text services framework, ctftool security, bluekeep, rdp, vulnerabilities, worms, bluetooth, entropy, bruteforce, KNOB, knob attack, https, ssl, tls, ev certs, extended validation, ssl certifications, certificate lifespace, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s CPU release season and we get excited about AMD&#39;s new line of server chips. Plus our take on AMD&#39;s approach to memory encryption, and our struggle to make sense of Intel&#39;s Comet Lake line.</p>

<p>Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack.</p><p>Links:</p><ul><li><a title="A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/08/a-detailed-look-at-amds-new-epyc-rome-7nm-server-cpus/">A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica</a> &mdash; The short version of the story is, Epyc "Rome" is to the server what Ryzen 3000 was to the desktop—bringing significantly improved IPC, more cores, and better thermal efficiency than either its current-generation Intel equivalents or its first-generation Epyc predecessors.</li><li><a title="AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked" rel="nofollow" href="https://www.anandtech.com/show/14694/amd-rome-epyc-2nd-gen">AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked</a> &mdash; Ever since the Opteron days, AMD's market share has been rounded to zero percent, and with its first generation of EPYC processors using its new Zen microarchitecture, that number skipped up a small handful of points, but everyone has been waiting with bated breath for the second swing at the ball. AMD's Rome platform solves the concerns that first gen Naples had, plus this CPU family is designed to do many things: a new CPU microarchitecture on 7nm, offer up to 64 cores, offer 128 lanes of PCIe 4.0, offer 8 memory channels, and offer a unified memory architecture based on chiplets. </li><li><a title="AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=epyc-rome-mitigations&amp;num=1">AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix</a> &mdash; Out of curiosity, I've run some unmitigated benchmarks for the various relevant CPU speculative execution vulnerabilities on both the Intel Xeon Platinum 8280 Cascadelake and AMD EPYC 7742 Rome processors for seeing how the performance differs.</li><li><a title="Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/08/intels-line-of-notebook-cpus-gets-more-confusing-with-14nm-comet-lake/">Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica</a> &mdash; Going by Intel's numbers, Comet Lake looks like a competent upgrade to its predecessor Whiskey Lake. The interesting question—and one largely left unanswered by Intel—is why the company has decided to launch a new line of 14nm notebook CPUs less than a month after launching Ice Lake, its first 10nm notebook CPUs.</li><li><a title="A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/08/a-look-at-the-windows-10-exploit-google-zero-disclosed-this-week/">A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica</a> &mdash; On Tuesday, Tavis Ormandy of Google's Project Zero released an exploit kit called ctftool, which uses and abuses Microsoft's Text Services Framework in ways that can effectively get anyone root—er, system that is—on any unpatched Windows 10 system they're able to log in to</li><li><a title="Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center" rel="nofollow" href="https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/">Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center</a> &mdash; Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.

</li><li><a title="KNOB Attack" rel="nofollow" href="https://knobattack.com/">KNOB Attack</a> &mdash; TL;DR: The specification of Bluetooth includes an encryption key negotiation protocol that allows to negotiate encryption keys with 1 Byte of entropy without protecting the integrity of the negotiation process. A remote attacker can manipulate the entropy negotiation to let any standard compliant Bluetooth device negotiate encryption keys with 1 byte of entropy and then brute force the low entropy keys in real time.
</li><li><a title="Troy Hunt: Extended Validation Certificates are (Really, Really) Dead" rel="nofollow" href="https://www.troyhunt.com/extended-validation-certificates-are-really-really-dead/">Troy Hunt: Extended Validation Certificates are (Really, Really) Dead</a> &mdash; With both browsers auto-updating for most people, we're about 10 weeks out from no more EV and the vast majority of web users no longer seeing something they didn't even know was there to begin with! Oh sure, you can still drill down into the certificate and see the entity name, but who's really going to do that? You and I, perhaps, but we're not exactly in the meat of the browser demographics.</li><li><a title="Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/">Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet</a> &mdash; Scott Helme argues that the security benefits of shorter SSL certificate lifespans have nothing to do with phishing or malware sites, but instead with the SSL certificate revocation process. Helme claims that this process is broken and that bad SSL certificates continue to live on for years after being mississued and revoked.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s CPU release season and we get excited about AMD&#39;s new line of server chips. Plus our take on AMD&#39;s approach to memory encryption, and our struggle to make sense of Intel&#39;s Comet Lake line.</p>

<p>Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack.</p><p>Links:</p><ul><li><a title="A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/08/a-detailed-look-at-amds-new-epyc-rome-7nm-server-cpus/">A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica</a> &mdash; The short version of the story is, Epyc "Rome" is to the server what Ryzen 3000 was to the desktop—bringing significantly improved IPC, more cores, and better thermal efficiency than either its current-generation Intel equivalents or its first-generation Epyc predecessors.</li><li><a title="AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked" rel="nofollow" href="https://www.anandtech.com/show/14694/amd-rome-epyc-2nd-gen">AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked</a> &mdash; Ever since the Opteron days, AMD's market share has been rounded to zero percent, and with its first generation of EPYC processors using its new Zen microarchitecture, that number skipped up a small handful of points, but everyone has been waiting with bated breath for the second swing at the ball. AMD's Rome platform solves the concerns that first gen Naples had, plus this CPU family is designed to do many things: a new CPU microarchitecture on 7nm, offer up to 64 cores, offer 128 lanes of PCIe 4.0, offer 8 memory channels, and offer a unified memory architecture based on chiplets. </li><li><a title="AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=epyc-rome-mitigations&amp;num=1">AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix</a> &mdash; Out of curiosity, I've run some unmitigated benchmarks for the various relevant CPU speculative execution vulnerabilities on both the Intel Xeon Platinum 8280 Cascadelake and AMD EPYC 7742 Rome processors for seeing how the performance differs.</li><li><a title="Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/08/intels-line-of-notebook-cpus-gets-more-confusing-with-14nm-comet-lake/">Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica</a> &mdash; Going by Intel's numbers, Comet Lake looks like a competent upgrade to its predecessor Whiskey Lake. The interesting question—and one largely left unanswered by Intel—is why the company has decided to launch a new line of 14nm notebook CPUs less than a month after launching Ice Lake, its first 10nm notebook CPUs.</li><li><a title="A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/08/a-look-at-the-windows-10-exploit-google-zero-disclosed-this-week/">A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica</a> &mdash; On Tuesday, Tavis Ormandy of Google's Project Zero released an exploit kit called ctftool, which uses and abuses Microsoft's Text Services Framework in ways that can effectively get anyone root—er, system that is—on any unpatched Windows 10 system they're able to log in to</li><li><a title="Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center" rel="nofollow" href="https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/">Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center</a> &mdash; Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.

</li><li><a title="KNOB Attack" rel="nofollow" href="https://knobattack.com/">KNOB Attack</a> &mdash; TL;DR: The specification of Bluetooth includes an encryption key negotiation protocol that allows to negotiate encryption keys with 1 Byte of entropy without protecting the integrity of the negotiation process. A remote attacker can manipulate the entropy negotiation to let any standard compliant Bluetooth device negotiate encryption keys with 1 byte of entropy and then brute force the low entropy keys in real time.
</li><li><a title="Troy Hunt: Extended Validation Certificates are (Really, Really) Dead" rel="nofollow" href="https://www.troyhunt.com/extended-validation-certificates-are-really-really-dead/">Troy Hunt: Extended Validation Certificates are (Really, Really) Dead</a> &mdash; With both browsers auto-updating for most people, we're about 10 weeks out from no more EV and the vast majority of web users no longer seeing something they didn't even know was there to begin with! Oh sure, you can still drill down into the certificate and see the entity name, but who's really going to do that? You and I, perhaps, but we're not exactly in the meat of the browser demographics.</li><li><a title="Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/">Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet</a> &mdash; Scott Helme argues that the security benefits of shorter SSL certificate lifespans have nothing to do with phishing or malware sites, but instead with the SSL certificate revocation process. Helme claims that this process is broken and that bad SSL certificates continue to live on for years after being mississued and revoked.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>409: Privacy Perspectives</title>
  <link>https://techsnap.systems/409</link>
  <guid isPermaLink="false">fb83ed86-b76d-4837-ac24-17ceb1f787aa</guid>
  <pubDate>Fri, 09 Aug 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fb83ed86-b76d-4837-ac24-17ceb1f787aa.mp3" length="28249466" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</itunes:subtitle>
  <itunes:duration>39:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.
Plus Apple's blaring bluetooth beacons and Facebook's worrying plans for WhatsApp. 
</description>
  <itunes:keywords>Privacy, privacy badger, ghostery, incognito, private browsing, canvas, webgl, VPN, wireguard, openvpn, browser fingerprinting, panopticlick, amiunique, apple, bluetooth, bluetooth le, bleee, mozilla, firefox, chrome, google, ad-blocking, advertising, adblock plus, ublock, ublock origin, facebook, WhatsApp, encryption, encryption debate, iphone, iOS, security, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p><p>Links:</p><ul><li><a title="Apple bleee. Everyone knows What Happens on Your iPhone – hexway" rel="nofollow" href="https://hexway.io/blog/apple-bleee/">Apple bleee. Everyone knows What Happens on Your iPhone – hexway</a> &mdash; If Bluetooth is ON on your Apple device everyone nearby can understand current status of your device, get info about battery, device name, Wi-Fi status, buffer availability, OS version and even get your mobile phone number

</li><li><a title="Facebook Plans on Backdooring WhatsApp - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/08/facebook_plans_.html">Facebook Plans on Backdooring WhatsApp - Schneier on Security</a> &mdash; In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

</li><li><a title="Signal" rel="nofollow" href="https://signal.org/">Signal</a> &mdash; Privacy that fits in your pocket.
</li><li><a title="xkcd: Security" rel="nofollow" href="https://xkcd.com/538/">xkcd: Security</a> &mdash; Turns out it's a $5 wrench, even better!</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet/status/1152281183692185600">Jim Salter on Twitter</a> &mdash; I wonder why #privacy wonks aren't talking about browser fingerprinting more frequently? Privacy Badger, Ghostery, etc don't do a damn thing to prevent or mitigate Canvas / WebGL #fingerprinting.
</li><li><a title="Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy" rel="nofollow" href="https://pixelprivacy.com/resources/browser-fingerprinting/">Browser Fingerprinting: What Is It and What Should You Do About It? - PixelPrivacy</a> &mdash; Browser fingerprinting is a powerful method that websites use to collect information about your browser type and version, as well as your operating system, active plugins, timezone, language, screen resolution and various other active settings.</li><li><a title="Canvas Fingerprinting - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/canvas">Canvas Fingerprinting - BrowserLeaks.com</a> &mdash; The technique is based on the fact that the same canvas image may be rendered differently in different computers. This happens for several reasons. At the image format level – web browsers uses different image processing engines, image export options, compression level, the final images may got different checksum even if they are pixel-identical. At the system level – operating systems have different fonts, they use different algorithms and settings for anti-aliasing and sub-pixel rendering.

</li><li><a title="WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com" rel="nofollow" href="https://browserleaks.com/webgl">WebGL Browser Report - WebGL Fingerprinting - WebGL 2 Test - BrowserLeaks.com</a> &mdash; WebGL Browser Report checks WebGL support in your web browser, produce WebGL Device Fingerprinting, and shows the other WebGL and GPU capabilities more or less related web browser identity.

</li><li><a title="AmIUnique" rel="nofollow" href="https://amiunique.org/faq">AmIUnique</a> &mdash; Device fingerprinting or browser fingerprinting is the systematic collection of information about a remote device, for identification purposes. Client-side scripting languages allow the development of procedures to collect very rich fingerprints: browser and operating system type and version, screen resolution, architecture type, lists of fonts, plugins, microphone, camera, etc.

</li><li><a title="Panopticlick" rel="nofollow" href="https://panopticlick.eff.org/">Panopticlick</a> &mdash; Panopticlick will analyze how well your browser and add-ons protect you against online tracking techniques. We’ll also see if your system is uniquely configured—and thus identifiable—even if you are using privacy-protective software. However, we only do so with your explicit consent, through the TEST ME button below.

</li><li><a title="How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/07/researchers-investigate-whether-major-advertisers-track-porn-habits-seems-likely/">How private is your browser’s Private mode? Research into porn suggests “not very” | Ars Technica</a> &mdash; This leaves browser fingerprinting as a method to tie your profiles together—and unfortunately, Incognito mode doesn't appear to help. </li><li><a title="Privacy Tools - Encryption Against Global Mass Surveillance" rel="nofollow" href="https://www.privacytools.io/">Privacy Tools - Encryption Against Global Mass Surveillance</a> &mdash; You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

</li><li><a title="‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times" rel="nofollow" href="https://www.nytimes.com/2019/07/03/technology/personaltech/fingerprinting-track-devices-what-to-do.html">‘Fingerprinting’ to Track Us Online Is on the Rise. Here’s What to Do. - The New York Times</a> &mdash; Fingerprinting involves looking at the many characteristics of your mobile device or computer, like the screen resolution, operating system and model, and triangulating this information to pinpoint and follow you as you browse the web and use apps. Once enough device characteristics are known, the theory goes, the data can be assembled into a profile that helps identify you the way a fingerprint would.</li><li><a title="Digital &#39;Fingerprinting&#39; Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios" rel="nofollow" href="https://www.wnycstudios.org/story/digital-fingerprinting-next-generation-tracking-technology">Digital 'Fingerprinting' Is The Next Generation Tracking Technology | The Takeaway | WNYC Studios</a> &mdash; This growing technology is almost invisible, making it impossible for users to opt-out of the tracking system. As it becomes more popular, tech companies are developing new ways to try and protect consumers from this form of tracking. But is it going to work?

</li><li><a title="New Warning Issued Over Google&#39;s Chrome Ad-Blocking Plans" rel="nofollow" href="https://www.forbes.com/sites/kateoflahertyuk/2019/08/01/warning-issued-over-google-chrome-ad-blocking-plans/#7b020974219a">New Warning Issued Over Google's Chrome Ad-Blocking Plans</a> &mdash; The plans, dubbed Manifest V3, represent a major transformation to Chrome extensions including a revamp of the permissions system. As a result, modern ad blockers such as uBlock Origin—which uses Chrome’s webRequest API to block ads before they’re downloaded–won’t work. </li><li><a title="Comment on Chrome extension manifest v3 proposal by gorhill" rel="nofollow" href="https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417">Comment on Chrome extension manifest v3 proposal by gorhill</a> &mdash; The blocking ability of the webRequest API is still deprecated, and Google Chrome's limited matching algorithm will be the only one possible, and with limits dictated by Google employees.

It's annoying that they keep saying "the webRequest API is not deprecated" as if developers have been worried about this -- and as if they want to drown the real issue in a fabricated one nobody made.</li><li><a title="CanvasBlocker" rel="nofollow" href="https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/">CanvasBlocker</a></li><li><a title="Ghostery" rel="nofollow" href="https://www.ghostery.com/">Ghostery</a></li><li><a title="Disconnect" rel="nofollow" href="https://disconnect.me/">Disconnect</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>403: Keeping Systems Simple</title>
  <link>https://techsnap.systems/403</link>
  <guid isPermaLink="false">e26c9e2a-3e0f-40b9-9875-d72821ee1792</guid>
  <pubDate>Fri, 10 May 2019 21:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e26c9e2a-3e0f-40b9-9875-d72821ee1792.mp3" length="33509482" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</itunes:subtitle>
  <itunes:duration>46:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems. 
</description>
  <itunes:keywords>wireguard, vpn, openvpn, tinc, ipsec, lfnw, tunnel, ssh, mesh network, layer 3, tcp, udp, dhcp, ethernet, vlan, switch, router, firewall, kubernetes, linux, wintun, high availability, reliability, availability, disaster recovery, rto, rpo, security, quantum computers, cryptography, simplicity, SysAdmin podcast, subspace, zinc, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>402: Snapshot Sanity</title>
  <link>https://techsnap.systems/402</link>
  <guid isPermaLink="false">fbd74a16-dc81-4558-b87a-ff25a23a3669</guid>
  <pubDate>Thu, 25 Apr 2019 16:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fbd74a16-dc81-4558-b87a-ff25a23a3669.mp3" length="22728016" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.</itunes:subtitle>
  <itunes:duration>31:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.
Plus some handy tools to manage your snapshots, rsync war stories, and more! 
</description>
  <itunes:keywords>zfs, openzfs, zfs on linux, ZoL, snapshots, replication, sanoid, syncoid, policy based, snapshot management, copy on write, functional filesystem, toml, linked list, data integrity, crash consistent, atomic, atomic snapshot, rsync, cron, filesystems, warstories, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.</p>

<p>Plus some handy tools to manage your snapshots, rsync war stories, and more!</p><p>Links:</p><ul><li><a title="sanoid: Policy-driven snapshot management and replication tools." rel="nofollow" href="https://github.com/jimsalterjrs/sanoid">sanoid: Policy-driven snapshot management and replication tools.</a> &mdash; Sanoid is a policy-driven snapshot management tool for ZFS filesystems. When combined with the Linux KVM hypervisor, you can use it to make your systems functionally immortal.

</li><li><a title="Syncoid" rel="nofollow" href="https://github.com/jimsalterjrs/sanoid#syncoid">Syncoid</a> &mdash; Sanoid also includes a replication tool, syncoid, which facilitates the asynchronous incremental replication of ZFS filesystems. </li><li><a title="Copy-on-write - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Copy-on-write">Copy-on-write - Wikipedia</a></li><li><a title="ZFS Paper" rel="nofollow" href="https://www.cpp.edu/~gkuri/classes/ece426/ZFS.pdf">ZFS Paper</a></li><li><a title="The Magic Behind APFS: Copy-On-Write" rel="nofollow" href="https://mac-optimization.bestreviews.net/the-magic-behind-apfs-copy-on-write/">The Magic Behind APFS: Copy-On-Write</a> &mdash; The brand-new Apple File System (APFS) that landed with macOS High Sierra brings a handful of important new features that rely on a technique called copy-on-write (CoW).</li><li><a title="Chapter 19. The Z File System (ZFS)" rel="nofollow" href="https://www.freebsd.org/doc/handbook/zfs.html">Chapter 19. The Z File System (ZFS)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.</p>

<p>Plus some handy tools to manage your snapshots, rsync war stories, and more!</p><p>Links:</p><ul><li><a title="sanoid: Policy-driven snapshot management and replication tools." rel="nofollow" href="https://github.com/jimsalterjrs/sanoid">sanoid: Policy-driven snapshot management and replication tools.</a> &mdash; Sanoid is a policy-driven snapshot management tool for ZFS filesystems. When combined with the Linux KVM hypervisor, you can use it to make your systems functionally immortal.

</li><li><a title="Syncoid" rel="nofollow" href="https://github.com/jimsalterjrs/sanoid#syncoid">Syncoid</a> &mdash; Sanoid also includes a replication tool, syncoid, which facilitates the asynchronous incremental replication of ZFS filesystems. </li><li><a title="Copy-on-write - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Copy-on-write">Copy-on-write - Wikipedia</a></li><li><a title="ZFS Paper" rel="nofollow" href="https://www.cpp.edu/~gkuri/classes/ece426/ZFS.pdf">ZFS Paper</a></li><li><a title="The Magic Behind APFS: Copy-On-Write" rel="nofollow" href="https://mac-optimization.bestreviews.net/the-magic-behind-apfs-copy-on-write/">The Magic Behind APFS: Copy-On-Write</a> &mdash; The brand-new Apple File System (APFS) that landed with macOS High Sierra brings a handful of important new features that rely on a technique called copy-on-write (CoW).</li><li><a title="Chapter 19. The Z File System (ZFS)" rel="nofollow" href="https://www.freebsd.org/doc/handbook/zfs.html">Chapter 19. The Z File System (ZFS)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>401: Everyday ZFS</title>
  <link>https://techsnap.systems/401</link>
  <guid isPermaLink="false">ea1f89db-e748-47fd-b288-833a330704ce</guid>
  <pubDate>Thu, 11 Apr 2019 22:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/ea1f89db-e748-47fd-b288-833a330704ce.mp3" length="34263376" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</itunes:subtitle>
  <itunes:duration>47:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.
Plus when not to use ZFS, the surprising way your disks are lying to you, and more! 
</description>
  <itunes:keywords>zfs, vdez, filesystems, sun microsystems, backups, snapshots, copy on write, throughput, iops, linux, GPL, CDDL, ZFS on Linux, ZoL, ashift, SSD, techSNAP, sysadmin podcast, DevOps, data integrity, checksum, ECC, hard drives, hard disks, FreeBSD, OpenZF S, Solaris, RAID, raidz, zfs on root, ubuntu, copyleft</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</p>

<p>Plus when not to use ZFS, the surprising way your disks are lying to you, and more!</p><p>Links:</p><ul><li><a title="ZFS - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/ZFS">ZFS - Ubuntu Wiki</a> &mdash; ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.</li><li><a title="Performance tuning - OpenZFS" rel="nofollow" href="http://open-zfs.org/wiki/Performance_tuning#Alignment_shift">Performance tuning - OpenZFS</a> &mdash; Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</p>

<p>Plus when not to use ZFS, the surprising way your disks are lying to you, and more!</p><p>Links:</p><ul><li><a title="ZFS - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/ZFS">ZFS - Ubuntu Wiki</a> &mdash; ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.</li><li><a title="Performance tuning - OpenZFS" rel="nofollow" href="http://open-zfs.org/wiki/Performance_tuning#Alignment_shift">Performance tuning - OpenZFS</a> &mdash; Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>400: Supply Chain Attacks</title>
  <link>https://techsnap.systems/400</link>
  <guid isPermaLink="false">c46ae690-b668-4708-a781-8e923bc4baf4</guid>
  <pubDate>Thu, 28 Mar 2019 20:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c46ae690-b668-4708-a781-8e923bc4baf4.mp3" length="23436770" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</itunes:subtitle>
  <itunes:duration>32:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.
Plus an update from the linux vendor firmware service, your feedback, and more! 
</description>
  <itunes:keywords>ASUS, ASUS Malware, ShadowHammer, ASUS Live Update firmware, shadowpad, cccleaner, badusb, ssd firmware, microcontroller, reflections on trusting trust, compiler, c runtime, UEFI, BIOS, intel management engine, machine learning, unsupervised learning, malware, backdoor, command and control server, mac address, windows, linux, linux vendor firmware service, fwupd, package managers, node, npm, python, pypi, ken thompson, supply chain, supply chain attacks, gigabyte, hardware manufacturers, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</p>

<p>Plus an update from the linux vendor firmware service, your feedback, and more!</p><p>Links:</p><ul><li><a title="Joren Verspeurt on Twitter" rel="nofollow" href="https://twitter.com/JorenYuuji/status/1109040022341275648">Joren Verspeurt on Twitter</a> &mdash; The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.</li><li><a title="Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers" rel="nofollow" href="https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers">Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers</a> &mdash; The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.</li><li><a title="Malicious updates for ASUS laptops" rel="nofollow" href="https://www.kaspersky.com/blog/shadow-hammer-teaser/26149/">Malicious updates for ASUS laptops</a> &mdash; A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.</li><li><a title="Asus Live Update Patch Now Availabile" rel="nofollow" href="https://www.theregister.co.uk/2019/03/26/asus_live_update_patch/">Asus Live Update Patch Now Availabile</a> &mdash; Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.</li><li><a title="ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups" rel="nofollow" href="https://www.asus.com/News/hqfgVUyZ6uyAyJe1">ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups</a> &mdash; ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.</li><li><a title="The Messy Truth About Infiltrating Computer Supply Chains" rel="nofollow" href="https://theintercept.com/2019/01/24/computer-supply-chain-attacks/">The Messy Truth About Infiltrating Computer Supply Chains</a> &mdash; The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”</li><li><a title="Inside the Unnerving CCleaner Supply Chain Attack" rel="nofollow" href="https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/">Inside the Unnerving CCleaner Supply Chain Attack</a> &mdash; Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.</li><li><a title="ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/2017_shadowpad-how-attackers-hide-backdoor-in-software-used-by-hundreds-of-large-companies-around-the-world">ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World</a> &mdash; ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. </li><li><a title="Gaming industry still in the scope of attackers in Asia" rel="nofollow" href="https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/">Gaming industry still in the scope of attackers in Asia</a> &mdash; Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.</li><li><a title="Microsoft Security Intelligence Report Volume 24 is now available" rel="nofollow" href="https://www.microsoft.com/security/blog/2019/02/28/microsoft-security-intelligence-report-volume-24-is-now-available/">Microsoft Security Intelligence Report Volume 24 is now available</a> &mdash; Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.</li><li><a title="Microsoft Security Intelligence Report Volume 24" rel="nofollow" href="https://clouddamcdnprodep.azureedge.net/gdc/gdcVAOQd7/original">Microsoft Security Intelligence Report Volume 24</a></li><li><a title="Supply Chain Attacks Spiked 78 Percent in 2018" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2019/02/supply-chain-attacks-spiked-78-percent-2018-cyber-researchers-found/154996/">Supply Chain Attacks Spiked 78 Percent in 2018</a></li><li><a title="Supply Chain Security: A Talk by Bunnie Huang" rel="nofollow" href="https://www.bunniestudios.com/blog/?p=5519">Supply Chain Security: A Talk by Bunnie Huang</a> &mdash; I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.</li><li><a title="Attack inception: Compromised supply chain within a supply chain poses new risk" rel="nofollow" href="https://www.microsoft.com/security/blog/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/">Attack inception: Compromised supply chain within a supply chain poses new risk</a> &mdash; The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.</li><li><a title="Supply Chain Attacks and Secure Software Updates" rel="nofollow" href="https://paragonie.com/blog/2017/09/supply-chain-attacks-and-secure-software-updates">Supply Chain Attacks and Secure Software Updates</a> &mdash; In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.</li><li><a title="Bad USB, Very Bad USB" rel="nofollow" href="https://lmgsecurity.com/bad-usb-very-bad-usb/">Bad USB, Very Bad USB</a> &mdash; The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.</li><li><a title="Reflections on Trusting Trust by Ken Thompson" rel="nofollow" href="https://dl.acm.org/citation.cfm?id=358210">Reflections on Trusting Trust by Ken Thompson</a></li><li><a title="LVFS Project Announcement - The Linux Foundation" rel="nofollow" href="https://www.linuxfoundation.org/blog/2019/03/lvfs-project-announcement/">LVFS Project Announcement - The Linux Foundation</a> &mdash; The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.</li><li><a title="LVFS: Vendor Status" rel="nofollow" href="https://fwupd.org/vendorlist">LVFS: Vendor Status</a></li><li><a title="Two new supply-chain attacks come to light in less than a week" rel="nofollow" href="https://arstechnica.com/information-technology/2018/10/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week/">Two new supply-chain attacks come to light in less than a week</a> &mdash; Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.</li><li><a title="Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months" rel="nofollow" href="https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/">Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</p>

<p>Plus an update from the linux vendor firmware service, your feedback, and more!</p><p>Links:</p><ul><li><a title="Joren Verspeurt on Twitter" rel="nofollow" href="https://twitter.com/JorenYuuji/status/1109040022341275648">Joren Verspeurt on Twitter</a> &mdash; The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.</li><li><a title="Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers" rel="nofollow" href="https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers">Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers</a> &mdash; The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.</li><li><a title="Malicious updates for ASUS laptops" rel="nofollow" href="https://www.kaspersky.com/blog/shadow-hammer-teaser/26149/">Malicious updates for ASUS laptops</a> &mdash; A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.</li><li><a title="Asus Live Update Patch Now Availabile" rel="nofollow" href="https://www.theregister.co.uk/2019/03/26/asus_live_update_patch/">Asus Live Update Patch Now Availabile</a> &mdash; Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.</li><li><a title="ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups" rel="nofollow" href="https://www.asus.com/News/hqfgVUyZ6uyAyJe1">ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups</a> &mdash; ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.</li><li><a title="The Messy Truth About Infiltrating Computer Supply Chains" rel="nofollow" href="https://theintercept.com/2019/01/24/computer-supply-chain-attacks/">The Messy Truth About Infiltrating Computer Supply Chains</a> &mdash; The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”</li><li><a title="Inside the Unnerving CCleaner Supply Chain Attack" rel="nofollow" href="https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/">Inside the Unnerving CCleaner Supply Chain Attack</a> &mdash; Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.</li><li><a title="ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/2017_shadowpad-how-attackers-hide-backdoor-in-software-used-by-hundreds-of-large-companies-around-the-world">ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World</a> &mdash; ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. </li><li><a title="Gaming industry still in the scope of attackers in Asia" rel="nofollow" href="https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/">Gaming industry still in the scope of attackers in Asia</a> &mdash; Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.</li><li><a title="Microsoft Security Intelligence Report Volume 24 is now available" rel="nofollow" href="https://www.microsoft.com/security/blog/2019/02/28/microsoft-security-intelligence-report-volume-24-is-now-available/">Microsoft Security Intelligence Report Volume 24 is now available</a> &mdash; Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.</li><li><a title="Microsoft Security Intelligence Report Volume 24" rel="nofollow" href="https://clouddamcdnprodep.azureedge.net/gdc/gdcVAOQd7/original">Microsoft Security Intelligence Report Volume 24</a></li><li><a title="Supply Chain Attacks Spiked 78 Percent in 2018" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2019/02/supply-chain-attacks-spiked-78-percent-2018-cyber-researchers-found/154996/">Supply Chain Attacks Spiked 78 Percent in 2018</a></li><li><a title="Supply Chain Security: A Talk by Bunnie Huang" rel="nofollow" href="https://www.bunniestudios.com/blog/?p=5519">Supply Chain Security: A Talk by Bunnie Huang</a> &mdash; I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.</li><li><a title="Attack inception: Compromised supply chain within a supply chain poses new risk" rel="nofollow" href="https://www.microsoft.com/security/blog/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/">Attack inception: Compromised supply chain within a supply chain poses new risk</a> &mdash; The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.</li><li><a title="Supply Chain Attacks and Secure Software Updates" rel="nofollow" href="https://paragonie.com/blog/2017/09/supply-chain-attacks-and-secure-software-updates">Supply Chain Attacks and Secure Software Updates</a> &mdash; In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.</li><li><a title="Bad USB, Very Bad USB" rel="nofollow" href="https://lmgsecurity.com/bad-usb-very-bad-usb/">Bad USB, Very Bad USB</a> &mdash; The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.</li><li><a title="Reflections on Trusting Trust by Ken Thompson" rel="nofollow" href="https://dl.acm.org/citation.cfm?id=358210">Reflections on Trusting Trust by Ken Thompson</a></li><li><a title="LVFS Project Announcement - The Linux Foundation" rel="nofollow" href="https://www.linuxfoundation.org/blog/2019/03/lvfs-project-announcement/">LVFS Project Announcement - The Linux Foundation</a> &mdash; The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.</li><li><a title="LVFS: Vendor Status" rel="nofollow" href="https://fwupd.org/vendorlist">LVFS: Vendor Status</a></li><li><a title="Two new supply-chain attacks come to light in less than a week" rel="nofollow" href="https://arstechnica.com/information-technology/2018/10/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week/">Two new supply-chain attacks come to light in less than a week</a> &mdash; Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.</li><li><a title="Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months" rel="nofollow" href="https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/">Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>399: Ethics in AI</title>
  <link>https://techsnap.systems/399</link>
  <guid isPermaLink="false">6a9e036e-abe5-4b0c-b727-2d3dab34ce1d</guid>
  <pubDate>Fri, 15 Mar 2019 19:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/6a9e036e-abe5-4b0c-b727-2d3dab34ce1d.mp3" length="27942893" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</itunes:subtitle>
  <itunes:duration>38:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems. 
</description>
  <itunes:keywords>machine learning, AI, expert systems, supervised learning, unsupervised learning, neural networks, bias, racism, zo, tay, reinforcement learning, python, algorithms, programming, data, privacy, server builds, plaintext offenders, CivicPlus, passwords, computer vision, natural language processing, classification, GloVe, word2vec, scikit-learn, Robyn Speer, ConceptNet, SysAdmin podcast, DevOps, TechSNAP, chatbot</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</p><p>Links:</p><ul><li><a title="Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants" rel="nofollow" href="https://www.technologyreview.com/s/610634/microsofts-neo-nazi-sexbot-was-a-great-lesson-for-makers-of-ai-assistants/">Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants</a> &mdash; What started out as an entertaining social experiment—get regular people to talk to a chatbot so it could learn while they, hopefully, had fun—became a nightmare for Tay’s creators. Users soon figured out how to make Tay say awful things. Microsoft took the chatbot offline after less than a day.</li><li><a title="Microsoft&#39;s Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse" rel="nofollow" href="https://qz.com/1340990/microsofts-politically-correct-chat-bot-is-even-worse-than-its-racist-one/">Microsoft's Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse</a> &mdash; A few months after Tay’s disastrous debut, Microsoft quietly released Zo, a second English-language chatbot available on Messenger, Kik, Skype, Twitter, and Groupme.</li><li><a title="How to make a racist AI without really trying | ConceptNet blog" rel="nofollow" href="http://blog.conceptnet.io/posts/2017/how-to-make-a-racist-ai-without-really-trying/">How to make a racist AI without really trying | ConceptNet blog</a> &mdash; Some people expect that fighting algorithmic racism is going to come with some sort of trade-off. There’s no trade-off here. You can have data that’s better and less racist. You can have data that’s better because it’s less racist. There was never anything “accurate” about the overt racism that word2vec and GloVe learned.</li><li><a title="Microsoft warned investors that biased or flawed AI could hurt the company’s image" rel="nofollow" href="https://qz.com/1542377/microsoft-warned-investors-that-biased-or-flawed-ai-could-hurt-the-companys-image/">Microsoft warned investors that biased or flawed AI could hurt the company’s image</a> &mdash; Notably, this addition comes after a research paper by MIT Media Lab graduate researcher Joy Buolamwini showed in February 2018 that Microsoft’s facial recognition algorithm’s was less accurate for women and people of color. In response, Microsoft updated its facial recognition models, and wrote a blog post about how it was addressing bias in its software.</li><li><a title="AI bias: It is the responsibility of humans to ensure fairness" rel="nofollow" href="https://www.information-age.com/ai-bias-123479217/">AI bias: It is the responsibility of humans to ensure fairness</a> &mdash; Amazon recently pulled the plug on its experimental AI-powered recruitment engine when it was discovered that the machine learning technology behind it was exhibiting bias against female applicants.</li><li><a title="California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias" rel="nofollow" href="https://www.newsweek.com/california-police-artificial-intelligence-predictive-policing-predpol-santa-1358508">California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias</a> &mdash; “The potential for bias to creep into the deployment of the tools is enormous. Simply put, the devil is in the data,” Vincent Southerland, executive director of the Center on Race, Inequality, and the Law at NYU School of Law, wrote for the American Civil Liberties Union last year.

</li><li><a title="A.I. Could Worsen Health Disparities" rel="nofollow" href="https://www.nytimes.com/2019/01/31/opinion/ai-bias-healthcare.html">A.I. Could Worsen Health Disparities</a> &mdash; A recent study found that some facial recognition programs incorrectly classify less than 1 percent of light-skinned men but more than one-third of dark-skinned women. What happens when we rely on such algorithms to diagnose melanoma on light versus dark skin?</li><li><a title="Responsible AI Practices" rel="nofollow" href="https://ai.google/education/responsible-ai-practices">Responsible AI Practices</a> &mdash; These questions are far from solved, and in fact are active areas of research and development. Google is committed to making progress in the responsible development of AI and to sharing knowledge, research, tools, datasets, and other resources with the larger community. Below we share some of our current work and recommended practices.</li><li><a title="The Ars Technica System Guide, Winter 2019: The one about the servers" rel="nofollow" href="https://arstechnica.com/gadgets/2019/03/the-ars-technica-system-guide-winter-2019-the-one-about-the-servers/">The Ars Technica System Guide, Winter 2019: The one about the servers</a> &mdash; The Winter 2019 Ars System Guide has returned to its roots: showing readers three real-world system builds we like at this precise moment in time. Instead of general performance desktops, this time around we're going to focus specifically on building some servers.</li><li><a title="Introduction to Python Development at Linux Academy" rel="nofollow" href="https://linuxacademy.com/devops/training/course/name/intro-to-python-development?utm_source=social&amp;utm_medium=twitter&amp;utm_campaign=2019_aprilcourselaunch">Introduction to Python Development at Linux Academy</a> &mdash; This course is designed to teach you how to program using Python. We'll cover the building blocks of the language, programming design fundamentals, how to use the standard library, third-party packages, and how to create Python projects. In the end, you should have a grasp of how to program.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</p><p>Links:</p><ul><li><a title="Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants" rel="nofollow" href="https://www.technologyreview.com/s/610634/microsofts-neo-nazi-sexbot-was-a-great-lesson-for-makers-of-ai-assistants/">Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants</a> &mdash; What started out as an entertaining social experiment—get regular people to talk to a chatbot so it could learn while they, hopefully, had fun—became a nightmare for Tay’s creators. Users soon figured out how to make Tay say awful things. Microsoft took the chatbot offline after less than a day.</li><li><a title="Microsoft&#39;s Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse" rel="nofollow" href="https://qz.com/1340990/microsofts-politically-correct-chat-bot-is-even-worse-than-its-racist-one/">Microsoft's Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse</a> &mdash; A few months after Tay’s disastrous debut, Microsoft quietly released Zo, a second English-language chatbot available on Messenger, Kik, Skype, Twitter, and Groupme.</li><li><a title="How to make a racist AI without really trying | ConceptNet blog" rel="nofollow" href="http://blog.conceptnet.io/posts/2017/how-to-make-a-racist-ai-without-really-trying/">How to make a racist AI without really trying | ConceptNet blog</a> &mdash; Some people expect that fighting algorithmic racism is going to come with some sort of trade-off. There’s no trade-off here. You can have data that’s better and less racist. You can have data that’s better because it’s less racist. There was never anything “accurate” about the overt racism that word2vec and GloVe learned.</li><li><a title="Microsoft warned investors that biased or flawed AI could hurt the company’s image" rel="nofollow" href="https://qz.com/1542377/microsoft-warned-investors-that-biased-or-flawed-ai-could-hurt-the-companys-image/">Microsoft warned investors that biased or flawed AI could hurt the company’s image</a> &mdash; Notably, this addition comes after a research paper by MIT Media Lab graduate researcher Joy Buolamwini showed in February 2018 that Microsoft’s facial recognition algorithm’s was less accurate for women and people of color. In response, Microsoft updated its facial recognition models, and wrote a blog post about how it was addressing bias in its software.</li><li><a title="AI bias: It is the responsibility of humans to ensure fairness" rel="nofollow" href="https://www.information-age.com/ai-bias-123479217/">AI bias: It is the responsibility of humans to ensure fairness</a> &mdash; Amazon recently pulled the plug on its experimental AI-powered recruitment engine when it was discovered that the machine learning technology behind it was exhibiting bias against female applicants.</li><li><a title="California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias" rel="nofollow" href="https://www.newsweek.com/california-police-artificial-intelligence-predictive-policing-predpol-santa-1358508">California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias</a> &mdash; “The potential for bias to creep into the deployment of the tools is enormous. Simply put, the devil is in the data,” Vincent Southerland, executive director of the Center on Race, Inequality, and the Law at NYU School of Law, wrote for the American Civil Liberties Union last year.

</li><li><a title="A.I. Could Worsen Health Disparities" rel="nofollow" href="https://www.nytimes.com/2019/01/31/opinion/ai-bias-healthcare.html">A.I. Could Worsen Health Disparities</a> &mdash; A recent study found that some facial recognition programs incorrectly classify less than 1 percent of light-skinned men but more than one-third of dark-skinned women. What happens when we rely on such algorithms to diagnose melanoma on light versus dark skin?</li><li><a title="Responsible AI Practices" rel="nofollow" href="https://ai.google/education/responsible-ai-practices">Responsible AI Practices</a> &mdash; These questions are far from solved, and in fact are active areas of research and development. Google is committed to making progress in the responsible development of AI and to sharing knowledge, research, tools, datasets, and other resources with the larger community. Below we share some of our current work and recommended practices.</li><li><a title="The Ars Technica System Guide, Winter 2019: The one about the servers" rel="nofollow" href="https://arstechnica.com/gadgets/2019/03/the-ars-technica-system-guide-winter-2019-the-one-about-the-servers/">The Ars Technica System Guide, Winter 2019: The one about the servers</a> &mdash; The Winter 2019 Ars System Guide has returned to its roots: showing readers three real-world system builds we like at this precise moment in time. Instead of general performance desktops, this time around we're going to focus specifically on building some servers.</li><li><a title="Introduction to Python Development at Linux Academy" rel="nofollow" href="https://linuxacademy.com/devops/training/course/name/intro-to-python-development?utm_source=social&amp;utm_medium=twitter&amp;utm_campaign=2019_aprilcourselaunch">Introduction to Python Development at Linux Academy</a> &mdash; This course is designed to teach you how to program using Python. We'll cover the building blocks of the language, programming design fundamentals, how to use the standard library, third-party packages, and how to create Python projects. In the end, you should have a grasp of how to program.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>398: Proper Password Procedures</title>
  <link>https://techsnap.systems/398</link>
  <guid isPermaLink="false">9c4e48b3-6aef-470f-82d5-d954c5bca39a</guid>
  <pubDate>Thu, 28 Feb 2019 18:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/9c4e48b3-6aef-470f-82d5-d954c5bca39a.mp3" length="22603569" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</itunes:subtitle>
  <itunes:duration>31:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.
Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up. 
</description>
  <itunes:keywords>Passwords, Password Salt, Cryptography, Cryptographic Hash, Utility, power company, SEDC, OWASP, entropy, password manager, plaintext, hashing algorithms, bcrypt, scrypt, pbkdf2, encryption, keepass, lastpass, 1password, offline encryption, PCI-DSS, standards, compliance, ethics, burp intruder, pivot, security, security research, software development, cracking, rainbow tables, brute force, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</p>

<p>Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up.</p><p>Links:</p><ul><li><a title="Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/02/plain-wrong-millions-of-utility-customers-passwords-stored-in-plain-text/">Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica</a> &mdash; In September of 2018, an anonymous independent security researcher (who we'll call X) noticed that their power company's website was offering to email—not reset!—lost account passwords to forgetful users. Startled, X fed the online form the utility account number and the last four phone number digits it was asking for. Sure enough, a few minutes later the account password, in plain text, was sitting in X's inbox.</li><li><a title="The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |" rel="nofollow" href="https://inspiredelearning.com/blog/the-linkedin-hack-understanding-why-it-was-so-easy-to-crack-the-passwords-2/">The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |</a> &mdash; LinkedIn stated that after the initial 2012 breach, they added enhanced protection, most likely adding the “salt” functionality to their passwords. However, if you have not changed your password since 2012, you do not have the added protection of a salted password hash. You may be asking yourself–what on earth are hashing and salting and how does this all work?</li><li><a title="How Developers got Password Security so Wrong" rel="nofollow" href="https://blog.cloudflare.com/how-developers-got-password-security-so-wrong/">How Developers got Password Security so Wrong</a> &mdash; As time has gone on; developers have continued to store passwords insecurely, and users have continued to set them weakly. Despite this, no viable alternative has been created for password security.</li><li><a title="Adding Salt to Hashing: A Better Way to Store Passwords" rel="nofollow" href="https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/">Adding Salt to Hashing: A Better Way to Store Passwords</a> &mdash; A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like rainbow tables.

</li><li><a title="Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study" rel="nofollow" href="https://arxiv.org/abs/1708.08759">Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study</a> &mdash; We were interested in exploring two particular aspects: Firstly, do developers get things wrong because they do not think about security and thus do not include security features (but could if they wanted to)? Or do they write insecure code because the complexity of the task is too great for them? Secondly, a common suggestion to increase security is to offer secure defaults.</li><li><a title="OWASP Password Storage Cheatsheet" rel="nofollow" href="https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Password_Storage_Cheat_Sheet.md">OWASP Password Storage Cheatsheet</a> &mdash; This article provides guidance on properly storing passwords, secret question responses, and similar credential information.</li><li><a title="Secure Salted Password Hashing - How to do it Properly" rel="nofollow" href="https://crackstation.net/hashing-security.htm">Secure Salted Password Hashing - How to do it Properly</a> &mdash; If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.</li><li><a title="Plain Text Offenders" rel="nofollow" href="http://plaintextoffenders.com/">Plain Text Offenders</a> &mdash; We’re tired of websites abusing our trust and storing our passwords in plain text, exposing us to danger. Here we put websites we believe to be practicing this to shame.</li><li><a title="Cybersecurity 101: Why you need to use a password manager | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/12/25/cybersecurity-101-guide-password-manager/">Cybersecurity 101: Why you need to use a password manager | TechCrunch</a> &mdash; Think of a password manager like a book of your passwords, locked by a master key that only you know.</li><li><a title="On the Security of Password Managers - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/02/on_the_security_1.html">On the Security of Password Managers - Schneier on Security</a> &mdash; There's new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plaintext copies of the password lying around memory?</li><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; It's the 20th anniversary of LinuxFest Northwest! Come join your favorite Jupiter Broadcasting hosts at the Pacific Northwest's premier Linux event.</li><li><a title="SCALE 17x" rel="nofollow" href="https://www.socallinuxexpo.org/scale/17x">SCALE 17x</a> &mdash; The 17th annual Southern California Linux Expo – will take place on March. 7-10, 2019, at the Pasadena Convention Center. SCaLE 17x expects to host 150 exhibitors this year, along with nearly 130 sessions, tutorials and special events.</li><li><a title="Jupiter Broadcasting Meetups" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/">Jupiter Broadcasting Meetups</a> &mdash; The best place to find out when Jupiter Broadcasting has a meetup near you! Also stay tuned for upcoming virtual study groups.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</p>

<p>Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up.</p><p>Links:</p><ul><li><a title="Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/02/plain-wrong-millions-of-utility-customers-passwords-stored-in-plain-text/">Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica</a> &mdash; In September of 2018, an anonymous independent security researcher (who we'll call X) noticed that their power company's website was offering to email—not reset!—lost account passwords to forgetful users. Startled, X fed the online form the utility account number and the last four phone number digits it was asking for. Sure enough, a few minutes later the account password, in plain text, was sitting in X's inbox.</li><li><a title="The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |" rel="nofollow" href="https://inspiredelearning.com/blog/the-linkedin-hack-understanding-why-it-was-so-easy-to-crack-the-passwords-2/">The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |</a> &mdash; LinkedIn stated that after the initial 2012 breach, they added enhanced protection, most likely adding the “salt” functionality to their passwords. However, if you have not changed your password since 2012, you do not have the added protection of a salted password hash. You may be asking yourself–what on earth are hashing and salting and how does this all work?</li><li><a title="How Developers got Password Security so Wrong" rel="nofollow" href="https://blog.cloudflare.com/how-developers-got-password-security-so-wrong/">How Developers got Password Security so Wrong</a> &mdash; As time has gone on; developers have continued to store passwords insecurely, and users have continued to set them weakly. Despite this, no viable alternative has been created for password security.</li><li><a title="Adding Salt to Hashing: A Better Way to Store Passwords" rel="nofollow" href="https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/">Adding Salt to Hashing: A Better Way to Store Passwords</a> &mdash; A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like rainbow tables.

</li><li><a title="Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study" rel="nofollow" href="https://arxiv.org/abs/1708.08759">Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study</a> &mdash; We were interested in exploring two particular aspects: Firstly, do developers get things wrong because they do not think about security and thus do not include security features (but could if they wanted to)? Or do they write insecure code because the complexity of the task is too great for them? Secondly, a common suggestion to increase security is to offer secure defaults.</li><li><a title="OWASP Password Storage Cheatsheet" rel="nofollow" href="https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Password_Storage_Cheat_Sheet.md">OWASP Password Storage Cheatsheet</a> &mdash; This article provides guidance on properly storing passwords, secret question responses, and similar credential information.</li><li><a title="Secure Salted Password Hashing - How to do it Properly" rel="nofollow" href="https://crackstation.net/hashing-security.htm">Secure Salted Password Hashing - How to do it Properly</a> &mdash; If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.</li><li><a title="Plain Text Offenders" rel="nofollow" href="http://plaintextoffenders.com/">Plain Text Offenders</a> &mdash; We’re tired of websites abusing our trust and storing our passwords in plain text, exposing us to danger. Here we put websites we believe to be practicing this to shame.</li><li><a title="Cybersecurity 101: Why you need to use a password manager | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/12/25/cybersecurity-101-guide-password-manager/">Cybersecurity 101: Why you need to use a password manager | TechCrunch</a> &mdash; Think of a password manager like a book of your passwords, locked by a master key that only you know.</li><li><a title="On the Security of Password Managers - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/02/on_the_security_1.html">On the Security of Password Managers - Schneier on Security</a> &mdash; There's new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plaintext copies of the password lying around memory?</li><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; It's the 20th anniversary of LinuxFest Northwest! Come join your favorite Jupiter Broadcasting hosts at the Pacific Northwest's premier Linux event.</li><li><a title="SCALE 17x" rel="nofollow" href="https://www.socallinuxexpo.org/scale/17x">SCALE 17x</a> &mdash; The 17th annual Southern California Linux Expo – will take place on March. 7-10, 2019, at the Pasadena Convention Center. SCaLE 17x expects to host 150 exhibitors this year, along with nearly 130 sessions, tutorials and special events.</li><li><a title="Jupiter Broadcasting Meetups" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/">Jupiter Broadcasting Meetups</a> &mdash; The best place to find out when Jupiter Broadcasting has a meetup near you! Also stay tuned for upcoming virtual study groups.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>396: Floating Point Problems</title>
  <link>https://techsnap.systems/396</link>
  <guid isPermaLink="false">bc968a3f-c804-4203-ae2b-dc43ef919218</guid>
  <pubDate>Thu, 31 Jan 2019 20:45:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/bc968a3f-c804-4203-ae2b-dc43ef919218.mp3" length="19582037" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</itunes:subtitle>
  <itunes:duration>27:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.
Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux. Special Guest: Richard Yao.
</description>
  <itunes:keywords>GPL, CDDL, Oracle, FPU, SIMD, vectorized instructions, AVX, hardware acceleration, journaling, data integrity, LFNW, floating point, checksum, snapshot, clone, FreeBSD, kernel module, header, software license, Linux, Multitasking, kernel preemption, OpenZFS, ZFS, ZoL, ZFS on Linux, Storage, RAID, ZVOL, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</p>

<p>Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.</p><p>Special Guest: Richard Yao.</p><p>Links:</p><ul><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; Join a bunch of JB hosts and community celebrating the 20th anniversary! </li><li><a title="Choose Linux" rel="nofollow" href="https://chooselinux.show/">Choose Linux</a> &mdash; The show that captures the excitement of discovering Linux.</li><li><a title="Linux 5.0: _kernel_fpu{begin,end} no longer exported" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8259">Linux 5.0: _kernel_fpu{begin,end} no longer exported</a> &mdash; The latest kernels removed the old compatibility headers.</li><li><a title="ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Workaround">ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support</a> &mdash; So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.</li><li><a title="Re: x86/fpu: Don&#39;t export __kernel_fpu_{begin,end}()" rel="nofollow" href="https://marc.info/?l=linux-kernel&amp;m=154714516832389">Re: x86/fpu: Don't export __kernel_fpu_{begin,end}()</a> &mdash; My tolerance for ZFS is pretty non-existant.  Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?</li><li><a title="The future of ZFS in FreeBSD" rel="nofollow" href="https://lists.freebsd.org/pipermail/freebsd-current/2018-December/072422.html">The future of ZFS in FreeBSD</a> &mdash; This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.</li><li><a title="Dephix: Kickoff to The Future" rel="nofollow" href="https://www.delphix.com/blog/kickoff-future-eko-2018">Dephix: Kickoff to The Future</a> &mdash; OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.</li><li><a title="The future of ZFS on Linux [zfs-discuss] " rel="nofollow" href="http://list.zfsonlinux.org/pipermail/zfs-discuss/2019-January/033300.html">The future of ZFS on Linux [zfs-discuss] </a> &mdash; 
Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. 

Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.</li><li><a title="LINUX Unplugged Episode 284: Free as in Get Out" rel="nofollow" href="https://linuxunplugged.com/284">LINUX Unplugged Episode 284: Free as in Get Out</a></li><li><a title="BSD Now 279: Future of ZFS" rel="nofollow" href="https://www.bsdnow.tv/episodes/2019_01_02-future_of_zfs">BSD Now 279: Future of ZFS</a></li><li><a title="BSD Now 157: ZFS, The “Universal” File-system" rel="nofollow" href="https://www.bsdnow.tv/episodes/2016_08_31-the_universal_filesystem">BSD Now 157: ZFS, The “Universal” File-system</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</p>

<p>Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.</p><p>Special Guest: Richard Yao.</p><p>Links:</p><ul><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; Join a bunch of JB hosts and community celebrating the 20th anniversary! </li><li><a title="Choose Linux" rel="nofollow" href="https://chooselinux.show/">Choose Linux</a> &mdash; The show that captures the excitement of discovering Linux.</li><li><a title="Linux 5.0: _kernel_fpu{begin,end} no longer exported" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8259">Linux 5.0: _kernel_fpu{begin,end} no longer exported</a> &mdash; The latest kernels removed the old compatibility headers.</li><li><a title="ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Workaround">ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support</a> &mdash; So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.</li><li><a title="Re: x86/fpu: Don&#39;t export __kernel_fpu_{begin,end}()" rel="nofollow" href="https://marc.info/?l=linux-kernel&amp;m=154714516832389">Re: x86/fpu: Don't export __kernel_fpu_{begin,end}()</a> &mdash; My tolerance for ZFS is pretty non-existant.  Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?</li><li><a title="The future of ZFS in FreeBSD" rel="nofollow" href="https://lists.freebsd.org/pipermail/freebsd-current/2018-December/072422.html">The future of ZFS in FreeBSD</a> &mdash; This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.</li><li><a title="Dephix: Kickoff to The Future" rel="nofollow" href="https://www.delphix.com/blog/kickoff-future-eko-2018">Dephix: Kickoff to The Future</a> &mdash; OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.</li><li><a title="The future of ZFS on Linux [zfs-discuss] " rel="nofollow" href="http://list.zfsonlinux.org/pipermail/zfs-discuss/2019-January/033300.html">The future of ZFS on Linux [zfs-discuss] </a> &mdash; 
Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. 

Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.</li><li><a title="LINUX Unplugged Episode 284: Free as in Get Out" rel="nofollow" href="https://linuxunplugged.com/284">LINUX Unplugged Episode 284: Free as in Get Out</a></li><li><a title="BSD Now 279: Future of ZFS" rel="nofollow" href="https://www.bsdnow.tv/episodes/2019_01_02-future_of_zfs">BSD Now 279: Future of ZFS</a></li><li><a title="BSD Now 157: ZFS, The “Universal” File-system" rel="nofollow" href="https://www.bsdnow.tv/episodes/2016_08_31-the_universal_filesystem">BSD Now 157: ZFS, The “Universal” File-system</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>395: The ACME Era</title>
  <link>https://techsnap.systems/395</link>
  <guid isPermaLink="false">26a02c39-f731-48d1-9539-2d910465a6f7</guid>
  <pubDate>Sun, 20 Jan 2019 20:45:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/26a02c39-f731-48d1-9539-2d910465a6f7.mp3" length="28300543" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</itunes:subtitle>
  <itunes:duration>33:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.
The history, the clients, and the from-the-field details you'll want to know. 
</description>
  <itunes:keywords>SSL, TLS, public key cryptography. X.509, EV, DV, Domain Verification, Extended Verification, StartSSL, CSR, SSL certificates, TLS certificates, BGP, ACME, Let’s Encrypt, Certbot, Mozilla, EFF, Automation, NGINX, Apache, Traefik, caddy,  DNS, HTTP,  HTTPS, Encryption, ISRG, TLS-SNI-01, ACME V2, Mail Server, Exim, Dovecot, Postfix, IETF, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let's Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let's Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let's Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let's Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let's Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let's Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let's Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let's Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let's Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let's Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>394: All About Azure</title>
  <link>https://techsnap.systems/394</link>
  <guid isPermaLink="false">2e588701-e7a1-4462-99fa-e7ea2275b375</guid>
  <pubDate>Thu, 10 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2e588701-e7a1-4462-99fa-e7ea2275b375.mp3" length="22259879" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</itunes:subtitle>
  <itunes:duration>26:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths. Special Guest: Chad M. Crowell.
</description>
  <itunes:keywords>Azure, Microsoft, AWS, Cloud, command line, virtualization, Hybrid Cloud, Active Directory, VPC, VPN, Powershell, Powershell core, Azure Sphere, Azure Stack, File Sync, MSSQL, Windows, Linux, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft's Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/azure/training/course/name/microsoft-azure-infrastructure-and-deployment-exam-az-100"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft's Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/azure/training/course/name/microsoft-azure-infrastructure-and-deployment-exam-az-100"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>393: Back to our /roots</title>
  <link>https://techsnap.systems/393</link>
  <guid isPermaLink="false">1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf</guid>
  <pubDate>Thu, 03 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf.mp3" length="19076619" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</itunes:subtitle>
  <itunes:duration>22:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend. 
</description>
  <itunes:keywords>Security Breach, Flash, AWS, Cloud, Bitcoin, Dropbox, Sony, PSN Breach, Wordpress, SSL, TLS, Allan Jude, FreeBSD, Jim Salter, Information Density, Automation, Bitcoin, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>392: Keeping up with Kubernetes</title>
  <link>https://techsnap.systems/392</link>
  <guid isPermaLink="false">45523a8f-70a8-4800-a757-964c8f91f645</guid>
  <pubDate>Wed, 12 Dec 2018 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/45523a8f-70a8-4800-a757-964c8f91f645.mp3" length="23364271" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
</itunes:subtitle>
  <itunes:duration>27:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
Plus the biggest stories out of Kubecon, and serverless gets serious. 
</description>
  <itunes:keywords>Kubecon, Kubernetes, Istio, CNCF, etcd, traefik, knative, google, k8s, red hat, ibm, openwhisk, serverless, faas, rook, cloud native, storage, ceph, Helm, Helm hub, Elasticsearch, Chromium OS, Chromium, Event driven, CloudEvent, Containers, Container Vulnerability, GitLab, Crossplane, Control Plane, Multicloud, holiday, christmas, security.christmas, CVE, Security Vulnerability, CVE-2018-1002105, kube-apiserver, websocket, RBAC, HTTP, metrics, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 391: Firecracker Fundamentals</title>
  <link>https://techsnap.systems/391</link>
  <guid isPermaLink="false">85bdbb45-28a2-4d50-bed1-ade6768e3fa3</guid>
  <pubDate>Thu, 29 Nov 2018 14:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/85bdbb45-28a2-4d50-bed1-ade6768e3fa3.mp3" length="18175107" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different than the options on the market now.</itunes:subtitle>
  <itunes:duration>21:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.
Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.
</description>
  <itunes:keywords>Firecracker, AWS, Amazon, Serverless, Lambda, Fargate, QEMU, KVM, Virtualization, Virtual Machines, VENOM, Rust,  BGP, OpenBSD, RPKI, MITM, dive, Docker, evilginx2, proxy, Sennheiser, TLS, SSL, OpenBGPD, RIPE, LSI, RAID, Allan Jude, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 390: What’s Up with WireGuard</title>
  <link>https://techsnap.systems/390</link>
  <guid isPermaLink="false">6cd3cd3c-79c7-4978-8102-042f935a1344</guid>
  <pubDate>Thu, 22 Nov 2018 10:30:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/6cd3cd3c-79c7-4978-8102-042f935a1344.mp3" length="29616549" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</itunes:subtitle>
  <itunes:duration>34:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t. Special Guest: Jim Salter.
</description>
  <itunes:keywords>WireGuard, VPN, IPSEC, Linux, Algo, Private Networking, Jim Salter, ssh, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle's Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn't Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle's Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn't Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 386: What Makes Google Cloud Different</title>
  <link>https://techsnap.systems/386</link>
  <guid isPermaLink="false">18d614a8-cc5e-47e9-9cad-3f411f1ae0cd</guid>
  <pubDate>Thu, 04 Oct 2018 16:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/18d614a8-cc5e-47e9-9cad-3f411f1ae0cd.mp3" length="29644989" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </itunes:subtitle>
  <itunes:duration>34:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. 
Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more! Special Guest: Matt Ulasien.
</description>
  <itunes:keywords>Roughtime, NTP, Timekeeping, Google Cloud, Container Security, Cloud Build, IoT, Kubernetes, KubeSpy, KubeDirector, Bare Metal Kubernetes, Matt Ulasien, SysAdmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </p>

<p>Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more!</p><p>Special Guest: Matt Ulasien.</p><p>Links:</p><ul><li><a title="Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost" rel="nofollow" href="https://www.wired.com/story/clouldflare-google-roughtime-sync-clocks-security/">Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost</a> &mdash; The internet infrastructure firm Cloudflare will now support a free timekeeping protocol known as Roughtime, which helps synchronize the internet's clocks and validate timestamps.</li><li><a title="Roughtime: Securing Time with Digital Signatures" rel="nofollow" href="https://blog.cloudflare.com/roughtime/">Roughtime: Securing Time with Digital Signatures</a> &mdash; Roughtime lacks the precision of NTP, but aims to be accurate enough for cryptographic applications, and since the responses are authenticated, man-in-the-middle attacks aren’t possible</li><li><a title="Google Cloud rolls out security feature for container images" rel="nofollow" href="https://www.zdnet.com/article/google-cloud-rolls-out-security-feature-for-container-images/">Google Cloud rolls out security feature for container images</a> &mdash; All container images built using Cloud Build, Google's fully-managed CI/CD platform, will now be automatically scanned for OS package vulnerabilities</li><li><a title="Tweets by Matthew Ulasien (@mulasien)" rel="nofollow" href="https://twitter.com/mulasien">Tweets by Matthew Ulasien (@mulasien)</a></li><li><a title="Google Cloud Weekly | 10.03.2018" rel="nofollow" href="https://www.youtube.com/watch?v=iNcg-2TOFbA">Google Cloud Weekly | 10.03.2018</a></li><li><a title="Matthew Ulasien - Quora" rel="nofollow" href="https://www.quora.com/profile/Matthew-Ulasien">Matthew Ulasien - Quora</a></li><li><a title="Google Certified Professional Cloud Architect" rel="nofollow" href="https://linuxacademy.com/linux/training/course/name/google-cloud-platform-architect-essentials">Google Certified Professional Cloud Architect</a></li><li><a title="Feedback: Can&#39;t Even Google This One!" rel="nofollow" href="https://pastebin.com/ufe1KdEX">Feedback: Can't Even Google This One!</a></li><li><a title="Feedback: The Button Pusher Problem" rel="nofollow" href="https://pastebin.com/zcacp8F2">Feedback: The Button Pusher Problem</a></li><li><a title="Feedback: Can I monitor that?" rel="nofollow" href="https://pastebin.com/RYSsLQpj">Feedback: Can I monitor that?</a></li><li><a title="Pingdom" rel="nofollow" href="https://www.pingdom.com/">Pingdom</a></li><li><a title="Site24x7" rel="nofollow" href="https://www.site24x7.com/">Site24x7</a></li><li><a title="prometheus/blackbox_exporter: Blackbox prober exporter" rel="nofollow" href="https://github.com/prometheus/blackbox_exporter">prometheus/blackbox_exporter: Blackbox prober exporter</a></li><li><a title=" Kubernetes the Hard Way - Course" rel="nofollow" href="https://linuxacademy.com/cp/modules/view/id/221"> Kubernetes the Hard Way - Course</a></li><li><a title="How do Kubernetes Deployments work? An adversarial perspective." rel="nofollow" href="https://blog.pulumi.com/how-do-kubernetes-deployments-work-an-adversarial-perspective">How do Kubernetes Deployments work? An adversarial perspective.</a> &mdash; What is happening when a Deployment rolls out a change to your app? What does it actually do when a Pod crashes or is killed? What happens when a Pod is re-labled so that it's not targeted by the Deployment?</li><li><a title="Kubernetes: The Surprisingly Affordable Platform for Personal Projects" rel="nofollow" href="https://www.doxsey.net/blog/kubernetes--the-surprisingly-affordable-platform-for-personal-projects">Kubernetes: The Surprisingly Affordable Platform for Personal Projects</a> &mdash; I think that Kubernetes makes sense for small projects and you can have your own Kubernetes cluster today for as little as $5 a month.</li><li><a title="Kubernetes for personal projects? No thanks!" rel="nofollow" href="https://carlosrdrz.es/kubernetes-for-small-projects/">Kubernetes for personal projects? No thanks!</a> &mdash; I have read multiple times this article about running Kubernetes to run small projects and thought I could share why I think that might not be a great idea.</li><li><a title="KubeDirector: The easy way to run complex stateful applications on Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/10/03/kubedirector-the-easy-way-to-run-complex-stateful-applications-on-kubernetes/">KubeDirector: The easy way to run complex stateful applications on Kubernetes</a> &mdash; KubeDirector is an open source project designed to make it easy to run complex stateful scale-out application clusters on Kubernetes.</li><li><a title="Kubernetes On Bare Metal" rel="nofollow" href="https://joshrendek.com/2018/04/kubernetes-on-bare-metal/">Kubernetes On Bare Metal</a> &mdash; This guide will take you from nothing to a 2 node cluster, automatic SSL for deployed apps, a custom PVC/PV storage class using NFS, and a private docker registry.</li><li><a title="Introducing DigitalOcean Kubernetes in Limited Availability" rel="nofollow" href="https://twitter.com/digitalocean/status/1046821669610901509">Introducing DigitalOcean Kubernetes in Limited Availability</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </p>

<p>Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more!</p><p>Special Guest: Matt Ulasien.</p><p>Links:</p><ul><li><a title="Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost" rel="nofollow" href="https://www.wired.com/story/clouldflare-google-roughtime-sync-clocks-security/">Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost</a> &mdash; The internet infrastructure firm Cloudflare will now support a free timekeeping protocol known as Roughtime, which helps synchronize the internet's clocks and validate timestamps.</li><li><a title="Roughtime: Securing Time with Digital Signatures" rel="nofollow" href="https://blog.cloudflare.com/roughtime/">Roughtime: Securing Time with Digital Signatures</a> &mdash; Roughtime lacks the precision of NTP, but aims to be accurate enough for cryptographic applications, and since the responses are authenticated, man-in-the-middle attacks aren’t possible</li><li><a title="Google Cloud rolls out security feature for container images" rel="nofollow" href="https://www.zdnet.com/article/google-cloud-rolls-out-security-feature-for-container-images/">Google Cloud rolls out security feature for container images</a> &mdash; All container images built using Cloud Build, Google's fully-managed CI/CD platform, will now be automatically scanned for OS package vulnerabilities</li><li><a title="Tweets by Matthew Ulasien (@mulasien)" rel="nofollow" href="https://twitter.com/mulasien">Tweets by Matthew Ulasien (@mulasien)</a></li><li><a title="Google Cloud Weekly | 10.03.2018" rel="nofollow" href="https://www.youtube.com/watch?v=iNcg-2TOFbA">Google Cloud Weekly | 10.03.2018</a></li><li><a title="Matthew Ulasien - Quora" rel="nofollow" href="https://www.quora.com/profile/Matthew-Ulasien">Matthew Ulasien - Quora</a></li><li><a title="Google Certified Professional Cloud Architect" rel="nofollow" href="https://linuxacademy.com/linux/training/course/name/google-cloud-platform-architect-essentials">Google Certified Professional Cloud Architect</a></li><li><a title="Feedback: Can&#39;t Even Google This One!" rel="nofollow" href="https://pastebin.com/ufe1KdEX">Feedback: Can't Even Google This One!</a></li><li><a title="Feedback: The Button Pusher Problem" rel="nofollow" href="https://pastebin.com/zcacp8F2">Feedback: The Button Pusher Problem</a></li><li><a title="Feedback: Can I monitor that?" rel="nofollow" href="https://pastebin.com/RYSsLQpj">Feedback: Can I monitor that?</a></li><li><a title="Pingdom" rel="nofollow" href="https://www.pingdom.com/">Pingdom</a></li><li><a title="Site24x7" rel="nofollow" href="https://www.site24x7.com/">Site24x7</a></li><li><a title="prometheus/blackbox_exporter: Blackbox prober exporter" rel="nofollow" href="https://github.com/prometheus/blackbox_exporter">prometheus/blackbox_exporter: Blackbox prober exporter</a></li><li><a title=" Kubernetes the Hard Way - Course" rel="nofollow" href="https://linuxacademy.com/cp/modules/view/id/221"> Kubernetes the Hard Way - Course</a></li><li><a title="How do Kubernetes Deployments work? An adversarial perspective." rel="nofollow" href="https://blog.pulumi.com/how-do-kubernetes-deployments-work-an-adversarial-perspective">How do Kubernetes Deployments work? An adversarial perspective.</a> &mdash; What is happening when a Deployment rolls out a change to your app? What does it actually do when a Pod crashes or is killed? What happens when a Pod is re-labled so that it's not targeted by the Deployment?</li><li><a title="Kubernetes: The Surprisingly Affordable Platform for Personal Projects" rel="nofollow" href="https://www.doxsey.net/blog/kubernetes--the-surprisingly-affordable-platform-for-personal-projects">Kubernetes: The Surprisingly Affordable Platform for Personal Projects</a> &mdash; I think that Kubernetes makes sense for small projects and you can have your own Kubernetes cluster today for as little as $5 a month.</li><li><a title="Kubernetes for personal projects? No thanks!" rel="nofollow" href="https://carlosrdrz.es/kubernetes-for-small-projects/">Kubernetes for personal projects? No thanks!</a> &mdash; I have read multiple times this article about running Kubernetes to run small projects and thought I could share why I think that might not be a great idea.</li><li><a title="KubeDirector: The easy way to run complex stateful applications on Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/10/03/kubedirector-the-easy-way-to-run-complex-stateful-applications-on-kubernetes/">KubeDirector: The easy way to run complex stateful applications on Kubernetes</a> &mdash; KubeDirector is an open source project designed to make it easy to run complex stateful scale-out application clusters on Kubernetes.</li><li><a title="Kubernetes On Bare Metal" rel="nofollow" href="https://joshrendek.com/2018/04/kubernetes-on-bare-metal/">Kubernetes On Bare Metal</a> &mdash; This guide will take you from nothing to a 2 node cluster, automatic SSL for deployed apps, a custom PVC/PV storage class using NFS, and a private docker registry.</li><li><a title="Introducing DigitalOcean Kubernetes in Limited Availability" rel="nofollow" href="https://twitter.com/digitalocean/status/1046821669610901509">Introducing DigitalOcean Kubernetes in Limited Availability</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 385: 3 Things to Know About Kubernetes</title>
  <link>https://techsnap.systems/385</link>
  <guid isPermaLink="false">f656bfc9-76fe-45b3-b238-3cff6b0acfac</guid>
  <pubDate>Thu, 27 Sep 2018 16:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/f656bfc9-76fe-45b3-b238-3cff6b0acfac.mp3" length="19733765" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</itunes:subtitle>
  <itunes:duration>23:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.
Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene. 
 Special Guest: Will Boyd.
</description>
  <itunes:keywords>HASSH, SSH, ESNI, SNI, HTTPS, Cloudflare, Salesforce, Kubernetes, Clonezilla, Kubernetes the hard way, Minikube, kubeadm, Will Boyd, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</p>

<p>Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene. </p><p>Special Guest: Will Boyd.</p><p>Links:</p><ul><li><a title="Open Sourcing HASSH" rel="nofollow" href="https://engineering.salesforce.com/open-sourcing-hassh-abed3ae5044c">Open Sourcing HASSH</a> &mdash; HASSH is a network fingerprinting standard invented within the Detection Cloud team at Salesforce.</li><li><a title="ESNI: A Privacy-Protecting Upgrade to HTTPS" rel="nofollow" href="https://www.eff.org/deeplinks/2018/09/esni-privacy-protecting-upgrade-https">ESNI: A Privacy-Protecting Upgrade to HTTPS</a> &mdash; Today, Cloudflare is announcing a major step toward closing this privacy hole and enhancing the privacy protections that HTTPS offers. Cloudflare has proposed a technical standard for encrypted SNI, or “ESNI,” which can hide the identities of the sites you visit—particularly when a large number of sites are hosted on a single set of IP addresses</li><li><a title="What&#39;s new in Kubernetes 1.12?" rel="nofollow" href="https://sysdig.com/blog/whats-new-in-kubernetes-1-12/">What's new in Kubernetes 1.12?</a></li><li><a title="Kubernetes the Hard Way" rel="nofollow" href="https://github.com/kelseyhightower/kubernetes-the-hard-way">Kubernetes the Hard Way</a> &mdash; Kubernetes The Hard Way guides you through bootstrapping a highly available Kubernetes cluster with end-to-end encryption between components and RBAC authentication.</li><li><a title="Install Minikube" rel="nofollow" href="https://kubernetes.io/docs/tasks/tools/install-minikube/">Install Minikube</a></li><li><a title="Creating a single master cluster with kubeadm" rel="nofollow" href="https://kubernetes.io/docs/setup/independent/create-cluster-kubeadm/">Creating a single master cluster with kubeadm</a></li><li><a title="10 open-source Kubernetes tools for highly effective SRE and Ops Teams" rel="nofollow" href="https://abhishek-tiwari.com/10-open-source-tools-for-highly-effective-kubernetes-sre-and-ops-teams/">10 open-source Kubernetes tools for highly effective SRE and Ops Teams</a></li><li><a title="Clonezilla" rel="nofollow" href="https://www.clonezilla.org/">Clonezilla</a> &mdash; Clonezilla is a partition and disk imaging/cloning program similar to True Image or Norton Ghost.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</p>

<p>Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene. </p><p>Special Guest: Will Boyd.</p><p>Links:</p><ul><li><a title="Open Sourcing HASSH" rel="nofollow" href="https://engineering.salesforce.com/open-sourcing-hassh-abed3ae5044c">Open Sourcing HASSH</a> &mdash; HASSH is a network fingerprinting standard invented within the Detection Cloud team at Salesforce.</li><li><a title="ESNI: A Privacy-Protecting Upgrade to HTTPS" rel="nofollow" href="https://www.eff.org/deeplinks/2018/09/esni-privacy-protecting-upgrade-https">ESNI: A Privacy-Protecting Upgrade to HTTPS</a> &mdash; Today, Cloudflare is announcing a major step toward closing this privacy hole and enhancing the privacy protections that HTTPS offers. Cloudflare has proposed a technical standard for encrypted SNI, or “ESNI,” which can hide the identities of the sites you visit—particularly when a large number of sites are hosted on a single set of IP addresses</li><li><a title="What&#39;s new in Kubernetes 1.12?" rel="nofollow" href="https://sysdig.com/blog/whats-new-in-kubernetes-1-12/">What's new in Kubernetes 1.12?</a></li><li><a title="Kubernetes the Hard Way" rel="nofollow" href="https://github.com/kelseyhightower/kubernetes-the-hard-way">Kubernetes the Hard Way</a> &mdash; Kubernetes The Hard Way guides you through bootstrapping a highly available Kubernetes cluster with end-to-end encryption between components and RBAC authentication.</li><li><a title="Install Minikube" rel="nofollow" href="https://kubernetes.io/docs/tasks/tools/install-minikube/">Install Minikube</a></li><li><a title="Creating a single master cluster with kubeadm" rel="nofollow" href="https://kubernetes.io/docs/setup/independent/create-cluster-kubeadm/">Creating a single master cluster with kubeadm</a></li><li><a title="10 open-source Kubernetes tools for highly effective SRE and Ops Teams" rel="nofollow" href="https://abhishek-tiwari.com/10-open-source-tools-for-highly-effective-kubernetes-sre-and-ops-teams/">10 open-source Kubernetes tools for highly effective SRE and Ops Teams</a></li><li><a title="Clonezilla" rel="nofollow" href="https://www.clonezilla.org/">Clonezilla</a> &mdash; Clonezilla is a partition and disk imaging/cloning program similar to True Image or Norton Ghost.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 381: Here Comes Cloud DNS</title>
  <link>https://techsnap.systems/381</link>
  <guid isPermaLink="false">c8862a6f-bc3a-42f5-b1ff-c9e6282ed771</guid>
  <pubDate>Wed, 29 Aug 2018 15:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c8862a6f-bc3a-42f5-b1ff-c9e6282ed771.mp3" length="20357803" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>To make DNS more secure, we must move it to the cloud! At least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.</itunes:subtitle>
  <itunes:duration>23:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>To make DNS more secure, we must move it to the cloud! At least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.
Plus new active attacks against Apache Struts, and a Windows 10 zero-day exposed on Twitter. 
</description>
  <itunes:keywords>DoH, DNS Over Https, Cloudflare, Cloudflare Resolver, Windows 10, Mozilla, Struts, Apache, CVE-2018-11776, Zero-Day, SandboxEscaper, Netdata, Advanced Local Procedure Call, Sysadmin podcast, techsnap</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>To make DNS more secure, we must move it to the cloud! At least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.</p>

<p>Plus new active attacks against Apache Struts, and a Windows 10 zero-day exposed on Twitter.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Firefox Nightly Secure DNS Experimental Results " rel="nofollow" href="https://blog.nightly.mozilla.org/2018/08/28/firefox-nightly-secure-dns-experimental-results/">Firefox Nightly Secure DNS Experimental Results </a></li><li><a title="DNS-over-HTTPS" rel="nofollow" href="https://developers.google.com/speed/public-dns/docs/dns-over-https">DNS-over-HTTPS</a></li><li><a title="DNS over HTTPS" rel="nofollow" href="https://en.wikipedia.org/wiki/DNS_over_HTTPS">DNS over HTTPS</a></li><li><a title="A cartoon intro to DNS over HTTPS" rel="nofollow" href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/">A cartoon intro to DNS over HTTPS</a></li><li><a title="Discussion of draft-ietf-doh-dns-over-https in the IETF&#39;s DOH Working Group" rel="nofollow" href="https://github.com/dohwg/draft-ietf-doh-dns-over-https">Discussion of draft-ietf-doh-dns-over-https in the IETF's DOH Working Group</a></li><li><a title="High performance DNS over HTTPS client &amp; server" rel="nofollow" href="https://github.com/m13253/dns-over-https">High performance DNS over HTTPS client &amp; server</a></li><li><a title="Cloudflare Resolver for Firefox" rel="nofollow" href="https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/">Cloudflare Resolver for Firefox</a></li><li><a title="Active Attacks Detected Using Apache Struts Vulnerability CVE-2018-11776" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/active-attacks-detected-using-apache-struts-vulnerability-cve-2018-11776/">Active Attacks Detected Using Apache Struts Vulnerability CVE-2018-11776</a></li><li><a title="Windows 10 Zero-Day Vulnerability Exposed On Twitter" rel="nofollow" href="https://www.tomshardware.com/news/windows-10-zero-day-exposed-twitter,37709.html">Windows 10 Zero-Day Vulnerability Exposed On Twitter</a></li><li><a title="Netdata: Get control of your servers." rel="nofollow" href="https://github.com/firehol/netdata">Netdata: Get control of your servers.</a> &mdash; netdata is a system for distributed real-time performance and health monitoring. It provides unparalleled insights, in real-time, of everything happening on the system it runs (including applications such as web and database servers), using modern interactive web dashboards.

</li><li><a title="State of Software Distribution - 2018" rel="nofollow" href="https://go.kollective.com/state-of-software-distribution.html">State of Software Distribution - 2018</a> &mdash; Few enterprises possess the ability to deploy the latest software and security patches at scale, putting their cybersecurity and business performance at risk. In the 2018 State of Software Distribution Report, we explore why IT decision makers say they struggle to keep up with the software distribution needs of the modern enterprise.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>To make DNS more secure, we must move it to the cloud! At least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.</p>

<p>Plus new active attacks against Apache Struts, and a Windows 10 zero-day exposed on Twitter.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Firefox Nightly Secure DNS Experimental Results " rel="nofollow" href="https://blog.nightly.mozilla.org/2018/08/28/firefox-nightly-secure-dns-experimental-results/">Firefox Nightly Secure DNS Experimental Results </a></li><li><a title="DNS-over-HTTPS" rel="nofollow" href="https://developers.google.com/speed/public-dns/docs/dns-over-https">DNS-over-HTTPS</a></li><li><a title="DNS over HTTPS" rel="nofollow" href="https://en.wikipedia.org/wiki/DNS_over_HTTPS">DNS over HTTPS</a></li><li><a title="A cartoon intro to DNS over HTTPS" rel="nofollow" href="https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/">A cartoon intro to DNS over HTTPS</a></li><li><a title="Discussion of draft-ietf-doh-dns-over-https in the IETF&#39;s DOH Working Group" rel="nofollow" href="https://github.com/dohwg/draft-ietf-doh-dns-over-https">Discussion of draft-ietf-doh-dns-over-https in the IETF's DOH Working Group</a></li><li><a title="High performance DNS over HTTPS client &amp; server" rel="nofollow" href="https://github.com/m13253/dns-over-https">High performance DNS over HTTPS client &amp; server</a></li><li><a title="Cloudflare Resolver for Firefox" rel="nofollow" href="https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/">Cloudflare Resolver for Firefox</a></li><li><a title="Active Attacks Detected Using Apache Struts Vulnerability CVE-2018-11776" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/active-attacks-detected-using-apache-struts-vulnerability-cve-2018-11776/">Active Attacks Detected Using Apache Struts Vulnerability CVE-2018-11776</a></li><li><a title="Windows 10 Zero-Day Vulnerability Exposed On Twitter" rel="nofollow" href="https://www.tomshardware.com/news/windows-10-zero-day-exposed-twitter,37709.html">Windows 10 Zero-Day Vulnerability Exposed On Twitter</a></li><li><a title="Netdata: Get control of your servers." rel="nofollow" href="https://github.com/firehol/netdata">Netdata: Get control of your servers.</a> &mdash; netdata is a system for distributed real-time performance and health monitoring. It provides unparalleled insights, in real-time, of everything happening on the system it runs (including applications such as web and database servers), using modern interactive web dashboards.

</li><li><a title="State of Software Distribution - 2018" rel="nofollow" href="https://go.kollective.com/state-of-software-distribution.html">State of Software Distribution - 2018</a> &mdash; Few enterprises possess the ability to deploy the latest software and security patches at scale, putting their cybersecurity and business performance at risk. In the 2018 State of Software Distribution Report, we explore why IT decision makers say they struggle to keep up with the software distribution needs of the modern enterprise.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 380: Terminal Fault</title>
  <link>https://techsnap.systems/380</link>
  <guid isPermaLink="false">44b08775-8ecf-4c05-a1a7-a0888abfaadc</guid>
  <pubDate>Thu, 16 Aug 2018 16:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/44b08775-8ecf-4c05-a1a7-a0888abfaadc.mp3" length="27607345" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers.</itunes:subtitle>
  <itunes:duration>32:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers. 
</description>
  <itunes:keywords>Meltdown, Speculative Execution, Foreshadow, L1TF, Spectre, Page Tables, CPU, Intel, L1 Cache, L1 Terminal Fault, Cabot, Nagios, Windows, SMS, Two Factor Auth, Windows, Windows Console, ConPTY, InPrivate, PTY, SGX, Virtualization, Hyperthreading, sysadmin podcast, techsnap</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hanging Up on Mobile in the Name of Security" rel="nofollow" href="https://krebsonsecurity.com/2018/08/hanging-up-on-mobile-in-the-name-of-security/">Hanging Up on Mobile in the Name of Security</a></li><li><a title="Windows 10 Enterprise Getting &quot;InPrivate Desktop&quot; Sandboxed Execution Feature" rel="nofollow" href="https://www.bleepingcomputer.com/news/microsoft/windows-10-enterprise-getting-inprivate-desktop-sandboxed-execution-feature/">Windows 10 Enterprise Getting "InPrivate Desktop" Sandboxed Execution Feature</a></li><li><a title="Introducing the Windows Pseudo Console (ConPTY)" rel="nofollow" href="https://blogs.msdn.microsoft.com/commandline/2018/08/02/windows-command-line-introducing-the-windows-pseudo-console-conpty/">Introducing the Windows Pseudo Console (ConPTY)</a></li><li><a title="Understanding L1 Terminal Fault aka Foreshadow" rel="nofollow" href="https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know">Understanding L1 Terminal Fault aka Foreshadow</a></li><li><a title="Merge L1 Terminal Fault fixes from Thomas Gleixner" rel="nofollow" href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=958f338e96f874a0d29442396d6adf9c1e17aa2d">Merge L1 Terminal Fault fixes from Thomas Gleixner</a></li><li><a title="Cabot: Self-hosted, easily-deployable monitoring and alerts service" rel="nofollow" href="https://github.com/arachnys/cabot">Cabot: Self-hosted, easily-deployable monitoring and alerts service</a></li><li><a title="cabotapp/cabot - Docker Hub" rel="nofollow" href="https://hub.docker.com/r/cabotapp/cabot/">cabotapp/cabot - Docker Hub</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hanging Up on Mobile in the Name of Security" rel="nofollow" href="https://krebsonsecurity.com/2018/08/hanging-up-on-mobile-in-the-name-of-security/">Hanging Up on Mobile in the Name of Security</a></li><li><a title="Windows 10 Enterprise Getting &quot;InPrivate Desktop&quot; Sandboxed Execution Feature" rel="nofollow" href="https://www.bleepingcomputer.com/news/microsoft/windows-10-enterprise-getting-inprivate-desktop-sandboxed-execution-feature/">Windows 10 Enterprise Getting "InPrivate Desktop" Sandboxed Execution Feature</a></li><li><a title="Introducing the Windows Pseudo Console (ConPTY)" rel="nofollow" href="https://blogs.msdn.microsoft.com/commandline/2018/08/02/windows-command-line-introducing-the-windows-pseudo-console-conpty/">Introducing the Windows Pseudo Console (ConPTY)</a></li><li><a title="Understanding L1 Terminal Fault aka Foreshadow" rel="nofollow" href="https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know">Understanding L1 Terminal Fault aka Foreshadow</a></li><li><a title="Merge L1 Terminal Fault fixes from Thomas Gleixner" rel="nofollow" href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=958f338e96f874a0d29442396d6adf9c1e17aa2d">Merge L1 Terminal Fault fixes from Thomas Gleixner</a></li><li><a title="Cabot: Self-hosted, easily-deployable monitoring and alerts service" rel="nofollow" href="https://github.com/arachnys/cabot">Cabot: Self-hosted, easily-deployable monitoring and alerts service</a></li><li><a title="cabotapp/cabot - Docker Hub" rel="nofollow" href="https://hub.docker.com/r/cabotapp/cabot/">cabotapp/cabot - Docker Hub</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 379: SegmentSmack is Whack</title>
  <link>https://techsnap.systems/379</link>
  <guid isPermaLink="false">7165f792-e1bf-4676-9d9e-2a2cc981db5c</guid>
  <pubDate>Fri, 10 Aug 2018 14:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7165f792-e1bf-4676-9d9e-2a2cc981db5c.mp3" length="24883696" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </itunes:subtitle>
  <itunes:duration>29:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. 
It’s a busy TechSNAP week.
</description>
  <itunes:keywords>SegmentSmack, FreeBSD, Linux, UEFI remote attack, Buffer overflow, GitHub Audit, TruffleHog, GitRob, undersea datacenter, homebrew, Eric Holmes, Sysadmin podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </p>

<p>It’s a busy TechSNAP week.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code" rel="nofollow" href="https://securitytracker.com/id/1041415">HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code</a></li><li><a title="Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news" rel="nofollow" href="https://threatpost.com/update-mechanism-flaws-allow-remote-attacks-on-uefi-firmware/134785/">Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news</a></li><li><a title="How I gained commit access to Homebrew in 30 minutes" rel="nofollow" href="https://medium.com/@vesirin/how-i-gained-commit-access-to-homebrew-in-30-minutes-2ae314df03ab">How I gained commit access to Homebrew in 30 minutes</a></li><li><a title="Reconnaissance tool for GitHub organizations" rel="nofollow" href="https://github.com/michenriksen/gitrob">Reconnaissance tool for GitHub organizations</a></li><li><a title="TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history" rel="nofollow" href="https://github.com/dxa4481/truffleHog">TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history</a></li><li><a title="BFG Repo-Cleaner by rtyley" rel="nofollow" href="https://rtyley.github.io/bfg-repo-cleaner/">BFG Repo-Cleaner by rtyley</a></li><li><a title="TCP implementations vulnerable to Denial of Service" rel="nofollow" href="https://www.kb.cert.org/vuls/id/962459">TCP implementations vulnerable to Denial of Service</a></li><li><a title="SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]" rel="nofollow" href="https://access.redhat.com/articles/3553061">SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]</a></li><li><a title="Merge branch &#39;tcp-robust-ooo&#39; · torvalds/linux" rel="nofollow" href="https://github.com/torvalds/linux/commit/1a4f14bab1868b443f0dd3c55b689a478f82e72e">Merge branch 'tcp-robust-ooo' · torvalds/linux</a></li><li><a title="New Sysadmin dealing with stress." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/95od7h/new_sysadmin_dealing_with_stress/">New Sysadmin dealing with stress.</a></li><li><a title="Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data" rel="nofollow" href="https://www.theverge.com/tldr/2018/8/9/17669936/microsoft-undersea-datacenter-webcam">Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </p>

<p>It’s a busy TechSNAP week.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code" rel="nofollow" href="https://securitytracker.com/id/1041415">HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code</a></li><li><a title="Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news" rel="nofollow" href="https://threatpost.com/update-mechanism-flaws-allow-remote-attacks-on-uefi-firmware/134785/">Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news</a></li><li><a title="How I gained commit access to Homebrew in 30 minutes" rel="nofollow" href="https://medium.com/@vesirin/how-i-gained-commit-access-to-homebrew-in-30-minutes-2ae314df03ab">How I gained commit access to Homebrew in 30 minutes</a></li><li><a title="Reconnaissance tool for GitHub organizations" rel="nofollow" href="https://github.com/michenriksen/gitrob">Reconnaissance tool for GitHub organizations</a></li><li><a title="TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history" rel="nofollow" href="https://github.com/dxa4481/truffleHog">TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history</a></li><li><a title="BFG Repo-Cleaner by rtyley" rel="nofollow" href="https://rtyley.github.io/bfg-repo-cleaner/">BFG Repo-Cleaner by rtyley</a></li><li><a title="TCP implementations vulnerable to Denial of Service" rel="nofollow" href="https://www.kb.cert.org/vuls/id/962459">TCP implementations vulnerable to Denial of Service</a></li><li><a title="SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]" rel="nofollow" href="https://access.redhat.com/articles/3553061">SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]</a></li><li><a title="Merge branch &#39;tcp-robust-ooo&#39; · torvalds/linux" rel="nofollow" href="https://github.com/torvalds/linux/commit/1a4f14bab1868b443f0dd3c55b689a478f82e72e">Merge branch 'tcp-robust-ooo' · torvalds/linux</a></li><li><a title="New Sysadmin dealing with stress." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/95od7h/new_sysadmin_dealing_with_stress/">New Sysadmin dealing with stress.</a></li><li><a title="Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data" rel="nofollow" href="https://www.theverge.com/tldr/2018/8/9/17669936/microsoft-undersea-datacenter-webcam">Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 378: Two-Factor Fraud</title>
  <link>https://techsnap.systems/378</link>
  <guid isPermaLink="false">3ec742ee-24f7-4eee-a5a0-c40c5248e31b</guid>
  <pubDate>Thu, 02 Aug 2018 18:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/3ec742ee-24f7-4eee-a5a0-c40c5248e31b.mp3" length="27355773" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</itunes:subtitle>
  <itunes:duration>31:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.
Plus a Spectre attack over the network, BGP issues take out Telegram, and more! 
</description>
  <itunes:keywords>Spectre, NetSpectre, Verizon leak, S3, NICE, BGP, Telegram, Duo Security, Cisco, Two-Factor Authentication, SMS, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</p>

<p>Plus a Spectre attack over the network, BGP issues take out Telegram, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hey, don&#39;t route the messenger! Telegram redirected through Iran by baffling BGP leak" rel="nofollow" href="https://www.theregister.co.uk/2018/08/01/bgp_route_leak_telegram_iran/">Hey, don't route the messenger! Telegram redirected through Iran by baffling BGP leak</a></li><li><a title="Finding and Diagnosing BGP Route Leaks" rel="nofollow" href="https://blog.thousandeyes.com/finding-and-diagnosing-bgp-route-leaks/">Finding and Diagnosing BGP Route Leaks</a></li><li><a title="Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts" rel="nofollow" href="https://www.upguard.com/breaches/verizon-cloud-leak">Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts</a></li><li><a title="New Spectre attack enables secrets to be leaked over a network" rel="nofollow" href="https://arstechnica.com/gadgets/2018/07/new-spectre-attack-enables-secrets-to-be-leaked-over-a-network/">New Spectre attack enables secrets to be leaked over a network</a></li><li><a title="NetSpectre: Read Arbitrary Memory over Network" rel="nofollow" href="https://arxiv.org/abs/1807.10535">NetSpectre: Read Arbitrary Memory over Network</a></li><li><a title="Password breach teaches Reddit that, yes, phone-based 2FA is that bad" rel="nofollow" href="https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/">Password breach teaches Reddit that, yes, phone-based 2FA is that bad</a></li><li><a title="We had a security incident." rel="nofollow" href="https://www.reddit.com/r/announcements/comments/93qnm5/we_had_a_security_incident_heres_what_you_need_to/?st=JKBEHH8G&amp;sh=562ab497">We had a security incident.</a></li><li><a title="Google Employees Use a Physical Token as Their Second Authentication Factor" rel="nofollow" href="https://www.schneier.com/blog/archives/2018/07/google_employee.html">Google Employees Use a Physical Token as Their Second Authentication Factor</a></li><li><a title="Cisco is buying Duo Security for $2.35B in cash" rel="nofollow" href="https://techcrunch.com/2018/08/02/cisco-is-buying-duo-security-for-2-35b-in-cash/">Cisco is buying Duo Security for $2.35B in cash</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</p>

<p>Plus a Spectre attack over the network, BGP issues take out Telegram, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hey, don&#39;t route the messenger! Telegram redirected through Iran by baffling BGP leak" rel="nofollow" href="https://www.theregister.co.uk/2018/08/01/bgp_route_leak_telegram_iran/">Hey, don't route the messenger! Telegram redirected through Iran by baffling BGP leak</a></li><li><a title="Finding and Diagnosing BGP Route Leaks" rel="nofollow" href="https://blog.thousandeyes.com/finding-and-diagnosing-bgp-route-leaks/">Finding and Diagnosing BGP Route Leaks</a></li><li><a title="Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts" rel="nofollow" href="https://www.upguard.com/breaches/verizon-cloud-leak">Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts</a></li><li><a title="New Spectre attack enables secrets to be leaked over a network" rel="nofollow" href="https://arstechnica.com/gadgets/2018/07/new-spectre-attack-enables-secrets-to-be-leaked-over-a-network/">New Spectre attack enables secrets to be leaked over a network</a></li><li><a title="NetSpectre: Read Arbitrary Memory over Network" rel="nofollow" href="https://arxiv.org/abs/1807.10535">NetSpectre: Read Arbitrary Memory over Network</a></li><li><a title="Password breach teaches Reddit that, yes, phone-based 2FA is that bad" rel="nofollow" href="https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/">Password breach teaches Reddit that, yes, phone-based 2FA is that bad</a></li><li><a title="We had a security incident." rel="nofollow" href="https://www.reddit.com/r/announcements/comments/93qnm5/we_had_a_security_incident_heres_what_you_need_to/?st=JKBEHH8G&amp;sh=562ab497">We had a security incident.</a></li><li><a title="Google Employees Use a Physical Token as Their Second Authentication Factor" rel="nofollow" href="https://www.schneier.com/blog/archives/2018/07/google_employee.html">Google Employees Use a Physical Token as Their Second Authentication Factor</a></li><li><a title="Cisco is buying Duo Security for $2.35B in cash" rel="nofollow" href="https://techcrunch.com/2018/08/02/cisco-is-buying-duo-security-for-2-35b-in-cash/">Cisco is buying Duo Security for $2.35B in cash</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 377: Linux Under Pressure</title>
  <link>https://techsnap.systems/377</link>
  <guid isPermaLink="false">01754d0c-6956-4f6e-a545-e7ec9f178bb5</guid>
  <pubDate>Wed, 01 Aug 2018 10:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/01754d0c-6956-4f6e-a545-e7ec9f178bb5.mp3" length="25089856" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</itunes:subtitle>
  <itunes:duration>29:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.
Plus the death of a TLD, the return of SamSam, and more! 
</description>
  <itunes:keywords>PSI, oomd, Facebook, out-of-memory, oom, SamSam, Ransomeware, Malware, cryptoware, Open source Jobs, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="psi: pressure stall information for CPU, memory, and IO v2" rel="nofollow" href="https://lwn.net/Articles/759658/">psi: pressure stall information for CPU, memory, and IO v2</a> &mdash; PSI aggregates and reports the overall wallclock time in which the
tasks in a system (or cgroup) wait for contended hardware resources.</li><li><a title="Chinese “hackers” are sending malware via snail mail" rel="nofollow" href="https://techcrunch.com/2018/07/30/chinese-hackers-are-sending-malware-via-snail-mail/">Chinese “hackers” are sending malware via snail mail</a> &mdash; The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.</li><li><a title="The death of a TLD" rel="nofollow" href="https://blog.benjojo.co.uk/post/the-death-of-a-tld">The death of a TLD</a></li><li><a title="SamSam: The (almost) $6 million ransomware" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/07/31/samsam-the-almost-6-million-ransomware/">SamSam: The (almost) $6 million ransomware</a> &mdash; Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.</li><li><a title="Open sourcing oomd, a new approach to handling OOMs" rel="nofollow" href="https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/">Open sourcing oomd, a new approach to handling OOMs</a> &mdash; As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.</li><li><a title="Tyler&#39;s recent job story" rel="nofollow" href="https://pastebin.com/FnfbWygS">Tyler's recent job story</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="psi: pressure stall information for CPU, memory, and IO v2" rel="nofollow" href="https://lwn.net/Articles/759658/">psi: pressure stall information for CPU, memory, and IO v2</a> &mdash; PSI aggregates and reports the overall wallclock time in which the
tasks in a system (or cgroup) wait for contended hardware resources.</li><li><a title="Chinese “hackers” are sending malware via snail mail" rel="nofollow" href="https://techcrunch.com/2018/07/30/chinese-hackers-are-sending-malware-via-snail-mail/">Chinese “hackers” are sending malware via snail mail</a> &mdash; The trick is simple: a package arrives with a Chinese postmark containing a rambling message and a small CD. The CD, in turn, contains a set of Word files that include script-based malware. These scripts run when the victims access them on their computers, presumably resulting in compromised systems.</li><li><a title="The death of a TLD" rel="nofollow" href="https://blog.benjojo.co.uk/post/the-death-of-a-tld">The death of a TLD</a></li><li><a title="SamSam: The (almost) $6 million ransomware" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/07/31/samsam-the-almost-6-million-ransomware/">SamSam: The (almost) $6 million ransomware</a> &mdash; Through original analysis, interviews and research, and by collaborating closely with industry partners and a specialist cryptocurrency monitoring organisation, Sophos has uncovered new details about how the secretive and sophisticated SamSam ransomware is used, who’s been targeted, how it works and how it’s evolving.</li><li><a title="Open sourcing oomd, a new approach to handling OOMs" rel="nofollow" href="https://code.fb.com/production-engineering/open-sourcing-oomd-a-new-approach-to-handling-ooms/">Open sourcing oomd, a new approach to handling OOMs</a> &mdash; As our infrastructure has scaled, we’ve found that an increasing fraction of our machines and networks span multiple generations. One side effect of this multigenerational production environment is that a new software release or configuration change might result in a system running healthily on one machine but experiencing an out-of-memory (OOM) issue on another.</li><li><a title="Tyler&#39;s recent job story" rel="nofollow" href="https://pastebin.com/FnfbWygS">Tyler's recent job story</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 375: Surprise Root Access</title>
  <link>https://techsnap.systems/375</link>
  <guid isPermaLink="false">a818e1e6-8b7b-452a-bdb8-8967dd8e3f0c</guid>
  <pubDate>Thu, 19 Jul 2018 20:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a818e1e6-8b7b-452a-bdb8-8967dd8e3f0c.mp3" length="30682489" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</itunes:subtitle>
  <itunes:duration>35:54</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.
Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more "undocumented" root passwords.
</description>
  <itunes:keywords>Google Cloud Outage, Botnet, backdoor root, MDM, iPhone, Election Systems &amp; Software, backup Strategy, sysadmin podcast, techsnap</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Google&#39;s Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</p>

<p>Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more &quot;undocumented&quot; root passwords.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/cisco-removes-undocumented-root-password-from-bandwidth-monitoring-software/">Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software</a></li><li><a title="Google Cloud Platform reports issues; Snapchat and other popular apps affected" rel="nofollow" href="https://www.cnbc.com/2018/07/13/google-cloud-platform-reports-issues-snap-and-other-popular-apps-affe.html">Google Cloud Platform reports issues; Snapchat and other popular apps affected</a></li><li><a title="Google Cloud Status Dashboard" rel="nofollow" href="https://status.cloud.google.com/incident/cloud-networking/18012?m=1">Google Cloud Status Dashboard</a></li><li><a title="Bogus Mobile Device Management system used to hack iPhones in India • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/07/13/bogus_mdm_iphone_snooping_india/">Bogus Mobile Device Management system used to hack iPhones in India • The Register</a></li><li><a title="A major election software maker allowed remote access on its systems for years - The Verge" rel="nofollow" href="https://www.theverge.com/2018/7/17/17582818/election-software-maker-remote-access-voting-machine">A major election software maker allowed remote access on its systems for years - The Verge</a></li><li><a title="Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/router-crapfest-malware-author-builds-18-000-strong-botnet-in-a-day/">Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day</a></li><li><a title="Anian wants to lean better backup" rel="nofollow" href="https://pastebin.com/JKCVLWwA">Anian wants to lean better backup</a></li><li><a title="How To Choose an Effective Backup Strategy for your VPS | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-choose-an-effective-backup-strategy-for-your-vps">How To Choose an Effective Backup Strategy for your VPS | DigitalOcean</a></li><li><a title="Tarsnap - Online backups for the truly paranoid" rel="nofollow" href="http://www.tarsnap.com/">Tarsnap - Online backups for the truly paranoid</a></li><li><a title="Borg Documentation — Borg - Deduplicating Archiver 1.1.6 documentation" rel="nofollow" href="https://borgbackup.readthedocs.io/en/stable/">Borg Documentation — Borg - Deduplicating Archiver 1.1.6 documentation</a></li><li><a title="borgmatic" rel="nofollow" href="https://torsion.org/borgmatic/">borgmatic</a></li><li><a title="duplicity: Main" rel="nofollow" href="http://duplicity.nongnu.org/">duplicity: Main</a></li><li><a title="restic · Backups done right!" rel="nofollow" href="https://restic.net/">restic · Backups done right!</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Google&#39;s Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</p>

<p>Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more &quot;undocumented&quot; root passwords.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/cisco-removes-undocumented-root-password-from-bandwidth-monitoring-software/">Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software</a></li><li><a title="Google Cloud Platform reports issues; Snapchat and other popular apps affected" rel="nofollow" href="https://www.cnbc.com/2018/07/13/google-cloud-platform-reports-issues-snap-and-other-popular-apps-affe.html">Google Cloud Platform reports issues; Snapchat and other popular apps affected</a></li><li><a title="Google Cloud Status Dashboard" rel="nofollow" href="https://status.cloud.google.com/incident/cloud-networking/18012?m=1">Google Cloud Status Dashboard</a></li><li><a title="Bogus Mobile Device Management system used to hack iPhones in India • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/07/13/bogus_mdm_iphone_snooping_india/">Bogus Mobile Device Management system used to hack iPhones in India • The Register</a></li><li><a title="A major election software maker allowed remote access on its systems for years - The Verge" rel="nofollow" href="https://www.theverge.com/2018/7/17/17582818/election-software-maker-remote-access-voting-machine">A major election software maker allowed remote access on its systems for years - The Verge</a></li><li><a title="Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/router-crapfest-malware-author-builds-18-000-strong-botnet-in-a-day/">Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day</a></li><li><a title="Anian wants to lean better backup" rel="nofollow" href="https://pastebin.com/JKCVLWwA">Anian wants to lean better backup</a></li><li><a title="How To Choose an Effective Backup Strategy for your VPS | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-choose-an-effective-backup-strategy-for-your-vps">How To Choose an Effective Backup Strategy for your VPS | DigitalOcean</a></li><li><a title="Tarsnap - Online backups for the truly paranoid" rel="nofollow" href="http://www.tarsnap.com/">Tarsnap - Online backups for the truly paranoid</a></li><li><a title="Borg Documentation — Borg - Deduplicating Archiver 1.1.6 documentation" rel="nofollow" href="https://borgbackup.readthedocs.io/en/stable/">Borg Documentation — Borg - Deduplicating Archiver 1.1.6 documentation</a></li><li><a title="borgmatic" rel="nofollow" href="https://torsion.org/borgmatic/">borgmatic</a></li><li><a title="duplicity: Main" rel="nofollow" href="http://duplicity.nongnu.org/">duplicity: Main</a></li><li><a title="restic · Backups done right!" rel="nofollow" href="https://restic.net/">restic · Backups done right!</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 374: Quantum Resistant Encryption</title>
  <link>https://techsnap.systems/374</link>
  <guid isPermaLink="false">7a87af82-bd6a-4e38-8986-767b339b094b</guid>
  <pubDate>Fri, 13 Jul 2018 05:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7a87af82-bd6a-4e38-8986-767b339b094b.mp3" length="40621792" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</itunes:subtitle>
  <itunes:duration>47:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.
Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!
</description>
  <itunes:keywords>Quantum Computing, cryptography, qubits, Post-Quantum Cryptography project, Timehop, Default FTP Password, Netgear, Nighthawk R7000, MQ-9 Reaper, post-quantum resistance, LTE attack, alter attack, sysadmin podcast, techsnap</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</p>

<p>Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hacker-steals-military-docs-because-someone-didn-t-change-a-default-ftp-password/">Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password</a></li><li><a title="Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear | The first stop for security news" rel="nofollow" href="https://threatpost.com/year-old-critical-vulnerabilities-patched-in-isp-broadband-gear/133702/">Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear | The first stop for security news</a></li><li><a title="Timehop admits that additional personal data was compromised in breach" rel="nofollow" href="https://techcrunch.com/2018/07/11/timehop-data-breach/">Timehop admits that additional personal data was compromised in breach</a></li><li><a title="Researchers Uncover New Attacks Against LTE Network Protocol" rel="nofollow" href="https://thehackernews.com/2018/06/4g-lte-network-hacking.html">Researchers Uncover New Attacks Against LTE Network Protocol</a></li><li><a title="Breaking LTE on Layer Two" rel="nofollow" href="https://www.alter-attack.net/">Breaking LTE on Layer Two</a></li><li><a title="Nintendo reportedly rolling out new, more hack-resistant Switch hardware" rel="nofollow" href="https://arstechnica.com/gaming/2018/07/nintendo-reportedly-rolling-out-new-more-hack-proof-switch-hardware/">Nintendo reportedly rolling out new, more hack-resistant Switch hardware</a></li><li><a title="Wire and post-quantum resistance" rel="nofollow" href="https://blog.wire.com/blog/post-quantum-resistance-wire/">Wire and post-quantum resistance</a></li><li><a title="What is quantum computing?" rel="nofollow" href="https://www.research.ibm.com/ibm-q/learn/what-is-quantum-computing/">What is quantum computing?</a></li><li><a title="Quantum Computing and its Impact on Cryptography" rel="nofollow" href="https://www.cryptomathic.com/news-events/blog/quantum-computing-and-its-impact-on-cryptography">Quantum Computing and its Impact on Cryptography</a></li><li><a title="Why Quantum Computers Might Not Break Cryptography" rel="nofollow" href="https://www.quantamagazine.org/why-quantum-computers-might-not-break-cryptography-20170515/">Why Quantum Computers Might Not Break Cryptography</a></li><li><a title="Remote Manage Linux Boxes?" rel="nofollow" href="https://pastebin.com/fb7qDb9q">Remote Manage Linux Boxes?</a></li><li><a title="Learning OpenStack?" rel="nofollow" href="https://pastebin.com/JQspmLM9">Learning OpenStack?</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</p>

<p>Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hacker-steals-military-docs-because-someone-didn-t-change-a-default-ftp-password/">Hacker Steals Military Docs Because Someone Didn’t Change a Default FTP Password</a></li><li><a title="Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear | The first stop for security news" rel="nofollow" href="https://threatpost.com/year-old-critical-vulnerabilities-patched-in-isp-broadband-gear/133702/">Year-Old Critical Vulnerabilities Patched in ISP Broadband Gear | The first stop for security news</a></li><li><a title="Timehop admits that additional personal data was compromised in breach" rel="nofollow" href="https://techcrunch.com/2018/07/11/timehop-data-breach/">Timehop admits that additional personal data was compromised in breach</a></li><li><a title="Researchers Uncover New Attacks Against LTE Network Protocol" rel="nofollow" href="https://thehackernews.com/2018/06/4g-lte-network-hacking.html">Researchers Uncover New Attacks Against LTE Network Protocol</a></li><li><a title="Breaking LTE on Layer Two" rel="nofollow" href="https://www.alter-attack.net/">Breaking LTE on Layer Two</a></li><li><a title="Nintendo reportedly rolling out new, more hack-resistant Switch hardware" rel="nofollow" href="https://arstechnica.com/gaming/2018/07/nintendo-reportedly-rolling-out-new-more-hack-proof-switch-hardware/">Nintendo reportedly rolling out new, more hack-resistant Switch hardware</a></li><li><a title="Wire and post-quantum resistance" rel="nofollow" href="https://blog.wire.com/blog/post-quantum-resistance-wire/">Wire and post-quantum resistance</a></li><li><a title="What is quantum computing?" rel="nofollow" href="https://www.research.ibm.com/ibm-q/learn/what-is-quantum-computing/">What is quantum computing?</a></li><li><a title="Quantum Computing and its Impact on Cryptography" rel="nofollow" href="https://www.cryptomathic.com/news-events/blog/quantum-computing-and-its-impact-on-cryptography">Quantum Computing and its Impact on Cryptography</a></li><li><a title="Why Quantum Computers Might Not Break Cryptography" rel="nofollow" href="https://www.quantamagazine.org/why-quantum-computers-might-not-break-cryptography-20170515/">Why Quantum Computers Might Not Break Cryptography</a></li><li><a title="Remote Manage Linux Boxes?" rel="nofollow" href="https://pastebin.com/fb7qDb9q">Remote Manage Linux Boxes?</a></li><li><a title="Learning OpenStack?" rel="nofollow" href="https://pastebin.com/JQspmLM9">Learning OpenStack?</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 373: FreeBSD Already Does That</title>
  <link>https://techsnap.systems/373</link>
  <guid isPermaLink="false">0888564b-a3e6-446c-9713-e9f8dbad9f5a</guid>
  <pubDate>Thu, 05 Jul 2018 07:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/0888564b-a3e6-446c-9713-e9f8dbad9f5a.mp3" length="69344769" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.</itunes:subtitle>
  <itunes:duration>1:35:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.
Joined by Jed and Jeff they have a wide ranging organic conversation.  Special Guest: Allan Jude.
</description>
  <itunes:keywords>Stock exchange outage, UPS Failure, Server Rack Death, solar, IT culture, sysadmin podcast, techsnap</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.</p>

<p>Joined by Jed and Jeff they have a wide ranging organic conversation. </p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.</p>

<p>Joined by Jed and Jeff they have a wide ranging organic conversation. </p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 372: Logs and Metrics and Traces, Oh My!</title>
  <link>https://techsnap.systems/372</link>
  <guid isPermaLink="false">202308b7-ed73-4cec-bfff-12b25ddb621d</guid>
  <pubDate>Thu, 14 Jun 2018 16:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/202308b7-ed73-4cec-bfff-12b25ddb621d.mp3" length="30772128" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.</itunes:subtitle>
  <itunes:duration>36:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.
Plus the Lazy State FPU bug that cropped up this week, backdoored Docker images, your questions, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.</p>

<p>Plus the Lazy State FPU bug that cropped up this week, backdoored Docker images, your questions, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="INTEL-SA-00145" rel="nofollow" href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html">INTEL-SA-00145</a></li><li><a title="Colin Percival on Twitter" rel="nofollow" href="https://twitter.com/cperciva/status/1007010583244230656">Colin Percival on Twitter</a></li><li><a title="NetBSD Documentation: How lazy FPU context switch works" rel="nofollow" href="http://www.netbsd.org/docs/kernel/lazyfpu.html">NetBSD Documentation: How lazy FPU context switch works</a></li><li><a title="Lazy FPU Save/Restore (CVE-2018-3665)" rel="nofollow" href="https://access.redhat.com/solutions/3485131">Lazy FPU Save/Restore (CVE-2018-3665)</a></li><li><a title="17 Backdoored Docker Images Removed From Docker Hub" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/17-backdoored-docker-images-removed-from-docker-hub/">17 Backdoored Docker Images Removed From Docker Hub</a></li><li><a title="Lessons from Building Observability Tools at Netflix" rel="nofollow" href="https://medium.com/netflix-techblog/lessons-from-building-observability-tools-at-netflix-7cfafed6ab17">Lessons from Building Observability Tools at Netflix</a></li><li><a title="Jobs at Linux Academy" rel="nofollow" href="https://www.linkedin.com/feed/update/urn:li:activity:6413087061917593600">Jobs at Linux Academy</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.</p>

<p>Plus the Lazy State FPU bug that cropped up this week, backdoored Docker images, your questions, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="INTEL-SA-00145" rel="nofollow" href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html">INTEL-SA-00145</a></li><li><a title="Colin Percival on Twitter" rel="nofollow" href="https://twitter.com/cperciva/status/1007010583244230656">Colin Percival on Twitter</a></li><li><a title="NetBSD Documentation: How lazy FPU context switch works" rel="nofollow" href="http://www.netbsd.org/docs/kernel/lazyfpu.html">NetBSD Documentation: How lazy FPU context switch works</a></li><li><a title="Lazy FPU Save/Restore (CVE-2018-3665)" rel="nofollow" href="https://access.redhat.com/solutions/3485131">Lazy FPU Save/Restore (CVE-2018-3665)</a></li><li><a title="17 Backdoored Docker Images Removed From Docker Hub" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/17-backdoored-docker-images-removed-from-docker-hub/">17 Backdoored Docker Images Removed From Docker Hub</a></li><li><a title="Lessons from Building Observability Tools at Netflix" rel="nofollow" href="https://medium.com/netflix-techblog/lessons-from-building-observability-tools-at-netflix-7cfafed6ab17">Lessons from Building Observability Tools at Netflix</a></li><li><a title="Jobs at Linux Academy" rel="nofollow" href="https://www.linkedin.com/feed/update/urn:li:activity:6413087061917593600">Jobs at Linux Academy</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 371: They Never Learn</title>
  <link>https://techsnap.systems/371</link>
  <guid isPermaLink="false">6c8e575e-ede8-4bae-b569-b82e0be33374</guid>
  <pubDate>Thu, 07 Jun 2018 15:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/6c8e575e-ede8-4bae-b569-b82e0be33374.mp3" length="37806547" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.</itunes:subtitle>
  <itunes:duration>44:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.
Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more. 
</description>
  <content:encoded>
    <![CDATA[<p>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.</p>

<p>Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Microsoft sinks data centre off Orkney" rel="nofollow" href="https://www.bbc.com/news/technology-44368813">Microsoft sinks data centre off Orkney</a></li><li><a title="How to protect yourself from megabreaches like the one that hit Ticketfly" rel="nofollow" href="https://arstechnica.com/information-technology/2018/06/how-to-protect-yourself-from-megabreaches-like-the-one-that-hit-ticketfly/">How to protect yourself from megabreaches like the one that hit Ticketfly</a></li><li><a title="Three months later, a mass exploit of powerful Web servers continues" rel="nofollow" href="https://arstechnica.com/information-technology/2018/06/three-months-later-a-mass-exploit-of-powerful-web-servers-continues/">Three months later, a mass exploit of powerful Web servers continues</a></li><li><a title="Breach detection with Linux filesystem forensics" rel="nofollow" href="https://opensource.com/article/18/4/linux-filesystem-forensics?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_79">Breach detection with Linux filesystem forensics</a></li><li><a title="Zip Slip Vulnerability" rel="nofollow" href="https://snyk.io/research/zip-slip-vulnerability">Zip Slip Vulnerability</a></li><li><a title="VPNFilter Update" rel="nofollow" href="https://blog.talosintelligence.com/2018/06/vpnfilter-update.html?m=1">VPNFilter Update</a></li><li><a title="RouterSploit: Exploitation Framework for Embedded Devices" rel="nofollow" href="https://github.com/threat9/routersploit">RouterSploit: Exploitation Framework for Embedded Devices</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.</p>

<p>Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Microsoft sinks data centre off Orkney" rel="nofollow" href="https://www.bbc.com/news/technology-44368813">Microsoft sinks data centre off Orkney</a></li><li><a title="How to protect yourself from megabreaches like the one that hit Ticketfly" rel="nofollow" href="https://arstechnica.com/information-technology/2018/06/how-to-protect-yourself-from-megabreaches-like-the-one-that-hit-ticketfly/">How to protect yourself from megabreaches like the one that hit Ticketfly</a></li><li><a title="Three months later, a mass exploit of powerful Web servers continues" rel="nofollow" href="https://arstechnica.com/information-technology/2018/06/three-months-later-a-mass-exploit-of-powerful-web-servers-continues/">Three months later, a mass exploit of powerful Web servers continues</a></li><li><a title="Breach detection with Linux filesystem forensics" rel="nofollow" href="https://opensource.com/article/18/4/linux-filesystem-forensics?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_79">Breach detection with Linux filesystem forensics</a></li><li><a title="Zip Slip Vulnerability" rel="nofollow" href="https://snyk.io/research/zip-slip-vulnerability">Zip Slip Vulnerability</a></li><li><a title="VPNFilter Update" rel="nofollow" href="https://blog.talosintelligence.com/2018/06/vpnfilter-update.html?m=1">VPNFilter Update</a></li><li><a title="RouterSploit: Exploitation Framework for Embedded Devices" rel="nofollow" href="https://github.com/threat9/routersploit">RouterSploit: Exploitation Framework for Embedded Devices</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 370: Hidden in Plain Sight</title>
  <link>https://techsnap.systems/370</link>
  <guid isPermaLink="false">cbe34348-d2f2-41f1-8480-38bdbc5dd8ce</guid>
  <pubDate>Fri, 01 Jun 2018 08:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cbe34348-d2f2-41f1-8480-38bdbc5dd8ce.mp3" length="43765885" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</itunes:subtitle>
  <itunes:duration>51:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.
Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about. 
</description>
  <content:encoded>
    <![CDATA[<p>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</p>

<p>Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hiding Information in Plain Text - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/tech-talk/computing/software/hiding-information-in-plain-text">Hiding Information in Plain Text - IEEE Spectrum</a></li><li><a title="Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog" rel="nofollow" href="https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/">Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog</a></li><li><a title="When to use git subtree? - Stack Overflow" rel="nofollow" href="https://stackoverflow.com/questions/32407634/when-to-use-git-subtree">When to use git subtree? - Stack Overflow</a></li><li><a title="Ghostery Email Incident Update - Ghostery" rel="nofollow" href="https://www.ghostery.com/blog/ghostery-news/ghostery-email-incident-update/">Ghostery Email Incident Update - Ghostery</a></li><li><a title="Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/05/23/surprise-student-receives-36000-google-bug-bounty-for-rce-flaw/">Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security</a></li><li><a title="SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/nefarious-actors-may-have-abused-routing-protocol-to-spy-on-us-phone-users/">SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica</a></li><li><a title="SnoopSnitch - Apps on Google Play" rel="nofollow" href="https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&amp;hl=en_US">SnoopSnitch - Apps on Google Play</a></li><li><a title="Kubernetes Containerd Integration Goes GA - Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/05/24/kubernetes-containerd-integration-goes-ga/">Kubernetes Containerd Integration Goes GA - Kubernetes</a></li><li><a title="Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware/">Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica</a></li><li><a title="FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers/">FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica</a></li><li><a title="Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/singapore-isp-leaves-1000-routers-open-to-attack/132315/">Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news</a></li><li><a title="Don&#39;t let Frank near the server" rel="nofollow" href="https://pastebin.com/sM9QicJE">Don't let Frank near the server</a></li><li><a title="Dave decides to move some plugs... " rel="nofollow" href="https://pastebin.com/PCNtN439">Dave decides to move some plugs... </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.</p>

<p>Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should know about.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hiding Information in Plain Text - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/tech-talk/computing/software/hiding-information-in-plain-text">Hiding Information in Plain Text - IEEE Spectrum</a></li><li><a title="Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog" rel="nofollow" href="https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/">Remediating the May 2018 Git Security Vulnerability – Microsoft DevOps Blog</a></li><li><a title="When to use git subtree? - Stack Overflow" rel="nofollow" href="https://stackoverflow.com/questions/32407634/when-to-use-git-subtree">When to use git subtree? - Stack Overflow</a></li><li><a title="Ghostery Email Incident Update - Ghostery" rel="nofollow" href="https://www.ghostery.com/blog/ghostery-news/ghostery-email-incident-update/">Ghostery Email Incident Update - Ghostery</a></li><li><a title="Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/05/23/surprise-student-receives-36000-google-bug-bounty-for-rce-flaw/">Surprise! Student receives $36,000 Google bug bounty for RCE flaw – Naked Security</a></li><li><a title="SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/nefarious-actors-may-have-abused-routing-protocol-to-spy-on-us-phone-users/">SS7 routing-protocol breach of US cellular carrier exposed customer data | Ars Technica</a></li><li><a title="SnoopSnitch - Apps on Google Play" rel="nofollow" href="https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch&amp;hl=en_US">SnoopSnitch - Apps on Google Play</a></li><li><a title="Kubernetes Containerd Integration Goes GA - Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2018/05/24/kubernetes-containerd-integration-goes-ga/">Kubernetes Containerd Integration Goes GA - Kubernetes</a></li><li><a title="Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/hackers-infect-500000-consumer-routers-all-over-the-world-with-malware/">Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica</a></li><li><a title="FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/fbi-seizes-server-russia-allegedly-used-to-infect-500000-consumer-routers/">FBI seizes domain Russia allegedly used to infect 500,000 consumer routers | Ars Technica</a></li><li><a title="Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/singapore-isp-leaves-1000-routers-open-to-attack/132315/">Singapore ISP Leaves 1,000 Routers Open to Attack | Threatpost | The first stop for security news</a></li><li><a title="Don&#39;t let Frank near the server" rel="nofollow" href="https://pastebin.com/sM9QicJE">Don't let Frank near the server</a></li><li><a title="Dave decides to move some plugs... " rel="nofollow" href="https://pastebin.com/PCNtN439">Dave decides to move some plugs... </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 369: Another Pass at Bypass</title>
  <link>https://techsnap.systems/369</link>
  <guid isPermaLink="false">c9e44cac-c711-4e40-a417-2d0ecc5712e7</guid>
  <pubDate>Wed, 23 May 2018 14:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c9e44cac-c711-4e40-a417-2d0ecc5712e7.mp3" length="38084184" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </itunes:subtitle>
  <itunes:duration>44:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. 
Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show. 
</description>
  <content:encoded>
    <![CDATA[<p>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </p>

<p>Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Security Flaw Impacts Electron-Based Apps" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/security-flaw-impacts-electron-based-apps/">Security Flaw Impacts Electron-Based Apps</a></li><li><a title="Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/attackers-use-upnp-to-sidestep-ddos-defenses/131981/">Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news</a></li><li><a title="Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext" rel="nofollow" href="https://thehackernews.com/2018/05/signal-desktop-hacking.html?m=1">Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext</a></li><li><a title="Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/critical-linux-flaw-opens-the-door-to-full-root-access/132034/">Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news</a></li><li><a title="Microsoft, Google: We&#39;ve found a fourth data-leaking Meltdown-Spectre CPU hole • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/05/21/spectre_meltdown_v4_microsoft_google/">Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The Register</a></li><li><a title="Speculative Store Bypass explained: what it is, how it works" rel="nofollow" href="https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works">Speculative Store Bypass explained: what it is, how it works</a></li><li><a title="TechSNAP Episode 351: Performance Meltdown" rel="nofollow" href="http://techsnap.systems/351">TechSNAP Episode 351: Performance Meltdown</a></li><li><a title="Dave&#39;s Users flip the switch!" rel="nofollow" href="https://pastebin.com/LKVFaUYp">Dave's Users flip the switch!</a></li><li><a title="Dave&#39;s War Story is really Screwy!" rel="nofollow" href="https://pastebin.com/tsfjKEhb">Dave's War Story is really Screwy!</a></li><li><a title="Egon&#39;s Adventures in misslabled VMs" rel="nofollow" href="https://pastebin.com/wg4y034g">Egon's Adventures in misslabled VMs</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </p>

<p>Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Security Flaw Impacts Electron-Based Apps" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/security-flaw-impacts-electron-based-apps/">Security Flaw Impacts Electron-Based Apps</a></li><li><a title="Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/attackers-use-upnp-to-sidestep-ddos-defenses/131981/">Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost | The first stop for security news</a></li><li><a title="Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext" rel="nofollow" href="https://thehackernews.com/2018/05/signal-desktop-hacking.html?m=1">Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext</a></li><li><a title="Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news" rel="nofollow" href="https://threatpost.com/critical-linux-flaw-opens-the-door-to-full-root-access/132034/">Critical Linux Flaw Opens the Door to Full Root Access | Threatpost | The first stop for security news</a></li><li><a title="Microsoft, Google: We&#39;ve found a fourth data-leaking Meltdown-Spectre CPU hole • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/05/21/spectre_meltdown_v4_microsoft_google/">Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole • The Register</a></li><li><a title="Speculative Store Bypass explained: what it is, how it works" rel="nofollow" href="https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works">Speculative Store Bypass explained: what it is, how it works</a></li><li><a title="TechSNAP Episode 351: Performance Meltdown" rel="nofollow" href="http://techsnap.systems/351">TechSNAP Episode 351: Performance Meltdown</a></li><li><a title="Dave&#39;s Users flip the switch!" rel="nofollow" href="https://pastebin.com/LKVFaUYp">Dave's Users flip the switch!</a></li><li><a title="Dave&#39;s War Story is really Screwy!" rel="nofollow" href="https://pastebin.com/tsfjKEhb">Dave's War Story is really Screwy!</a></li><li><a title="Egon&#39;s Adventures in misslabled VMs" rel="nofollow" href="https://pastebin.com/wg4y034g">Egon's Adventures in misslabled VMs</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 368: EFail Explained</title>
  <link>https://techsnap.systems/368</link>
  <guid isPermaLink="false">810af786-1ddc-475f-82e7-65a38debf64e</guid>
  <pubDate>Tue, 15 May 2018 12:45:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/810af786-1ddc-475f-82e7-65a38debf64e.mp3" length="31418868" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</itunes:subtitle>
  <itunes:duration>36:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.
Plus things  to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution.  
</description>
  <content:encoded>
    <![CDATA[<p>The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</p>

<p>Plus things  to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution. </p><p>Links:</p><ul><li><a title="The HP-35" rel="nofollow" href="http://codex99.com/design/the-hp35.html">The HP-35</a> &mdash; Consumer Electronics, an Origin Story</li><li><a title="The people cost of building out a Kubernetes cluster on-prem | Operos" rel="nofollow" href="https://www.paxautoma.com/blog/2018/02/28/the-people-cost-of-building-out-kubernetes-cluster-on-prem.html">The people cost of building out a Kubernetes cluster on-prem | Operos</a></li><li><a title="EFAIL" rel="nofollow" href="https://efail.de/">EFAIL</a> &mdash; EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails. </li><li><a title="efail-attack-paper.pdf" rel="nofollow" href="https://efail.de/efail-attack-paper.pdf">efail-attack-paper.pdf</a></li><li><a title="GnuPG Efail press release Response " rel="nofollow" href="https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html">GnuPG Efail press release Response </a></li><li><a title="No, PGP is not broken, not even with the Efail vulnerabilities - ProtonMail Blog" rel="nofollow" href="https://protonmail.com/blog/pgp-vulnerability-efail/">No, PGP is not broken, not even with the Efail vulnerabilities - ProtonMail Blog</a> &mdash; Recently, news broke about potential vulnerabilities in PGP, dubbed Efail. However, despite reports to the contrary, PGP is not actually broken, as we will explain in this post.</li><li><a title="Eric&#39;s War Story is VERY Familiar" rel="nofollow" href="https://pastebin.com/509aJ1PN">Eric's War Story is VERY Familiar</a></li><li><a title="When it rains it pours for Steve" rel="nofollow" href="https://pastebin.com/cMiJQANX">When it rains it pours for Steve</a></li><li><a title="Critical Cisco WebEx Bug Allows Remote Code Execution " rel="nofollow" href="https://threatpost.com/critical-cisco-webex-bug-allows-remote-code-execution/131657/?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_76">Critical Cisco WebEx Bug Allows Remote Code Execution </a></li><li><a title="Cisco WebEx and 3rd Party Support Utilities" rel="nofollow" href="https://collaborationhelp.cisco.com/article/en-us/WBX000026396">Cisco WebEx and 3rd Party Support Utilities</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The EFail hype-train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</p>

<p>Plus things  to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution. </p><p>Links:</p><ul><li><a title="The HP-35" rel="nofollow" href="http://codex99.com/design/the-hp35.html">The HP-35</a> &mdash; Consumer Electronics, an Origin Story</li><li><a title="The people cost of building out a Kubernetes cluster on-prem | Operos" rel="nofollow" href="https://www.paxautoma.com/blog/2018/02/28/the-people-cost-of-building-out-kubernetes-cluster-on-prem.html">The people cost of building out a Kubernetes cluster on-prem | Operos</a></li><li><a title="EFAIL" rel="nofollow" href="https://efail.de/">EFAIL</a> &mdash; EFAIL describes vulnerabilities in the end-to-end encryption technologies OpenPGP and S/MIME that leak the plaintext of encrypted emails. </li><li><a title="efail-attack-paper.pdf" rel="nofollow" href="https://efail.de/efail-attack-paper.pdf">efail-attack-paper.pdf</a></li><li><a title="GnuPG Efail press release Response " rel="nofollow" href="https://lists.gnupg.org/pipermail/gnupg-users/2018-May/060334.html">GnuPG Efail press release Response </a></li><li><a title="No, PGP is not broken, not even with the Efail vulnerabilities - ProtonMail Blog" rel="nofollow" href="https://protonmail.com/blog/pgp-vulnerability-efail/">No, PGP is not broken, not even with the Efail vulnerabilities - ProtonMail Blog</a> &mdash; Recently, news broke about potential vulnerabilities in PGP, dubbed Efail. However, despite reports to the contrary, PGP is not actually broken, as we will explain in this post.</li><li><a title="Eric&#39;s War Story is VERY Familiar" rel="nofollow" href="https://pastebin.com/509aJ1PN">Eric's War Story is VERY Familiar</a></li><li><a title="When it rains it pours for Steve" rel="nofollow" href="https://pastebin.com/cMiJQANX">When it rains it pours for Steve</a></li><li><a title="Critical Cisco WebEx Bug Allows Remote Code Execution " rel="nofollow" href="https://threatpost.com/critical-cisco-webex-bug-allows-remote-code-execution/131657/?utm_campaign=Security%2BNewsletter&amp;utm_source=Security_Newsletter_co_76">Critical Cisco WebEx Bug Allows Remote Code Execution </a></li><li><a title="Cisco WebEx and 3rd Party Support Utilities" rel="nofollow" href="https://collaborationhelp.cisco.com/article/en-us/WBX000026396">Cisco WebEx and 3rd Party Support Utilities</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 367: FreeNAS Uber Build</title>
  <link>https://techsnap.systems/367</link>
  <guid isPermaLink="false">7e453cc2-5a2c-46a3-8ff4-eaec869e0dde</guid>
  <pubDate>Tue, 08 May 2018 17:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7e453cc2-5a2c-46a3-8ff4-eaec869e0dde.mp3" length="31661829" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.</itunes:subtitle>
  <itunes:duration>37:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.
</description>
  <content:encoded>
    <![CDATA[<p>Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Drive-by Rowhammer attack uses GPU to compromise an Android phone | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/drive-by-rowhammer-attack-uses-gpu-to-compromise-an-android-phone/">Drive-by Rowhammer attack uses GPU to compromise an Android phone | Ars Technica</a> &mdash; JavaScript based GLitch pwns browsers by flipping bits inside memory chips.
</li><li><a title="Rooting a Logitech Harmony Hub" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2018/05/rooting-logitech-harmony-hub-improving-iot-security.html">Rooting a Logitech Harmony Hub</a> &mdash; Exploitation of these vulnerabilities from the local network could allow an attacker to control the devices linked to the Hub as well as use the Hub as an execution space to attack other devices on the local network</li><li><a title="A Complete Guide to FreeNAS Hardware Design, Part I: Purpose and Best Practices" rel="nofollow" href="http://www.freenas.org/blog/a-complete-guide-to-freenas-hardware-design-part-i-purpose-and-best-practices/">A Complete Guide to FreeNAS Hardware Design, Part I: Purpose and Best Practices</a> &mdash; If it’s imperative that your ZFS based system must always be available, ECC RAM is a requirement. If it’s only some level of annoying (slightly, moderately…) that you need to restore your ZFS system from backups, non-ECC RAM will fit the bill.</li><li><a title="FreeNAS: A Worst Practices Guide" rel="nofollow" href="http://www.freenas.org/blog/freenas-worst-practices/">FreeNAS: A Worst Practices Guide</a></li><li><a title="Jason likes Hubble" rel="nofollow" href="https://pastebin.com/yEmsXjDX">Jason likes Hubble</a></li><li><a title="Bryan Nuked an email server once..." rel="nofollow" href="https://pastebin.com/kJEZNHwm">Bryan Nuked an email server once...</a></li><li><a title="Humble Book Bundle: DevOps by Packt (pay what you want and help charity)" rel="nofollow" href="https://www.humblebundle.com/books/devops-books">Humble Book Bundle: DevOps by Packt (pay what you want and help charity)</a> &mdash; This software engineering bundle is Packt with information! Streamline your processes with ebooks like Automate it!, DevOps for Networking, Mastering Ansible, and Continuous Delivery with Docker and Jenkins. You'll also get helpful videos including Mastering DevOps, Mastering Windows PowerShell 5 Administration, Learning Kubernetes, and more.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Drive-by Rowhammer attack uses GPU to compromise an Android phone | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2018/05/drive-by-rowhammer-attack-uses-gpu-to-compromise-an-android-phone/">Drive-by Rowhammer attack uses GPU to compromise an Android phone | Ars Technica</a> &mdash; JavaScript based GLitch pwns browsers by flipping bits inside memory chips.
</li><li><a title="Rooting a Logitech Harmony Hub" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2018/05/rooting-logitech-harmony-hub-improving-iot-security.html">Rooting a Logitech Harmony Hub</a> &mdash; Exploitation of these vulnerabilities from the local network could allow an attacker to control the devices linked to the Hub as well as use the Hub as an execution space to attack other devices on the local network</li><li><a title="A Complete Guide to FreeNAS Hardware Design, Part I: Purpose and Best Practices" rel="nofollow" href="http://www.freenas.org/blog/a-complete-guide-to-freenas-hardware-design-part-i-purpose-and-best-practices/">A Complete Guide to FreeNAS Hardware Design, Part I: Purpose and Best Practices</a> &mdash; If it’s imperative that your ZFS based system must always be available, ECC RAM is a requirement. If it’s only some level of annoying (slightly, moderately…) that you need to restore your ZFS system from backups, non-ECC RAM will fit the bill.</li><li><a title="FreeNAS: A Worst Practices Guide" rel="nofollow" href="http://www.freenas.org/blog/freenas-worst-practices/">FreeNAS: A Worst Practices Guide</a></li><li><a title="Jason likes Hubble" rel="nofollow" href="https://pastebin.com/yEmsXjDX">Jason likes Hubble</a></li><li><a title="Bryan Nuked an email server once..." rel="nofollow" href="https://pastebin.com/kJEZNHwm">Bryan Nuked an email server once...</a></li><li><a title="Humble Book Bundle: DevOps by Packt (pay what you want and help charity)" rel="nofollow" href="https://www.humblebundle.com/books/devops-books">Humble Book Bundle: DevOps by Packt (pay what you want and help charity)</a> &mdash; This software engineering bundle is Packt with information! Streamline your processes with ebooks like Automate it!, DevOps for Networking, Mastering Ansible, and Continuous Delivery with Docker and Jenkins. You'll also get helpful videos including Mastering DevOps, Mastering Windows PowerShell 5 Administration, Learning Kubernetes, and more.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 366: Catching up with Allan</title>
  <link>https://techsnap.systems/366</link>
  <guid isPermaLink="false">c3a8238e-1697-4086-90d1-7b9a02d8379c</guid>
  <pubDate>Wed, 02 May 2018 15:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c3a8238e-1697-4086-90d1-7b9a02d8379c.mp3" length="41294844" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</itunes:subtitle>
  <itunes:duration>48:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.
Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop. Special Guest: Allan Jude.
</description>
  <content:encoded>
    <![CDATA[<p>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</p>

<p>Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.</p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Volkswagen and Audi Cars Vulnerable to Remote Hacking" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/">Volkswagen and Audi Cars Vulnerable to Remote Hacking</a> &mdash; esearchers also gained access to the IVI system's root account, which they say allowed them access to other car data.</li><li><a title="It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out." rel="nofollow" href="https://theintercept.com/2018/04/28/computer-malware-tampering/">It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.</a> &mdash; For the last two years, I have carried a “honeypot” laptop with me every time I’ve traveled; this computer was intended to attract (and then detect) tampering.</li><li><a title="chipsec" rel="nofollow" href="https://github.com/chipsec/chipsec">chipsec</a> &mdash;  Platform Security Assessment Framework </li><li><a title="UEFITool" rel="nofollow" href="https://github.com/LongSoft/UEFITool">UEFITool</a> &mdash; UEFI firmware image viewer and editor </li><li><a title="Haven Project" rel="nofollow" href="https://guardianproject.github.io/haven/">Haven Project</a> &mdash; Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors</li><li><a title="Mr S. Delivers on his DO FreeNAS Guide" rel="nofollow" href="https://pastebin.com/sYV5pjQg">Mr S. Delivers on his DO FreeNAS Guide</a></li><li><a title="OZ Shares a War Story" rel="nofollow" href="https://pastebin.com/rWVgzd03">OZ Shares a War Story</a></li><li><a title="Dave&#39;s REALLY Close Call..." rel="nofollow" href="https://pastebin.com/mmtqt4g4">Dave's REALLY Close Call...</a></li><li><a title="Karl Gives us the CTO View on new Hires" rel="nofollow" href="https://pastebin.com/bN3SHfyv">Karl Gives us the CTO View on new Hires</a></li><li><a title="Our Approach to Employee Security Training | PagerDuty" rel="nofollow" href="https://www.pagerduty.com/blog/security-training-at-pagerduty/">Our Approach to Employee Security Training | PagerDuty</a> &mdash; These are both training courses that we developed in-house and delivered ourselves.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</p>

<p>Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.</p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Volkswagen and Audi Cars Vulnerable to Remote Hacking" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/">Volkswagen and Audi Cars Vulnerable to Remote Hacking</a> &mdash; esearchers also gained access to the IVI system's root account, which they say allowed them access to other car data.</li><li><a title="It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out." rel="nofollow" href="https://theintercept.com/2018/04/28/computer-malware-tampering/">It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.</a> &mdash; For the last two years, I have carried a “honeypot” laptop with me every time I’ve traveled; this computer was intended to attract (and then detect) tampering.</li><li><a title="chipsec" rel="nofollow" href="https://github.com/chipsec/chipsec">chipsec</a> &mdash;  Platform Security Assessment Framework </li><li><a title="UEFITool" rel="nofollow" href="https://github.com/LongSoft/UEFITool">UEFITool</a> &mdash; UEFI firmware image viewer and editor </li><li><a title="Haven Project" rel="nofollow" href="https://guardianproject.github.io/haven/">Haven Project</a> &mdash; Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors</li><li><a title="Mr S. Delivers on his DO FreeNAS Guide" rel="nofollow" href="https://pastebin.com/sYV5pjQg">Mr S. Delivers on his DO FreeNAS Guide</a></li><li><a title="OZ Shares a War Story" rel="nofollow" href="https://pastebin.com/rWVgzd03">OZ Shares a War Story</a></li><li><a title="Dave&#39;s REALLY Close Call..." rel="nofollow" href="https://pastebin.com/mmtqt4g4">Dave's REALLY Close Call...</a></li><li><a title="Karl Gives us the CTO View on new Hires" rel="nofollow" href="https://pastebin.com/bN3SHfyv">Karl Gives us the CTO View on new Hires</a></li><li><a title="Our Approach to Employee Security Training | PagerDuty" rel="nofollow" href="https://www.pagerduty.com/blog/security-training-at-pagerduty/">Our Approach to Employee Security Training | PagerDuty</a> &mdash; These are both training courses that we developed in-house and delivered ourselves.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 365: The Unfixable Exploit</title>
  <link>https://techsnap.systems/365</link>
  <guid isPermaLink="false">bebfb1b6-cfe5-4c97-855e-24922aeb957c</guid>
  <pubDate>Tue, 24 Apr 2018 17:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/bebfb1b6-cfe5-4c97-855e-24922aeb957c.mp3" length="33195967" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </itunes:subtitle>
  <itunes:duration>38:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.  
</description>
  <content:encoded>
    <![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/04/23/who_me/">Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register</a> &mdash; ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’</li><li><a title="Spoofing Cell Networks with a USB to VGA Adapter | Hackaday" rel="nofollow" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/">Spoofing Cell Networks with a USB to VGA Adapter | Hackaday</a> &mdash;  Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.</li><li><a title="ShofEL2, a Tegra X1 and Nintendo Switch exploit" rel="nofollow" href="https://fail0verflow.com/blog/2018/shofel2/">ShofEL2, a Tegra X1 and Nintendo Switch exploit</a> &mdash; The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.</li><li><a title="Atlanta spends more than $2 million to recover from ransomware attack" rel="nofollow" href="https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/">Atlanta spends more than $2 million to recover from ransomware attack</a> &mdash; . It appears that firms Secureworks and Ernst &amp; Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.</li><li><a title="Google Chrome 66 Released Today Focuses on Security" rel="nofollow" href="https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/">Google Chrome 66 Released Today Focuses on Security</a> &mdash; The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.</li><li><a title="Where to get started with monitoring?" rel="nofollow" href="https://pastebin.com/bPn1cGLV">Where to get started with monitoring?</a></li><li><a title="defunkt uses a fool tools for his network" rel="nofollow" href="https://pastebin.com/aFmwbguq">defunkt uses a fool tools for his network</a></li><li><a title="Brian shares some love for Zabbix" rel="nofollow" href="https://pastebin.com/z93N6GzR">Brian shares some love for Zabbix</a></li><li><a title="VMware Patches Pwn2Own VM Escape Vulnerabilities" rel="nofollow" href="https://threatpost.com/vmware-patches-pwn2own-vm-escape-vulnerabilities/124629/">VMware Patches Pwn2Own VM Escape Vulnerabilities</a> &mdash; VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.</li><li><a title="balena - A Moby-based container engine for IoT" rel="nofollow" href="https://www.balena.io/">balena - A Moby-based container engine for IoT</a> &mdash; A Moby-based container engine for IoT</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/04/23/who_me/">Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register</a> &mdash; ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’</li><li><a title="Spoofing Cell Networks with a USB to VGA Adapter | Hackaday" rel="nofollow" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/">Spoofing Cell Networks with a USB to VGA Adapter | Hackaday</a> &mdash;  Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.</li><li><a title="ShofEL2, a Tegra X1 and Nintendo Switch exploit" rel="nofollow" href="https://fail0verflow.com/blog/2018/shofel2/">ShofEL2, a Tegra X1 and Nintendo Switch exploit</a> &mdash; The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.</li><li><a title="Atlanta spends more than $2 million to recover from ransomware attack" rel="nofollow" href="https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/">Atlanta spends more than $2 million to recover from ransomware attack</a> &mdash; . It appears that firms Secureworks and Ernst &amp; Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.</li><li><a title="Google Chrome 66 Released Today Focuses on Security" rel="nofollow" href="https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/">Google Chrome 66 Released Today Focuses on Security</a> &mdash; The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.</li><li><a title="Where to get started with monitoring?" rel="nofollow" href="https://pastebin.com/bPn1cGLV">Where to get started with monitoring?</a></li><li><a title="defunkt uses a fool tools for his network" rel="nofollow" href="https://pastebin.com/aFmwbguq">defunkt uses a fool tools for his network</a></li><li><a title="Brian shares some love for Zabbix" rel="nofollow" href="https://pastebin.com/z93N6GzR">Brian shares some love for Zabbix</a></li><li><a title="VMware Patches Pwn2Own VM Escape Vulnerabilities" rel="nofollow" href="https://threatpost.com/vmware-patches-pwn2own-vm-escape-vulnerabilities/124629/">VMware Patches Pwn2Own VM Escape Vulnerabilities</a> &mdash; VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.</li><li><a title="balena - A Moby-based container engine for IoT" rel="nofollow" href="https://www.balena.io/">balena - A Moby-based container engine for IoT</a> &mdash; A Moby-based container engine for IoT</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 364: The Case for Monitoring</title>
  <link>https://techsnap.systems/364</link>
  <guid isPermaLink="false">a667b0ef-12f5-4934-aea6-f713674f2647</guid>
  <pubDate>Wed, 18 Apr 2018 12:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a667b0ef-12f5-4934-aea6-f713674f2647.mp3" length="32205871" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We cover all the bases this week in our TechSNAP introduction to server monitoring.</itunes:subtitle>
  <itunes:duration>37:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We cover all the bases this week in our TechSNAP introduction to server monitoring.
Why you should monitor, what you should monitor, the basics of Nagios, the biggest drawbacks of Nagios, its alternatives, and our lessons learned from the trenches. 
</description>
  <content:encoded>
    <![CDATA[<p>We cover all the bases this week in our TechSNAP introduction to server monitoring.</p>

<p>Why you should monitor, what you should monitor, the basics of Nagios, the biggest drawbacks of Nagios, its alternatives, and our lessons learned from the trenches. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Why Bother with Server Monitoring?" rel="nofollow" href="http://www.applicationperformancemanagement.org/monitoring/server-monitoring/">Why Bother with Server Monitoring?</a> &mdash; Once a network or server has been installed, how do you know it is working as it should?  Just like a car or any appliance, it may need maintenance or parts replaced to keep it in top working order.  Network and server monitoring allows the Network Administrator to see how hardware and software are performing.  We can look for certain signs or warnings that the system is not working efficiently and take action to fix things to prevent system degradation or failure.</li><li><a title="What is Nagios? " rel="nofollow" href="https://medium.com/linux-monitoring-with-nagios/what-is-nagios-64e547db57ca">What is Nagios? </a> &mdash; Monitoring of network services such as SMTP, POP2, HTTP, NNTP, ICMP, SNMP, FTP, SSH.</li><li><a title="A Real Example Of Nagios Monitoring" rel="nofollow" href="https://twindb.com/about-nagios-best-practices/">A Real Example Of Nagios Monitoring</a> &mdash; 

There are two major problems the monitoring solves: alerting and trending. Alerting is to notify the person in charge about a major event like service failing to work. Trending is to track the change of something over time – disk or memory usage, replication lag etc.</li><li><a title="graphios" rel="nofollow" href="https://github.com/shawn-sterling/graphios">graphios</a> &mdash; A program to send nagios perf data to graphite (carbon) / statsd / librato / influxdb </li><li><a title="Sensu" rel="nofollow" href="https://sensu.io/">Sensu</a> &mdash; Sensu’s platform is the solution to the monitoring problems you’re facing today, and the right foundation for your organization tomorrow. From bare metal to Kubernetes—get complete visibility across every system, every protocol, every time.</li><li><a title="Sensu: Finally the Nagios Replacement I Have Been Looking For! – Chariot Solutions" rel="nofollow" href="https://chariotsolutions.com/blog/post/sensu-finally-nagios-replacement-looking/">Sensu: Finally the Nagios Replacement I Have Been Looking For! – Chariot Solutions</a></li><li><a title="Icinga 2" rel="nofollow" href="https://www.icinga.com/products/icinga-2/">Icinga 2</a> &mdash; With the RESTful API of Icinga 2 you can update your configurations on the fly or show live information about current problems on your custom dashboards. You can process check results from third party tools or tell the Core to run actions interactively. The interface is secured with SSL. Access control can be configured fine grained and per user.</li><li><a title="Nagios Vs. Icinga: the real story of one of the most heated forks in free software" rel="nofollow" href="http://freesoftwaremagazine.com/articles/nagios_and_icinga/">Nagios Vs. Icinga: the real story of one of the most heated forks in free software</a></li><li><a title="Phill Barber&#39;s Blog: Nagios vs Sensu vs Icinga2" rel="nofollow" href="http://phillbarber.blogspot.com/2015/03/nagios-vs-sensu-vs-icinga2.html">Phill Barber's Blog: Nagios vs Sensu vs Icinga2</a></li><li><a title="Prometheus" rel="nofollow" href="https://prometheus.io/">Prometheus</a> &mdash; Power your metrics and alerting with a leading
open-source monitoring solution.</li><li><a title="nagios - Docker Hub" rel="nofollow" href="https://hub.docker.com/r/jasonrivers/nagios/">nagios - Docker Hub</a> &mdash; Nagios Core with Nagiosgraph, check_nrpe, custom checks &amp; XMPP Notifications</li><li><a title="Previous TechSNAP Coverage: Keeping it Up | TechSNAP 20" rel="nofollow" href="https://www.youtube.com/watch?v=dSN6PDqK8GA">Previous TechSNAP Coverage: Keeping it Up | TechSNAP 20</a></li><li><a title="Dax was inspired by last weeks episode" rel="nofollow" href="https://pastebin.com/f20XsWVF">Dax was inspired by last weeks episode</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We cover all the bases this week in our TechSNAP introduction to server monitoring.</p>

<p>Why you should monitor, what you should monitor, the basics of Nagios, the biggest drawbacks of Nagios, its alternatives, and our lessons learned from the trenches. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Why Bother with Server Monitoring?" rel="nofollow" href="http://www.applicationperformancemanagement.org/monitoring/server-monitoring/">Why Bother with Server Monitoring?</a> &mdash; Once a network or server has been installed, how do you know it is working as it should?  Just like a car or any appliance, it may need maintenance or parts replaced to keep it in top working order.  Network and server monitoring allows the Network Administrator to see how hardware and software are performing.  We can look for certain signs or warnings that the system is not working efficiently and take action to fix things to prevent system degradation or failure.</li><li><a title="What is Nagios? " rel="nofollow" href="https://medium.com/linux-monitoring-with-nagios/what-is-nagios-64e547db57ca">What is Nagios? </a> &mdash; Monitoring of network services such as SMTP, POP2, HTTP, NNTP, ICMP, SNMP, FTP, SSH.</li><li><a title="A Real Example Of Nagios Monitoring" rel="nofollow" href="https://twindb.com/about-nagios-best-practices/">A Real Example Of Nagios Monitoring</a> &mdash; 

There are two major problems the monitoring solves: alerting and trending. Alerting is to notify the person in charge about a major event like service failing to work. Trending is to track the change of something over time – disk or memory usage, replication lag etc.</li><li><a title="graphios" rel="nofollow" href="https://github.com/shawn-sterling/graphios">graphios</a> &mdash; A program to send nagios perf data to graphite (carbon) / statsd / librato / influxdb </li><li><a title="Sensu" rel="nofollow" href="https://sensu.io/">Sensu</a> &mdash; Sensu’s platform is the solution to the monitoring problems you’re facing today, and the right foundation for your organization tomorrow. From bare metal to Kubernetes—get complete visibility across every system, every protocol, every time.</li><li><a title="Sensu: Finally the Nagios Replacement I Have Been Looking For! – Chariot Solutions" rel="nofollow" href="https://chariotsolutions.com/blog/post/sensu-finally-nagios-replacement-looking/">Sensu: Finally the Nagios Replacement I Have Been Looking For! – Chariot Solutions</a></li><li><a title="Icinga 2" rel="nofollow" href="https://www.icinga.com/products/icinga-2/">Icinga 2</a> &mdash; With the RESTful API of Icinga 2 you can update your configurations on the fly or show live information about current problems on your custom dashboards. You can process check results from third party tools or tell the Core to run actions interactively. The interface is secured with SSL. Access control can be configured fine grained and per user.</li><li><a title="Nagios Vs. Icinga: the real story of one of the most heated forks in free software" rel="nofollow" href="http://freesoftwaremagazine.com/articles/nagios_and_icinga/">Nagios Vs. Icinga: the real story of one of the most heated forks in free software</a></li><li><a title="Phill Barber&#39;s Blog: Nagios vs Sensu vs Icinga2" rel="nofollow" href="http://phillbarber.blogspot.com/2015/03/nagios-vs-sensu-vs-icinga2.html">Phill Barber's Blog: Nagios vs Sensu vs Icinga2</a></li><li><a title="Prometheus" rel="nofollow" href="https://prometheus.io/">Prometheus</a> &mdash; Power your metrics and alerting with a leading
open-source monitoring solution.</li><li><a title="nagios - Docker Hub" rel="nofollow" href="https://hub.docker.com/r/jasonrivers/nagios/">nagios - Docker Hub</a> &mdash; Nagios Core with Nagiosgraph, check_nrpe, custom checks &amp; XMPP Notifications</li><li><a title="Previous TechSNAP Coverage: Keeping it Up | TechSNAP 20" rel="nofollow" href="https://www.youtube.com/watch?v=dSN6PDqK8GA">Previous TechSNAP Coverage: Keeping it Up | TechSNAP 20</a></li><li><a title="Dax was inspired by last weeks episode" rel="nofollow" href="https://pastebin.com/f20XsWVF">Dax was inspired by last weeks episode</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 363: Tips from the Top</title>
  <link>https://techsnap.systems/363</link>
  <guid isPermaLink="false">2f57aaaa-4b64-4c6f-809f-121a3710a543</guid>
  <pubDate>Thu, 12 Apr 2018 13:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2f57aaaa-4b64-4c6f-809f-121a3710a543.mp3" length="30109027" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.</itunes:subtitle>
  <itunes:duration>35:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.
Plus a tricky use of zero-width characters to catch a leaker, a breakdown of the new BranchScope attack, and a full post-mortem of the recent Travis CI outage.
</description>
  <content:encoded>
    <![CDATA[<p>Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.</p>

<p>Plus a tricky use of zero-width characters to catch a leaker, a breakdown of the new BranchScope attack, and a full post-mortem of the recent Travis CI outage.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Invisibly inserting usernames into text with Zero-Width Characters" rel="nofollow" href="https://medium.com/@umpox/be-careful-what-you-copy-invisibly-inserting-usernames-into-text-with-zero-width-characters-18b4e6f17b66">Invisibly inserting usernames into text with Zero-Width Characters</a> &mdash; Zero-width characters are invisible, ‘non-printing’ characters that are not displayed by the majority of applications.</li><li><a title="Incident Post-Mortem and Security Advisory" rel="nofollow" href="https://blog.travis-ci.com/2018-04-03-incident-post-mortem">Incident Post-Mortem and Security Advisory</a> &mdash; On Tuesday, 13 March 2018 at 12:04 UTC a database query was accidentally run against our production database which truncated all tables.</li><li><a title="As predicted, more branch prediction processor attacks are discovered" rel="nofollow" href="https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/">As predicted, more branch prediction processor attacks are discovered</a> &mdash; New attack focuses on a different part of the branch prediction system.</li><li><a title="BranchScope: A New Side-Channel Attack on Directional Branch Predictor - asplos18.pdf" rel="nofollow" href="http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf">BranchScope: A New Side-Channel Attack on Directional Branch Predictor - asplos18.pdf</a></li><li><a title="Mathew has a neat use for Terraform" rel="nofollow" href="https://pastebin.com/dyBfm9Yc">Mathew has a neat use for Terraform</a></li><li><a title="Del says Learn just one thing... " rel="nofollow" href="https://pastebin.com/GuiSEDkz">Del says Learn just one thing... </a></li><li><a title="Mat Man has some great tips" rel="nofollow" href="https://pastebin.com/aX8Tukhs">Mat Man has some great tips</a></li><li><a title="Ben says you might already be doing it" rel="nofollow" href="https://pastebin.com/1kETQQaG">Ben says you might already be doing it</a></li><li><a title="Mr S with a advice from recruiting stand point." rel="nofollow" href="https://pastebin.com/chU9RJeC">Mr S with a advice from recruiting stand point.</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.</p>

<p>Plus a tricky use of zero-width characters to catch a leaker, a breakdown of the new BranchScope attack, and a full post-mortem of the recent Travis CI outage.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Invisibly inserting usernames into text with Zero-Width Characters" rel="nofollow" href="https://medium.com/@umpox/be-careful-what-you-copy-invisibly-inserting-usernames-into-text-with-zero-width-characters-18b4e6f17b66">Invisibly inserting usernames into text with Zero-Width Characters</a> &mdash; Zero-width characters are invisible, ‘non-printing’ characters that are not displayed by the majority of applications.</li><li><a title="Incident Post-Mortem and Security Advisory" rel="nofollow" href="https://blog.travis-ci.com/2018-04-03-incident-post-mortem">Incident Post-Mortem and Security Advisory</a> &mdash; On Tuesday, 13 March 2018 at 12:04 UTC a database query was accidentally run against our production database which truncated all tables.</li><li><a title="As predicted, more branch prediction processor attacks are discovered" rel="nofollow" href="https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/">As predicted, more branch prediction processor attacks are discovered</a> &mdash; New attack focuses on a different part of the branch prediction system.</li><li><a title="BranchScope: A New Side-Channel Attack on Directional Branch Predictor - asplos18.pdf" rel="nofollow" href="http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf">BranchScope: A New Side-Channel Attack on Directional Branch Predictor - asplos18.pdf</a></li><li><a title="Mathew has a neat use for Terraform" rel="nofollow" href="https://pastebin.com/dyBfm9Yc">Mathew has a neat use for Terraform</a></li><li><a title="Del says Learn just one thing... " rel="nofollow" href="https://pastebin.com/GuiSEDkz">Del says Learn just one thing... </a></li><li><a title="Mat Man has some great tips" rel="nofollow" href="https://pastebin.com/aX8Tukhs">Mat Man has some great tips</a></li><li><a title="Ben says you might already be doing it" rel="nofollow" href="https://pastebin.com/1kETQQaG">Ben says you might already be doing it</a></li><li><a title="Mr S with a advice from recruiting stand point." rel="nofollow" href="https://pastebin.com/chU9RJeC">Mr S with a advice from recruiting stand point.</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 362: Rebuilding it Better</title>
  <link>https://techsnap.systems/362</link>
  <guid isPermaLink="false">a2457c20-9cb0-41b9-9599-ed6235873934</guid>
  <pubDate>Thu, 05 Apr 2018 04:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a2457c20-9cb0-41b9-9599-ed6235873934.mp3" length="26804016" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. </itunes:subtitle>
  <itunes:duration>35:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. 
Plus a recent spat of data leaks suggest a common theme, Microsoft’s self inflicted Total Meltdown flaw, and playing around with DNS Rebinding attacks for fun. 
</description>
  <content:encoded>
    <![CDATA[<p>It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. </p>

<p>Plus a recent spat of data leaks suggest a common theme, Microsoft’s self inflicted Total Meltdown flaw, and playing around with DNS Rebinding attacks for fun.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="The Under Armour Hack Was Even Worse Than It Had To Be" rel="nofollow" href="https://www.wired.com/story/under-armour-myfitnesspal-hack-password-hashing/">The Under Armour Hack Was Even Worse Than It Had To Be</a> &mdash; When Under Armour announced that its nutrition app MyFitnessPal had suffered a data breach impacting the information of roughly 150 million users, things actually didn't seem so bad.</li><li><a title="Panerabread.com Leaks Millions of Customer Records" rel="nofollow" href="https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/">Panerabread.com Leaks Millions of Customer Records</a> &mdash; Panerabread.com, the Web site for the American chain of bakery-cafe fast casual restaurants by the same name, leaked millions of customer records — including names, email and physical addresses, birthdays and the last four digits of the customer’s credit card number — for at least eight months before it was yanked offline earlier today, KrebsOnSecurity has learned.</li><li><a title="No, Panera Bread Doesn’t Take Security Seriously – PB" rel="nofollow" href="https://medium.com/@djhoulihan/no-panera-bread-doesnt-take-security-seriously-bf078027f815">No, Panera Bread Doesn’t Take Security Seriously – PB</a> &mdash; This post establishes a canonical timeline so subsequent reporting doesn’t get confused.</li><li><a title="Total Meltdown" rel="nofollow" href="http://blog.frizk.net/2018/03/total-meltdown.html">Total Meltdown</a> &mdash; In short - the User/Supervisor permission bit was set to User in the PML4 self-referencing entry. This made the page tables available to user mode code in every process. The page tables should normally only be accessible by the kernel itself.
</li><li><a title="Terraform by HashiCorp" rel="nofollow" href="https://www.terraform.io/">Terraform by HashiCorp</a> &mdash; HashiCorp Terraform enables you to safely and predictably create, change, and improve infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned. </li><li><a title="Terraforming 1Password - AgileBits Blog" rel="nofollow" href="https://blog.agilebits.com/2018/01/25/terraforming-1password/">Terraforming 1Password - AgileBits Blog</a> &mdash; Most of the 2 hours and 39 minutes of downtime were related to data migration. The 1Password.com database is just under 1TB in size (not including documents and attachments), and it took almost two hours to complete the snapshot and restore operations.</li><li><a title="Whonow" rel="nofollow" href="https://github.com/brannondorsey/whonow">Whonow</a> &mdash; A malicious DNS server for executing DNS Rebinding attacks on the fly</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. </p>

<p>Plus a recent spat of data leaks suggest a common theme, Microsoft’s self inflicted Total Meltdown flaw, and playing around with DNS Rebinding attacks for fun.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="The Under Armour Hack Was Even Worse Than It Had To Be" rel="nofollow" href="https://www.wired.com/story/under-armour-myfitnesspal-hack-password-hashing/">The Under Armour Hack Was Even Worse Than It Had To Be</a> &mdash; When Under Armour announced that its nutrition app MyFitnessPal had suffered a data breach impacting the information of roughly 150 million users, things actually didn't seem so bad.</li><li><a title="Panerabread.com Leaks Millions of Customer Records" rel="nofollow" href="https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/">Panerabread.com Leaks Millions of Customer Records</a> &mdash; Panerabread.com, the Web site for the American chain of bakery-cafe fast casual restaurants by the same name, leaked millions of customer records — including names, email and physical addresses, birthdays and the last four digits of the customer’s credit card number — for at least eight months before it was yanked offline earlier today, KrebsOnSecurity has learned.</li><li><a title="No, Panera Bread Doesn’t Take Security Seriously – PB" rel="nofollow" href="https://medium.com/@djhoulihan/no-panera-bread-doesnt-take-security-seriously-bf078027f815">No, Panera Bread Doesn’t Take Security Seriously – PB</a> &mdash; This post establishes a canonical timeline so subsequent reporting doesn’t get confused.</li><li><a title="Total Meltdown" rel="nofollow" href="http://blog.frizk.net/2018/03/total-meltdown.html">Total Meltdown</a> &mdash; In short - the User/Supervisor permission bit was set to User in the PML4 self-referencing entry. This made the page tables available to user mode code in every process. The page tables should normally only be accessible by the kernel itself.
</li><li><a title="Terraform by HashiCorp" rel="nofollow" href="https://www.terraform.io/">Terraform by HashiCorp</a> &mdash; HashiCorp Terraform enables you to safely and predictably create, change, and improve infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned. </li><li><a title="Terraforming 1Password - AgileBits Blog" rel="nofollow" href="https://blog.agilebits.com/2018/01/25/terraforming-1password/">Terraforming 1Password - AgileBits Blog</a> &mdash; Most of the 2 hours and 39 minutes of downtime were related to data migration. The 1Password.com database is just under 1TB in size (not including documents and attachments), and it took almost two hours to complete the snapshot and restore operations.</li><li><a title="Whonow" rel="nofollow" href="https://github.com/brannondorsey/whonow">Whonow</a> &mdash; A malicious DNS server for executing DNS Rebinding attacks on the fly</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 361: It's All in the Log</title>
  <link>https://techsnap.systems/361</link>
  <guid isPermaLink="false">60c0569a-55b4-446f-bf42-6d017d933f4f</guid>
  <pubDate>Thu, 29 Mar 2018 08:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/60c0569a-55b4-446f-bf42-6d017d933f4f.mp3" length="24152919" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
</itunes:subtitle>
  <itunes:duration>32:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes" rel="nofollow" href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes</a> &mdash; My verification test is below. Note that it gets stored in on-disk, collected logs (non-volatile logs).</li><li><a title="Thousands of servers found leaking 750MB worth of passwords and keys" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys</a> &mdash; Leaky etcd servers could be a boon to data thieves and ransomware scammers.</li><li><a title="Atlanta city government systems down due to ransomware attack" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack</a> &mdash; FBI called in as some city services are interrupted, employees told to turn off PCs.</li><li><a title="Android malware found inside apps downloaded 500,000 times | ZDNet" rel="nofollow" href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times | ZDNet</a> &mdash;  Cybercriminals have distributed malware to hundreds of thousands of Android users by hiding it inside a series of apparently harmless apps.</li><li><a title="From hacked client to 0day discovery" rel="nofollow" href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery</a> &mdash; The client’s account had been blocked because it was spotted sending spam. Once connected to the service, it was clear that the monthly quota of the account was almost reached and that the latest emails sent shown on the dashboard had content that were clearly spam.</li><li><a title="Listener Feedback from Jeff S" rel="nofollow" href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></li><li><a title="Listener Feedback from Tyler" rel="nofollow" href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes" rel="nofollow" href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes</a> &mdash; My verification test is below. Note that it gets stored in on-disk, collected logs (non-volatile logs).</li><li><a title="Thousands of servers found leaking 750MB worth of passwords and keys" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys</a> &mdash; Leaky etcd servers could be a boon to data thieves and ransomware scammers.</li><li><a title="Atlanta city government systems down due to ransomware attack" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack</a> &mdash; FBI called in as some city services are interrupted, employees told to turn off PCs.</li><li><a title="Android malware found inside apps downloaded 500,000 times | ZDNet" rel="nofollow" href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times | ZDNet</a> &mdash;  Cybercriminals have distributed malware to hundreds of thousands of Android users by hiding it inside a series of apparently harmless apps.</li><li><a title="From hacked client to 0day discovery" rel="nofollow" href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery</a> &mdash; The client’s account had been blocked because it was spotted sending spam. Once connected to the service, it was clear that the monthly quota of the account was almost reached and that the latest emails sent shown on the dashboard had content that were clearly spam.</li><li><a title="Listener Feedback from Jeff S" rel="nofollow" href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></li><li><a title="Listener Feedback from Tyler" rel="nofollow" href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 360: AMD Flaws Explained</title>
  <link>https://techsnap.systems/360</link>
  <guid isPermaLink="false">2bdd82c5-b92f-4a94-af10-1fdc61f7a3a9</guid>
  <pubDate>Thu, 22 Mar 2018 12:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2bdd82c5-b92f-4a94-af10-1fdc61f7a3a9.mp3" length="21507018" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</itunes:subtitle>
  <itunes:duration>29:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..
Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup. 
</description>
  <content:encoded>
    <![CDATA[<p>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</p>

<p>Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Microsoft Offers New Bug Bounties for Spectre, ..." rel="nofollow" href="https://www.darkreading.com/risk-management/microsoft-offers-new-bug-bounties-for-spectre-meltdown-type-flaws/d/d-id/1331303">Microsoft Offers New Bug Bounties for Spectre, ...</a> &mdash; Microsoft last week announced new bug bounties for speculative execution side-channel vulnerabilities. These vulnerabilities, of which Spectre and Meltdown were the first known examples, represent a new class of problem and Microsoft would like to know what else might be lurking in the neighborhood.</li><li><a title="Microsoft patches RDP vulnerability." rel="nofollow" href="https://nakedsecurity.sophos.com/2018/03/15/microsoft-patches-rdp-vulnerability-update-now/">Microsoft patches RDP vulnerability.</a> &mdash; Microsoft announced this week that they’ve released a preliminary fix for a vulnerability rated important, and present in all supported versions of Windows in circulation (basically any client or server version of Windows from 2008 onward).</li><li><a title="Firefox Master Password System Has Been Poorly Secured for the Past 9 Years" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/firefox-master-password-system-has-been-poorly-secured-for-the-past-9-years/">Firefox Master Password System Has Been Poorly Secured for the Past 9 Years</a> &mdash; For at past nine years, Mozilla has been using an insufficiently strong encryption mechanism for the "master password" feature.</li><li><a title="Firefox Lockbox Extension" rel="nofollow" href="https://mozilla-lockbox.github.io/lockbox-extension/">Firefox Lockbox Extension</a> &mdash; The Lockbox extension is a simple, stand-alone password manager that works with Firefox for desktop. It’s the first of several planned experiments designed to help us test and improve password management and online security.</li><li><a title="How your ethereum can be stolen through DNS rebinding" rel="nofollow" href="https://ret2got.wordpress.com/2018/01/19/how-your-ethereum-can-be-stolen-using-dns-rebinding/">How your ethereum can be stolen through DNS rebinding</a> &mdash; Most of the ethereum clients run a JSON-RPC service on port 8545 on localhost, but since it’s on localhost, we can’t access it directly from user’s browser due to SOP.</li><li><a title="TechSNAP Episode 353: Too Many Containers" rel="nofollow" href="http://techsnap.systems/353">TechSNAP Episode 353: Too Many Containers</a></li><li><a title="“AMD Flaws” Technical Summary | Trail of Bits Blog" rel="nofollow" href="https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/">“AMD Flaws” Technical Summary | Trail of Bits Blog</a> &mdash; Most of the discussion after the public announcement of the vulnerabilities has been focused on the way they were disclosed rather than their technical impact. In this post, we have tried to extract the relevant technical details from the CTS whitepaper so they can be of use to the security community without the distraction of the surrounding disclosure issues.</li><li><a title="Ivan is not happy with our memcrashed coverage" rel="nofollow" href="https://twitter.com/IvanTomica/status/975025525398831104?ref_src=twsrc%5Etfw">Ivan is not happy with our memcrashed coverage</a> &mdash; Discussion re:"memcrashed" on latest TechSNAP left me very mad. I think hosts did not properly explain the issue. </li><li><a title="PSA: Chrome distrusts certificates issued by Symantec starting today" rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/84m6vr/psa_chrome_distrusts_certificates_issued_by/">PSA: Chrome distrusts certificates issued by Symantec starting today</a> &mdash; This was announced back in September for v66, but we have machines running 65.0.3325.162 that display the full page "NET::ERR_CERT_AUTHORITY_INVALID" warning so it seems they jumped the gun a bit.</li><li><a title="Follow up: fail2ban AWS access controls " rel="nofollow" href="https://pastebin.com/4Q4zTZGA">Follow up: fail2ban AWS access controls </a></li><li><a title="Mr S Has a Handy pfSense how-to" rel="nofollow" href="https://pastebin.com/FXA8PzQx">Mr S Has a Handy pfSense how-to</a></li><li><a title="Running pfSense on a DigitalOcean droplet" rel="nofollow" href="https://squigly.blogspot.co.il/2018/02/running-pfsense-on-digitalocean-droplet.html">Running pfSense on a DigitalOcean droplet</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</p>

<p>Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Microsoft Offers New Bug Bounties for Spectre, ..." rel="nofollow" href="https://www.darkreading.com/risk-management/microsoft-offers-new-bug-bounties-for-spectre-meltdown-type-flaws/d/d-id/1331303">Microsoft Offers New Bug Bounties for Spectre, ...</a> &mdash; Microsoft last week announced new bug bounties for speculative execution side-channel vulnerabilities. These vulnerabilities, of which Spectre and Meltdown were the first known examples, represent a new class of problem and Microsoft would like to know what else might be lurking in the neighborhood.</li><li><a title="Microsoft patches RDP vulnerability." rel="nofollow" href="https://nakedsecurity.sophos.com/2018/03/15/microsoft-patches-rdp-vulnerability-update-now/">Microsoft patches RDP vulnerability.</a> &mdash; Microsoft announced this week that they’ve released a preliminary fix for a vulnerability rated important, and present in all supported versions of Windows in circulation (basically any client or server version of Windows from 2008 onward).</li><li><a title="Firefox Master Password System Has Been Poorly Secured for the Past 9 Years" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/firefox-master-password-system-has-been-poorly-secured-for-the-past-9-years/">Firefox Master Password System Has Been Poorly Secured for the Past 9 Years</a> &mdash; For at past nine years, Mozilla has been using an insufficiently strong encryption mechanism for the "master password" feature.</li><li><a title="Firefox Lockbox Extension" rel="nofollow" href="https://mozilla-lockbox.github.io/lockbox-extension/">Firefox Lockbox Extension</a> &mdash; The Lockbox extension is a simple, stand-alone password manager that works with Firefox for desktop. It’s the first of several planned experiments designed to help us test and improve password management and online security.</li><li><a title="How your ethereum can be stolen through DNS rebinding" rel="nofollow" href="https://ret2got.wordpress.com/2018/01/19/how-your-ethereum-can-be-stolen-using-dns-rebinding/">How your ethereum can be stolen through DNS rebinding</a> &mdash; Most of the ethereum clients run a JSON-RPC service on port 8545 on localhost, but since it’s on localhost, we can’t access it directly from user’s browser due to SOP.</li><li><a title="TechSNAP Episode 353: Too Many Containers" rel="nofollow" href="http://techsnap.systems/353">TechSNAP Episode 353: Too Many Containers</a></li><li><a title="“AMD Flaws” Technical Summary | Trail of Bits Blog" rel="nofollow" href="https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/">“AMD Flaws” Technical Summary | Trail of Bits Blog</a> &mdash; Most of the discussion after the public announcement of the vulnerabilities has been focused on the way they were disclosed rather than their technical impact. In this post, we have tried to extract the relevant technical details from the CTS whitepaper so they can be of use to the security community without the distraction of the surrounding disclosure issues.</li><li><a title="Ivan is not happy with our memcrashed coverage" rel="nofollow" href="https://twitter.com/IvanTomica/status/975025525398831104?ref_src=twsrc%5Etfw">Ivan is not happy with our memcrashed coverage</a> &mdash; Discussion re:"memcrashed" on latest TechSNAP left me very mad. I think hosts did not properly explain the issue. </li><li><a title="PSA: Chrome distrusts certificates issued by Symantec starting today" rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/84m6vr/psa_chrome_distrusts_certificates_issued_by/">PSA: Chrome distrusts certificates issued by Symantec starting today</a> &mdash; This was announced back in September for v66, but we have machines running 65.0.3325.162 that display the full page "NET::ERR_CERT_AUTHORITY_INVALID" warning so it seems they jumped the gun a bit.</li><li><a title="Follow up: fail2ban AWS access controls " rel="nofollow" href="https://pastebin.com/4Q4zTZGA">Follow up: fail2ban AWS access controls </a></li><li><a title="Mr S Has a Handy pfSense how-to" rel="nofollow" href="https://pastebin.com/FXA8PzQx">Mr S Has a Handy pfSense how-to</a></li><li><a title="Running pfSense on a DigitalOcean droplet" rel="nofollow" href="https://squigly.blogspot.co.il/2018/02/running-pfsense-on-digitalocean-droplet.html">Running pfSense on a DigitalOcean droplet</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 359: Netflix’s Dark Capacity</title>
  <link>https://techsnap.systems/359</link>
  <guid isPermaLink="false">c63e4421-989c-4e30-813c-cb967a5ab29b</guid>
  <pubDate>Thu, 15 Mar 2018 20:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c63e4421-989c-4e30-813c-cb967a5ab29b.mp3" length="23670639" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
</itunes:subtitle>
  <itunes:duration>31:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is.
Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks. 
</description>
  <content:encoded>
    <![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let&#39;s Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Hardcoded Password Found in Cisco Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hardcoded-password-found-in-cisco-software/">Hardcoded Password Found in Cisco Software</a> &mdash; Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.</li><li><a title="Potent malware that hid for six years spread through routers " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/">Potent malware that hid for six years spread through routers </a> &mdash; "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."</li><li><a title="CVE 2018-1057: Authenticated Samba users can change other users&#39; password " rel="nofollow" href="https://www.samba.org/samba/security/CVE-2018-1057.html">CVE 2018-1057: Authenticated Samba users can change other users' password </a> &mdash;  On a Samba 4 AD DC the LDAP server in all versions of Samba from
4.0.0 onwards incorrectly validates permissions to modify passwords
over LDAP allowing authenticated users to change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).</li><li><a title="CVE-2018-1057 - SambaWiki Workarounds " rel="nofollow" href="https://wiki.samba.org/index.php/CVE-2018-1057#Workarounds">CVE-2018-1057 - SambaWiki Workarounds </a> &mdash; Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.</li><li><a title="ACME v2 and Wildcard Certificate Support is Live" rel="nofollow" href="https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579">ACME v2 and Wildcard Certificate Support is Live</a> &mdash; We’re pleased to announce that ACMEv2 and wildcard certificate support is live! </li><li><a title="It just got much easier to wage record-breaking DDoSes " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/it-just-got-much-easier-to-wage-record-breaking-ddoses/">It just got much easier to wage record-breaking DDoSes </a> &mdash; Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.</li><li><a title="The real cause of large DDoS " rel="nofollow" href="https://blog.cloudflare.com/the-root-cause-of-large-ddos-ip-spoofing/">The real cause of large DDoS </a> &mdash; All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. </li><li><a title="Project Nimble – Netflix TechBlog" rel="nofollow" href="https://medium.com/netflix-techblog/project-nimble-region-evacuation-reimagined-d0d0568254d4">Project Nimble – Netflix TechBlog</a> &mdash; We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. </li><li><a title="Follow Up: Alex has a tip for Alex" rel="nofollow" href="https://pastebin.com/g97N8teu">Follow Up: Alex has a tip for Alex</a></li><li><a title="Question: Oliver asks about a fail2ban replacement " rel="nofollow" href="https://pastebin.com/wrGGUyBp">Question: Oliver asks about a fail2ban replacement </a></li><li><a title="S3Scanner" rel="nofollow" href="https://github.com/sa7mon/S3Scanner">S3Scanner</a> &mdash; Scan for open S3 buckets and dump </li><li><a title="Chromium is also a Snap" rel="nofollow" href="https://snapcraft.io/chromium">Chromium is also a Snap</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let&#39;s Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Hardcoded Password Found in Cisco Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hardcoded-password-found-in-cisco-software/">Hardcoded Password Found in Cisco Software</a> &mdash; Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.</li><li><a title="Potent malware that hid for six years spread through routers " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/">Potent malware that hid for six years spread through routers </a> &mdash; "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."</li><li><a title="CVE 2018-1057: Authenticated Samba users can change other users&#39; password " rel="nofollow" href="https://www.samba.org/samba/security/CVE-2018-1057.html">CVE 2018-1057: Authenticated Samba users can change other users' password </a> &mdash;  On a Samba 4 AD DC the LDAP server in all versions of Samba from
4.0.0 onwards incorrectly validates permissions to modify passwords
over LDAP allowing authenticated users to change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).</li><li><a title="CVE-2018-1057 - SambaWiki Workarounds " rel="nofollow" href="https://wiki.samba.org/index.php/CVE-2018-1057#Workarounds">CVE-2018-1057 - SambaWiki Workarounds </a> &mdash; Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.</li><li><a title="ACME v2 and Wildcard Certificate Support is Live" rel="nofollow" href="https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579">ACME v2 and Wildcard Certificate Support is Live</a> &mdash; We’re pleased to announce that ACMEv2 and wildcard certificate support is live! </li><li><a title="It just got much easier to wage record-breaking DDoSes " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/it-just-got-much-easier-to-wage-record-breaking-ddoses/">It just got much easier to wage record-breaking DDoSes </a> &mdash; Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.</li><li><a title="The real cause of large DDoS " rel="nofollow" href="https://blog.cloudflare.com/the-root-cause-of-large-ddos-ip-spoofing/">The real cause of large DDoS </a> &mdash; All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. </li><li><a title="Project Nimble – Netflix TechBlog" rel="nofollow" href="https://medium.com/netflix-techblog/project-nimble-region-evacuation-reimagined-d0d0568254d4">Project Nimble – Netflix TechBlog</a> &mdash; We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. </li><li><a title="Follow Up: Alex has a tip for Alex" rel="nofollow" href="https://pastebin.com/g97N8teu">Follow Up: Alex has a tip for Alex</a></li><li><a title="Question: Oliver asks about a fail2ban replacement " rel="nofollow" href="https://pastebin.com/wrGGUyBp">Question: Oliver asks about a fail2ban replacement </a></li><li><a title="S3Scanner" rel="nofollow" href="https://github.com/sa7mon/S3Scanner">S3Scanner</a> &mdash; Scan for open S3 buckets and dump </li><li><a title="Chromium is also a Snap" rel="nofollow" href="https://snapcraft.io/chromium">Chromium is also a Snap</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 358: A Future Without Servers</title>
  <link>https://techsnap.systems/358</link>
  <guid isPermaLink="false">dd10266c-5d78-43c7-bf71-1d3abb89a7a5</guid>
  <pubDate>Thu, 01 Mar 2018 08:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/dd10266c-5d78-43c7-bf71-1d3abb89a7a5.mp3" length="26781664" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </itunes:subtitle>
  <itunes:duration>36:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. 
Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more! 
</description>
  <content:encoded>
    <![CDATA[<p>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </p>

<p>Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Revamp of &#39;Pwned Passwords&#39; Boosts Privacy and Size of Database" rel="nofollow" href="https://threatpost.com/revamp-of-pwned-passwords-boosts-privacy-and-size-of-database/130082/">Revamp of 'Pwned Passwords' Boosts Privacy and Size of Database</a> &mdash; In V2 of Pwned Passwords, launched last week, Hunt updated his password data set from 320 million passwords to 501 million new passwords, pulled from almost 3,000 breaches over the past year.</li><li><a title="Finding Pwned Passwords with 1Password" rel="nofollow" href="https://blog.agilebits.com/2018/02/22/finding-pwned-passwords-with-1password/">Finding Pwned Passwords with 1Password</a> &mdash; Troy Hunt and his friends from Cloudflare found a brilliant way to check if my password is leaked without ever needing to send my password to their service. Their server never receives enough information to reconstruct my password.</li><li><a title="Troy Hunt: I&#39;ve Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned" rel="nofollow" href="https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/">Troy Hunt: I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned</a></li><li><a title="Apple’s China data migration includes iCloud keys, making data requests easier for authorities" rel="nofollow" href="https://9to5mac.com/2018/02/24/icloud-data-keys-migration/">Apple’s China data migration includes iCloud keys, making data requests easier for authorities</a> &mdash; Now, according to Apple, for the first time the company will store the keys for Chinese iCloud accounts in China itself. That means Chinese authorities will no longer have to use the U.S. courts to seek information on iCloud users and can instead use their own legal system to ask Apple to hand over iCloud data for Chinese users, legal experts said.</li><li><a title="Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow" rel="nofollow" href="https://gizmodo.com/microsoft-s-big-email-privacy-case-heads-to-the-supreme-1823328595">Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow</a> &mdash; The 2013 warrant involved a drug case, and the Justice Department asked Microsoft to turn over emails that were stored in its Ireland data center. Microsoft objected, arguing that the DoJ could not use a domestic warrant to conduct an international search and that it should instead acquire the data through a treaty process with the Irish government.</li><li><a title="Researchers Propose Improved Private Web Browsing System" rel="nofollow" href="https://www.securityweek.com/researchers-propose-improved-private-web-browsing-system">Researchers Propose Improved Private Web Browsing System</a> &mdash; The newly proposed system keeps all the data that the browse loads into memory encrypted until it is displayed on the screen, the researchers say. Users no longer type a URL into the browser, but access the Veil website and enter the URL there. With the help of a blinding server, the Veil format of the requested page is transmitted. </li><li><a title="Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/nearly-8-000-security-flaws-did-not-receive-a-cve-id-in-2017/">Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017</a> &mdash; A record-breaking number of 20,832 vulnerabilities have been discovered in 2017 but only 12,932 of these received an official CVE identifier last year, a Risk Based Security (RBS) report reveals.</li><li><a title="What is Serverless Architecture? What are its criticisms and drawbacks?" rel="nofollow" href="https://medium.com/@MarutiTech/what-is-serverless-architecture-what-are-its-criticisms-and-drawbacks-928659f9899a">What is Serverless Architecture? What are its criticisms and drawbacks?</a> &mdash; Serverless architectures refer to applications that significantly depend on third-party services (knows as Backend as a Service or “BaaS”) or on custom code that’s run in ephemeral containers (Function as a Service or “FaaS”), the best known vendor host of which currently is AWS Lambda.</li><li><a title="Serverless Security: What&#39;s Left to Protect?" rel="nofollow" href="https://www.infoq.com/articles/serverless-security">Serverless Security: What's Left to Protect?</a></li><li><a title="OpenFaaS - Serverless Functions Made Simple" rel="nofollow" href="https://www.openfaas.com/">OpenFaaS - Serverless Functions Made Simple</a> &mdash; Serverless Functions Made Simple for Docker and Kubernetes</li><li><a title="open-lambda: An open source serverless computing platform" rel="nofollow" href="https://github.com/open-lambda/open-lambda">open-lambda: An open source serverless computing platform</a> &mdash; An open source serverless computing platform</li><li><a title="Iron.io - DevOps Solutions from Startups to Enterprise" rel="nofollow" href="https://www.iron.io/">Iron.io - DevOps Solutions from Startups to Enterprise</a></li><li><a title="Apache OpenWhisk is a serverless, open source cloud platform" rel="nofollow" href="https://openwhisk.apache.org/">Apache OpenWhisk is a serverless, open source cloud platform</a></li><li><a title="Feedback: David&#39;s Drive Tips" rel="nofollow" href="https://pastebin.com/iSZgfPuc">Feedback: David's Drive Tips</a></li><li><a title="Question: Alex has BIG cloud storage requirements...." rel="nofollow" href="https://pastebin.com/mY78CNxK">Question: Alex has BIG cloud storage requirements....</a></li><li><a title="Crostini - Linux App Containers on ChromeOS " rel="nofollow" href="https://liliputing.com/2018/02/chromebooks-may-get-native-support-linux-apps-via-crostini.html">Crostini - Linux App Containers on ChromeOS </a> &mdash; In other words, the Crostini/Terminal feature could be to Chrome OS what the Windows Subsystem for Linux is for Windows 10: a way that developers, power users, and Linux enthusiasts can run native Linux software on a device that’s not running a traditional Linux distribution.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits and the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </p>

<p>Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s, and much more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Revamp of &#39;Pwned Passwords&#39; Boosts Privacy and Size of Database" rel="nofollow" href="https://threatpost.com/revamp-of-pwned-passwords-boosts-privacy-and-size-of-database/130082/">Revamp of 'Pwned Passwords' Boosts Privacy and Size of Database</a> &mdash; In V2 of Pwned Passwords, launched last week, Hunt updated his password data set from 320 million passwords to 501 million new passwords, pulled from almost 3,000 breaches over the past year.</li><li><a title="Finding Pwned Passwords with 1Password" rel="nofollow" href="https://blog.agilebits.com/2018/02/22/finding-pwned-passwords-with-1password/">Finding Pwned Passwords with 1Password</a> &mdash; Troy Hunt and his friends from Cloudflare found a brilliant way to check if my password is leaked without ever needing to send my password to their service. Their server never receives enough information to reconstruct my password.</li><li><a title="Troy Hunt: I&#39;ve Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned" rel="nofollow" href="https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/">Troy Hunt: I've Just Added 2,844 New Data Breaches With 80M Records To Have I Been Pwned</a></li><li><a title="Apple’s China data migration includes iCloud keys, making data requests easier for authorities" rel="nofollow" href="https://9to5mac.com/2018/02/24/icloud-data-keys-migration/">Apple’s China data migration includes iCloud keys, making data requests easier for authorities</a> &mdash; Now, according to Apple, for the first time the company will store the keys for Chinese iCloud accounts in China itself. That means Chinese authorities will no longer have to use the U.S. courts to seek information on iCloud users and can instead use their own legal system to ask Apple to hand over iCloud data for Chinese users, legal experts said.</li><li><a title="Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow" rel="nofollow" href="https://gizmodo.com/microsoft-s-big-email-privacy-case-heads-to-the-supreme-1823328595">Microsoft’s Big Email Privacy Case Heads to the Supreme Court Tomorrow</a> &mdash; The 2013 warrant involved a drug case, and the Justice Department asked Microsoft to turn over emails that were stored in its Ireland data center. Microsoft objected, arguing that the DoJ could not use a domestic warrant to conduct an international search and that it should instead acquire the data through a treaty process with the Irish government.</li><li><a title="Researchers Propose Improved Private Web Browsing System" rel="nofollow" href="https://www.securityweek.com/researchers-propose-improved-private-web-browsing-system">Researchers Propose Improved Private Web Browsing System</a> &mdash; The newly proposed system keeps all the data that the browse loads into memory encrypted until it is displayed on the screen, the researchers say. Users no longer type a URL into the browser, but access the Veil website and enter the URL there. With the help of a blinding server, the Veil format of the requested page is transmitted. </li><li><a title="Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/nearly-8-000-security-flaws-did-not-receive-a-cve-id-in-2017/">Nearly 8,000 Security Flaws Did Not Receive a CVE ID in 2017</a> &mdash; A record-breaking number of 20,832 vulnerabilities have been discovered in 2017 but only 12,932 of these received an official CVE identifier last year, a Risk Based Security (RBS) report reveals.</li><li><a title="What is Serverless Architecture? What are its criticisms and drawbacks?" rel="nofollow" href="https://medium.com/@MarutiTech/what-is-serverless-architecture-what-are-its-criticisms-and-drawbacks-928659f9899a">What is Serverless Architecture? What are its criticisms and drawbacks?</a> &mdash; Serverless architectures refer to applications that significantly depend on third-party services (knows as Backend as a Service or “BaaS”) or on custom code that’s run in ephemeral containers (Function as a Service or “FaaS”), the best known vendor host of which currently is AWS Lambda.</li><li><a title="Serverless Security: What&#39;s Left to Protect?" rel="nofollow" href="https://www.infoq.com/articles/serverless-security">Serverless Security: What's Left to Protect?</a></li><li><a title="OpenFaaS - Serverless Functions Made Simple" rel="nofollow" href="https://www.openfaas.com/">OpenFaaS - Serverless Functions Made Simple</a> &mdash; Serverless Functions Made Simple for Docker and Kubernetes</li><li><a title="open-lambda: An open source serverless computing platform" rel="nofollow" href="https://github.com/open-lambda/open-lambda">open-lambda: An open source serverless computing platform</a> &mdash; An open source serverless computing platform</li><li><a title="Iron.io - DevOps Solutions from Startups to Enterprise" rel="nofollow" href="https://www.iron.io/">Iron.io - DevOps Solutions from Startups to Enterprise</a></li><li><a title="Apache OpenWhisk is a serverless, open source cloud platform" rel="nofollow" href="https://openwhisk.apache.org/">Apache OpenWhisk is a serverless, open source cloud platform</a></li><li><a title="Feedback: David&#39;s Drive Tips" rel="nofollow" href="https://pastebin.com/iSZgfPuc">Feedback: David's Drive Tips</a></li><li><a title="Question: Alex has BIG cloud storage requirements...." rel="nofollow" href="https://pastebin.com/mY78CNxK">Question: Alex has BIG cloud storage requirements....</a></li><li><a title="Crostini - Linux App Containers on ChromeOS " rel="nofollow" href="https://liliputing.com/2018/02/chromebooks-may-get-native-support-linux-apps-via-crostini.html">Crostini - Linux App Containers on ChromeOS </a> &mdash; In other words, the Crostini/Terminal feature could be to Chrome OS what the Windows Subsystem for Linux is for Windows 10: a way that developers, power users, and Linux enthusiasts can run native Linux software on a device that’s not running a traditional Linux distribution.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 356: The Concern with Containers</title>
  <link>https://techsnap.systems/356</link>
  <guid isPermaLink="false">0d9f7516-90f2-4dd5-82e4-3bb92e6de943</guid>
  <pubDate>Thu, 15 Feb 2018 13:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/0d9f7516-90f2-4dd5-82e4-3bb92e6de943.mp3" length="27434183" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </itunes:subtitle>
  <itunes:duration>37:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. 
And the latest jaw-dropping techniques to extract data from air-gapped systems. 
</description>
  <content:encoded>
    <![CDATA[<p>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </p>

<p>And the latest jaw-dropping techniques to extract data from air-gapped systems.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Skype can&#39;t fix a nasty security bug without a massive code rewrite" rel="nofollow" href="http://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/">Skype can't fix a nasty security bug without a massive code rewrite</a> &mdash; The bug grants a low-level user access to every corner of the operating system.</li><li><a title="Zero-day vulnerability in Telegram" rel="nofollow" href="https://securelist.com/zero-day-vulnerability-in-telegram/83800/">Zero-day vulnerability in Telegram</a> &mdash; The special nonprinting right-to-left override (RLO) character is used to reverse the order of the characters that come after that character in the string. In the Unicode character table, it is represented as ‘U+202E’; one area of legitimate use is when typing Arabic text. In an attack, this character can be used to mislead the victim. It is usually used when displaying the name and extension of an executable file: a piece of software vulnerable to this sort of attack will display the filename incompletely or in reverse.</li><li><a title="Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability" rel="nofollow" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1?source=infected.io-telegram">Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability</a> &mdash; After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available. </li><li><a title="Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains" rel="nofollow" href="https://www.forbes.com/sites/ktorpey/2018/02/12/microsoft-to-embrace-decentralized-identity-systems-built-on-bitcoin-and-other-blockchains/#76af78a45ada">Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains</a> &mdash; In a new post today, Microsoft announced their embrace of public blockchains, such as Bitcoin and Ethereum, for use in decentralized identity systems.</li><li><a title="XRballer comments on The Stolen XRB has already been Redistributed/Sold Off" rel="nofollow" href="https://www.reddit.com/r/CryptoCurrency/comments/7wonkf/the_stolen_xrb_has_already_been_redistributedsold/du215tr/">XRballer comments on The Stolen XRB has already been Redistributed/Sold Off</a> &mdash; But this check was only on java-script client side, you find the js which is sending the request, then you inspect element - console, and run the java-script manually, to send a request for withdrawal of a higher amount than in your balance.</li><li><a title="Containers Will Not Fix Your Broken Culture" rel="nofollow" href="https://queue.acm.org/detail.cfm?id=3185224">Containers Will Not Fix Your Broken Culture</a> &mdash; Spoiler alert: the solutions to many difficulties that seem technical can be found by examining our interactions with others. Let's talk about five things you'll want to know when working with those pesky creatures known as humans.</li><li><a title="Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields" rel="nofollow" href="https://arxiv.org/abs/1802.02700">Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields</a> &mdash; In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. </li><li><a title="Feedback: BeyondCorp" rel="nofollow" href="http://pastedown.ctrl-c.us/#RP5t3LFg3gLPAoBi70ua6IyQJGo.markdown">Feedback: BeyondCorp</a></li><li><a title="Feedback: Mgmt" rel="nofollow" href="http://pastedown.ctrl-c.us/#2jhTp3-geBThElev10Bg9oFRHm4.markdown">Feedback: Mgmt</a></li><li><a title="Feedback: SuperMicro Mobo?" rel="nofollow" href="http://pastedown.ctrl-c.us/#U4lx-Ttdf1fcuRyMeWoF6JKsNVo.markdown">Feedback: SuperMicro Mobo?</a></li><li><a title="Super Micro Computer X8DTN+" rel="nofollow" href="https://www.supermicro.com/products/motherboard/QPI/5500/X8DTN_.cfm?IPMI=O">Super Micro Computer X8DTN+</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The problems containers can’t solve, nasty security flaws in Skype and Telegram, and Cisco discovers they have a bigger issue on their hands then first realized. </p>

<p>And the latest jaw-dropping techniques to extract data from air-gapped systems.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Skype can&#39;t fix a nasty security bug without a massive code rewrite" rel="nofollow" href="http://www.zdnet.com/article/skype-cannot-fix-security-bug-without-a-massive-code-rewrite/">Skype can't fix a nasty security bug without a massive code rewrite</a> &mdash; The bug grants a low-level user access to every corner of the operating system.</li><li><a title="Zero-day vulnerability in Telegram" rel="nofollow" href="https://securelist.com/zero-day-vulnerability-in-telegram/83800/">Zero-day vulnerability in Telegram</a> &mdash; The special nonprinting right-to-left override (RLO) character is used to reverse the order of the characters that come after that character in the string. In the Unicode character table, it is represented as ‘U+202E’; one area of legitimate use is when typing Arabic text. In an attack, this character can be used to mislead the victim. It is usually used when displaying the name and extension of an executable file: a piece of software vulnerable to this sort of attack will display the filename incompletely or in reverse.</li><li><a title="Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability" rel="nofollow" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180129-asa1?source=infected.io-telegram">Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability</a> &mdash; After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability. In addition, it was also found that the original fix was incomplete so new fixed code versions are now available. </li><li><a title="Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains" rel="nofollow" href="https://www.forbes.com/sites/ktorpey/2018/02/12/microsoft-to-embrace-decentralized-identity-systems-built-on-bitcoin-and-other-blockchains/#76af78a45ada">Microsoft To Embrace Decentralized Identity Systems Built On Bitcoin And Other Blockchains</a> &mdash; In a new post today, Microsoft announced their embrace of public blockchains, such as Bitcoin and Ethereum, for use in decentralized identity systems.</li><li><a title="XRballer comments on The Stolen XRB has already been Redistributed/Sold Off" rel="nofollow" href="https://www.reddit.com/r/CryptoCurrency/comments/7wonkf/the_stolen_xrb_has_already_been_redistributedsold/du215tr/">XRballer comments on The Stolen XRB has already been Redistributed/Sold Off</a> &mdash; But this check was only on java-script client side, you find the js which is sending the request, then you inspect element - console, and run the java-script manually, to send a request for withdrawal of a higher amount than in your balance.</li><li><a title="Containers Will Not Fix Your Broken Culture" rel="nofollow" href="https://queue.acm.org/detail.cfm?id=3185224">Containers Will Not Fix Your Broken Culture</a> &mdash; Spoiler alert: the solutions to many difficulties that seem technical can be found by examining our interactions with others. Let's talk about five things you'll want to know when working with those pesky creatures known as humans.</li><li><a title="Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields" rel="nofollow" href="https://arxiv.org/abs/1802.02700">Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields</a> &mdash; In this paper, we show how attackers can bypass Faraday cages and air-gaps in order to leak data from highly secure computers. </li><li><a title="Feedback: BeyondCorp" rel="nofollow" href="http://pastedown.ctrl-c.us/#RP5t3LFg3gLPAoBi70ua6IyQJGo.markdown">Feedback: BeyondCorp</a></li><li><a title="Feedback: Mgmt" rel="nofollow" href="http://pastedown.ctrl-c.us/#2jhTp3-geBThElev10Bg9oFRHm4.markdown">Feedback: Mgmt</a></li><li><a title="Feedback: SuperMicro Mobo?" rel="nofollow" href="http://pastedown.ctrl-c.us/#U4lx-Ttdf1fcuRyMeWoF6JKsNVo.markdown">Feedback: SuperMicro Mobo?</a></li><li><a title="Super Micro Computer X8DTN+" rel="nofollow" href="https://www.supermicro.com/products/motherboard/QPI/5500/X8DTN_.cfm?IPMI=O">Super Micro Computer X8DTN+</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 355: Operation FreeNAS Rescue</title>
  <link>https://techsnap.systems/355</link>
  <guid isPermaLink="false">fa6f72dd-e0ec-4839-b2fb-f1651ecbeda4</guid>
  <pubDate>Thu, 08 Feb 2018 11:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fa6f72dd-e0ec-4839-b2fb-f1651ecbeda4.mp3" length="30142642" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. </itunes:subtitle>
  <itunes:duration>40:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. 
Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.
</description>
  <content:encoded>
    <![CDATA[<p>We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. </p>

<p>Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="In just 24 hours, 5,000 Android devices are conscripted into mining botnet" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/out-of-nowhere-currency-mining-botnet-infects-5000-android-devices/">In just 24 hours, 5,000 Android devices are conscripted into mining botnet</a> &mdash; A fast-moving botnet that appeared over the weekend has already infected thousands of Android devices with potentially destructive malware that mines digital coins on behalf of the unknown attackers, researchers said.</li><li><a title="12 best practices for user account, authorization and password management" rel="nofollow" href="https://cloudplatform.googleblog.com/2018/01/12-best-practices-for-user-account.html">12 best practices for user account, authorization and password management</a> &mdash; Account management, authorization and password management can be tricky. For many developers, account management is a dark corner that doesn't get enough attention. For product managers and customers, the resulting experience often falls short of expectations. </li><li><a title="Google’s Zero Trust &#39;BeyondCorp&#39; Infrastructure Shows Future Of Network Security" rel="nofollow" href="http://www.tomsitpro.com/articles/google-beyondcorp-future-network-security,1-3229.html">Google’s Zero Trust 'BeyondCorp' Infrastructure Shows Future Of Network Security</a> &mdash; Google started changing its network security policies to a new model of “zero trust,” which treats its own internal network as the insecure Internet. Google released a new paper detailing how this new model works for its network security policies. </li><li><a title="Google dedicates engineering team to accelerate development of WordPress ecosystem" rel="nofollow" href="https://searchengineland.com/need-speed-google-dedicates-engineering-team-accelerate-development-wordpress-ecosystem-291214">Google dedicates engineering team to accelerate development of WordPress ecosystem</a> &mdash; Google's partnership with WordPress aims to jump-start the platform's support of the latest web technologies -- particularly those involving performance &amp; mobile experience. And they're hiring WordPress experts.</li><li><a title="UNIXSurplus" rel="nofollow" href="https://unixsurplus.com/">UNIXSurplus</a> &mdash; UNIXSurplus is a multi-level provider of new and refurbished custom built servers, storage solutions and computer equipment.  </li><li><a title="FreeNAS Storage Operating System" rel="nofollow" href="http://www.freenas.org/">FreeNAS Storage Operating System</a> &mdash; FreeNAS is an operating system that can be installed on virtually any hardware platform to share data over a network. FreeNAS is the simplest way to create a centralized and easily accessible place for your data. Use FreeNAS with ZFS to protect, store, backup, all of your data. FreeNAS is used everywhere, for the home, small business, and the enterprise.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We save our FreeNAS Mini from the edge, and perform an emergency migration to much larger hardware. </p>

<p>Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB, and your questions.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="In just 24 hours, 5,000 Android devices are conscripted into mining botnet" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/out-of-nowhere-currency-mining-botnet-infects-5000-android-devices/">In just 24 hours, 5,000 Android devices are conscripted into mining botnet</a> &mdash; A fast-moving botnet that appeared over the weekend has already infected thousands of Android devices with potentially destructive malware that mines digital coins on behalf of the unknown attackers, researchers said.</li><li><a title="12 best practices for user account, authorization and password management" rel="nofollow" href="https://cloudplatform.googleblog.com/2018/01/12-best-practices-for-user-account.html">12 best practices for user account, authorization and password management</a> &mdash; Account management, authorization and password management can be tricky. For many developers, account management is a dark corner that doesn't get enough attention. For product managers and customers, the resulting experience often falls short of expectations. </li><li><a title="Google’s Zero Trust &#39;BeyondCorp&#39; Infrastructure Shows Future Of Network Security" rel="nofollow" href="http://www.tomsitpro.com/articles/google-beyondcorp-future-network-security,1-3229.html">Google’s Zero Trust 'BeyondCorp' Infrastructure Shows Future Of Network Security</a> &mdash; Google started changing its network security policies to a new model of “zero trust,” which treats its own internal network as the insecure Internet. Google released a new paper detailing how this new model works for its network security policies. </li><li><a title="Google dedicates engineering team to accelerate development of WordPress ecosystem" rel="nofollow" href="https://searchengineland.com/need-speed-google-dedicates-engineering-team-accelerate-development-wordpress-ecosystem-291214">Google dedicates engineering team to accelerate development of WordPress ecosystem</a> &mdash; Google's partnership with WordPress aims to jump-start the platform's support of the latest web technologies -- particularly those involving performance &amp; mobile experience. And they're hiring WordPress experts.</li><li><a title="UNIXSurplus" rel="nofollow" href="https://unixsurplus.com/">UNIXSurplus</a> &mdash; UNIXSurplus is a multi-level provider of new and refurbished custom built servers, storage solutions and computer equipment.  </li><li><a title="FreeNAS Storage Operating System" rel="nofollow" href="http://www.freenas.org/">FreeNAS Storage Operating System</a> &mdash; FreeNAS is an operating system that can be installed on virtually any hardware platform to share data over a network. FreeNAS is the simplest way to create a centralized and easily accessible place for your data. Use FreeNAS with ZFS to protect, store, backup, all of your data. FreeNAS is used everywhere, for the home, small business, and the enterprise.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 354: Here Come the Script Kiddies</title>
  <link>https://techsnap.systems/354</link>
  <guid isPermaLink="false">e2e1b46b-2f05-465f-821b-95680dc0cda0</guid>
  <pubDate>Thu, 01 Feb 2018 18:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e2e1b46b-2f05-465f-821b-95680dc0cda0.mp3" length="38049693" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</itunes:subtitle>
  <itunes:duration>51:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.
Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.
</description>
  <content:encoded>
    <![CDATA[<p>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</p>

<p>Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Audio Adversarial Examples" rel="nofollow" href="https://nicholas.carlini.com/code/audio_adversarial_examples/">Audio Adversarial Examples</a> &mdash; We have constructed targeted audio adversarial examples on speech-to-text transcription neural networks: given an arbitrary waveform, we can make a small perturbation that when added to the original waveform causes it to transcribe as any phrase we choose.</li><li><a title="Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type" rel="nofollow" href="https://hotforsecurity.bitdefender.com/blog/keylogger-found-on-thousands-of-wordpress-based-sites-stealing-every-keypress-as-you-type-19501.html">Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type</a> &mdash; But, in a twist, this particular attack isn’t just interested in mining Monero. While the website’s front-end is digging for cryptocurrencies, the back-end is secretly hosting a keylogger designed to steal unsuspecting users’ login credentials.</li><li><a title="Qubes Air: Generalizing the Qubes Architecture | Qubes OS" rel="nofollow" href="https://www.qubes-os.org/news/2018/01/22/qubes-air/">Qubes Air: Generalizing the Qubes Architecture | Qubes OS</a> &mdash; Qubes Air is the next step on our roadmap to making the concept of “Security through Compartmentalization” applicable to more scenarios. It is also an attempt to address some of the biggest problems and weaknesses plaguing the current implementation of Qubes, specifically the difficulty of deployment and virtualization as a single point of failure. While Qubes-as-a-Service is one natural application that could be built on top of Qubes Air, it is certainly not the only one. We have also discussed running Qubes over clusters of physically isolated devices, as well as various hybrid scenarios. I believe the approach to security that Qubes has been implementing for years will continue to be valid for years to come, even in a world of apps-as-a-service.</li><li><a title="Making network authentication simple in a Bring Your Own Device environment" rel="nofollow" href="https://medium.com/@anatole.beuzon/making-network-authentication-simple-in-a-bring-your-own-device-environment-9080baf39617">Making network authentication simple in a Bring Your Own Device environment</a> &mdash; In this article, we explore in depth the challenges we faced regarding compatibility, security, and user experience, and the solutions we came up with. We explain how we combined 802.1X authentication (wired &amp; wireless) and per-subscriber VLANs to offer our users a quality Internet experience.</li><li><a title="“Autosploit” tool sparks fears of empowered “script kiddies”" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/threat-or-menace-autosploit-tool-sparks-fears-of-empowered-script-kiddies/">“Autosploit” tool sparks fears of empowered “script kiddies”</a> &mdash;  "AutoSploit attempts to automate the exploitation of remote hosts."</li><li><a title="AutoSploit: Automated Mass Exploiter" rel="nofollow" href="https://github.com/NullArray/AutoSploit">AutoSploit: Automated Mass Exploiter</a> &mdash; Clone the repo. Or deploy via Docker.</li><li><a title="How To Use psad to Detect Network Intrusion Attempts" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-use-psad-to-detect-network-intrusion-attempts-on-an-ubuntu-vps">How To Use psad to Detect Network Intrusion Attempts</a> &mdash; The key to using psad effectively is to configure danger levels and email alerts appropriately, and then follow up on any problems. This tool, coupled with other intrusion detection resources like tripwire can provide fairly good coverage to be able to detect intrusion attempts.</li><li><a title="Portainer: Simple management UI for Docker" rel="nofollow" href="https://github.com/portainer/portainer">Portainer: Simple management UI for Docker</a></li><li><a title="What is iSCSI (Internet Small Computer System Interface)" rel="nofollow" href="http://searchstorage.techtarget.com/definition/iSCSI">What is iSCSI (Internet Small Computer System Interface)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</p>

<p>Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Audio Adversarial Examples" rel="nofollow" href="https://nicholas.carlini.com/code/audio_adversarial_examples/">Audio Adversarial Examples</a> &mdash; We have constructed targeted audio adversarial examples on speech-to-text transcription neural networks: given an arbitrary waveform, we can make a small perturbation that when added to the original waveform causes it to transcribe as any phrase we choose.</li><li><a title="Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type" rel="nofollow" href="https://hotforsecurity.bitdefender.com/blog/keylogger-found-on-thousands-of-wordpress-based-sites-stealing-every-keypress-as-you-type-19501.html">Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type</a> &mdash; But, in a twist, this particular attack isn’t just interested in mining Monero. While the website’s front-end is digging for cryptocurrencies, the back-end is secretly hosting a keylogger designed to steal unsuspecting users’ login credentials.</li><li><a title="Qubes Air: Generalizing the Qubes Architecture | Qubes OS" rel="nofollow" href="https://www.qubes-os.org/news/2018/01/22/qubes-air/">Qubes Air: Generalizing the Qubes Architecture | Qubes OS</a> &mdash; Qubes Air is the next step on our roadmap to making the concept of “Security through Compartmentalization” applicable to more scenarios. It is also an attempt to address some of the biggest problems and weaknesses plaguing the current implementation of Qubes, specifically the difficulty of deployment and virtualization as a single point of failure. While Qubes-as-a-Service is one natural application that could be built on top of Qubes Air, it is certainly not the only one. We have also discussed running Qubes over clusters of physically isolated devices, as well as various hybrid scenarios. I believe the approach to security that Qubes has been implementing for years will continue to be valid for years to come, even in a world of apps-as-a-service.</li><li><a title="Making network authentication simple in a Bring Your Own Device environment" rel="nofollow" href="https://medium.com/@anatole.beuzon/making-network-authentication-simple-in-a-bring-your-own-device-environment-9080baf39617">Making network authentication simple in a Bring Your Own Device environment</a> &mdash; In this article, we explore in depth the challenges we faced regarding compatibility, security, and user experience, and the solutions we came up with. We explain how we combined 802.1X authentication (wired &amp; wireless) and per-subscriber VLANs to offer our users a quality Internet experience.</li><li><a title="“Autosploit” tool sparks fears of empowered “script kiddies”" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/threat-or-menace-autosploit-tool-sparks-fears-of-empowered-script-kiddies/">“Autosploit” tool sparks fears of empowered “script kiddies”</a> &mdash;  "AutoSploit attempts to automate the exploitation of remote hosts."</li><li><a title="AutoSploit: Automated Mass Exploiter" rel="nofollow" href="https://github.com/NullArray/AutoSploit">AutoSploit: Automated Mass Exploiter</a> &mdash; Clone the repo. Or deploy via Docker.</li><li><a title="How To Use psad to Detect Network Intrusion Attempts" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-use-psad-to-detect-network-intrusion-attempts-on-an-ubuntu-vps">How To Use psad to Detect Network Intrusion Attempts</a> &mdash; The key to using psad effectively is to configure danger levels and email alerts appropriately, and then follow up on any problems. This tool, coupled with other intrusion detection resources like tripwire can provide fairly good coverage to be able to detect intrusion attempts.</li><li><a title="Portainer: Simple management UI for Docker" rel="nofollow" href="https://github.com/portainer/portainer">Portainer: Simple management UI for Docker</a></li><li><a title="What is iSCSI (Internet Small Computer System Interface)" rel="nofollow" href="http://searchstorage.techtarget.com/definition/iSCSI">What is iSCSI (Internet Small Computer System Interface)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 353: Too Many Containers</title>
  <link>https://techsnap.systems/353</link>
  <guid isPermaLink="false">76cf88a2-f5d9-4dba-b314-f9f00e3767df</guid>
  <pubDate>Thu, 25 Jan 2018 16:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/76cf88a2-f5d9-4dba-b314-f9f00e3767df.mp3" length="31823746" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</itunes:subtitle>
  <itunes:duration>43:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.
Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.
</description>
  <content:encoded>
    <![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="DNSFS. Store your files in others DNS resolver caches" rel="nofollow" href="https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs">DNSFS. Store your files in others DNS resolver caches</a> &mdash; The DNSFS code is a relatively simple system, every file uploaded is split into 180 byte chunks, and those chunks are “set” inside caches by querying the DNSFS node via the public resolver for a TXT record. After a few seconds the data is removed from DNSFS memory and the data is no longer on the client computer.</li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; BPF is an absolutely marvelous and flexible way of filtering packets.</li><li><a title="dnsfs: Store your data in others DNS revolvers cache" rel="nofollow" href="https://github.com/benjojo/dnsfs">dnsfs: Store your data in others DNS revolvers cache</a> &mdash; Store your data in others DNS revolvers cache</li><li><a title="Unauthenticated LAN remote code execution in AsusWRT" rel="nofollow" href="https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt">Unauthenticated LAN remote code execution in AsusWRT</a> &mdash; However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.</li><li><a title="AI is moving towards acceptance in cyber security, says Check Point" rel="nofollow" href="http://www.computerweekly.com/news/252433705/AI-is-moving-towards-acceptance-in-cyber-security-says-Check-Point">AI is moving towards acceptance in cyber security, says Check Point</a> &mdash; Artificial intelligence is well on its way to being a useful tool in the cyber security professional’s kit, but according to Check Point, there are still big challenges to overcome.</li><li><a title="Alphabet is launching a new CyberSecurity unit." rel="nofollow" href="https://www.linkedin.com/pulse/alphabet-launching-new-cybersecurity-unit-justin-sleight/">Alphabet is launching a new CyberSecurity unit.</a> &mdash; Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

</li><li><a title="Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users&#39; PCs" rel="nofollow" href="https://www.v3.co.uk/v3-uk/news/3024532/google-project-zero-claims-new-bittorrent-flaw-could-enable-cyber-crooks-get-into-users-pcs">Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs</a> &mdash; According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. </li><li><a title="CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468" rel="nofollow" href="https://github.com/transmission/transmission/pull/468">CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468</a></li><li><a title="Blizzard Fixes DNS Rebinding Flaw that Put All the Company&#39;s Users at Risk" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/">Blizzard Fixes DNS Rebinding Flaw that Put All the Company's Users at Risk</a></li><li><a title="What is DNS rebinding, in layman&#39;s terms?" rel="nofollow" href="https://www.quora.com/What-is-DNS-rebinding-in-laymans-terms">What is DNS rebinding, in layman's terms?</a></li><li><a title="An Introduction to Kubernetes" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes">An Introduction to Kubernetes</a> &mdash; Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.</li><li><a title="What is Kubernetes?" rel="nofollow" href="https://www.redhat.com/en/topics/containers/what-is-kubernetes">What is Kubernetes?</a> &mdash; Kubernetes was originally developed and designed by engineers at Google. Google was one of the early contributors to Linux container technology and has talked publicly about how everything at Google runs in containers. (This is the technology behind Google’s cloud services.) Google generates more than 2 billion container deployments a week—all powered by an internal platform: Borg. Borg was the predecessor to Kubernetes and the lessons learned from developing Borg over the years became the primary influence behind much of the Kubernetes technology.</li><li><a title="Scaling Kubernetes to 2,500 Nodes" rel="nofollow" href="https://blog.openai.com/scaling-kubernetes-to-2500-nodes/">Scaling Kubernetes to 2,500 Nodes</a> &mdash; We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments.</li><li><a title="Feedback: Talk more about Windows" rel="nofollow" href="https://slexy.org/view/s21GdmdxDs">Feedback: Talk more about Windows</a> &mdash; I listened to your intro to change management and it seemed like it will be very Linux centric ("everything is she"). I'm future segments, please try to include windows desktop and server OS as well.</li><li><a title="Question: Starting with Ansible Quick" rel="nofollow" href="https://slexy.org/view/s2sGYopuRw">Question: Starting with Ansible Quick</a> &mdash; Are there any way to get started other than writing a playbook and trying it out with trial and error?</li><li><a title="Ansible Best Practises: A project structure that outlines some best practises of how to use ansible" rel="nofollow" href="https://github.com/enginyoyen/ansible-best-practises">Ansible Best Practises: A project structure that outlines some best practises of how to use ansible</a> &mdash; A project structure that outlines some best practises of how to use ansible</li><li><a title="ansible-console: An Interactive REPL for Ansible" rel="nofollow" href="https://yobriefca.se/blog/2017/01/10/ansible-console-an-interactive-repl-for-ansible/">ansible-console: An Interactive REPL for Ansible</a> &mdash; omething found out recently is that Ansible has an interactive REPL of sorts in ansible-console for doing some adhoc things on a collection of hosts.</li><li><a title="Introduction To Ad-Hoc Commands — Ansible Documentation" rel="nofollow" href="http://docs.ansible.com/ansible/latest/intro_adhoc.html">Introduction To Ad-Hoc Commands — Ansible Documentation</a> &mdash; An ad-hoc command is something that you might type in to do something really quick, but don’t want to save for later.

</li><li><a title="About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support" rel="nofollow" href="https://support.apple.com/en-us/HT208465">About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support</a> &mdash; This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it, and where it came from. Also who shouldn’t be using Kubernetes, and the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="DNSFS. Store your files in others DNS resolver caches" rel="nofollow" href="https://blog.benjojo.co.uk/post/dns-filesystem-true-cloud-storage-dnsfs">DNSFS. Store your files in others DNS resolver caches</a> &mdash; The DNSFS code is a relatively simple system, every file uploaded is split into 180 byte chunks, and those chunks are “set” inside caches by querying the DNSFS node via the public resolver for a TXT record. After a few seconds the data is removed from DNSFS memory and the data is no longer on the client computer.</li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; BPF is an absolutely marvelous and flexible way of filtering packets.</li><li><a title="dnsfs: Store your data in others DNS revolvers cache" rel="nofollow" href="https://github.com/benjojo/dnsfs">dnsfs: Store your data in others DNS revolvers cache</a> &mdash; Store your data in others DNS revolvers cache</li><li><a title="Unauthenticated LAN remote code execution in AsusWRT" rel="nofollow" href="https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt">Unauthenticated LAN remote code execution in AsusWRT</a> &mdash; However due to a number of coding errors, it is possible for an unauthenticated attacker in the LAN to achieve remote code execution in the router as the root user.</li><li><a title="AI is moving towards acceptance in cyber security, says Check Point" rel="nofollow" href="http://www.computerweekly.com/news/252433705/AI-is-moving-towards-acceptance-in-cyber-security-says-Check-Point">AI is moving towards acceptance in cyber security, says Check Point</a> &mdash; Artificial intelligence is well on its way to being a useful tool in the cyber security professional’s kit, but according to Check Point, there are still big challenges to overcome.</li><li><a title="Alphabet is launching a new CyberSecurity unit." rel="nofollow" href="https://www.linkedin.com/pulse/alphabet-launching-new-cybersecurity-unit-justin-sleight/">Alphabet is launching a new CyberSecurity unit.</a> &mdash; Alphabet, the parent company of Google, announced today that they will be launching Chronicle, a new business unit that will focus on Cyber Security, using their servers and infrastructure. The new organization hopes to focus on machine learning and artificial intelligence to assist in the fight against cybercrime moving forward.

</li><li><a title="Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users&#39; PCs" rel="nofollow" href="https://www.v3.co.uk/v3-uk/news/3024532/google-project-zero-claims-new-bittorrent-flaw-could-enable-cyber-crooks-get-into-users-pcs">Google Project Zero claims new BitTorrent flaw could enable cyber crooks get into users' PCs</a> &mdash; According to Project Zero, the client is vulnerable to a DNS re-binding attack that effectively tricks the PC into accepting requests via port 9091 from malicious websites that it would (and should) ordinarly ignore. </li><li><a title="CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468" rel="nofollow" href="https://github.com/transmission/transmission/pull/468">CVE-2018-5702: Mitigate dns rebinding attacks against daemon by taviso · Pull Request #468</a></li><li><a title="Blizzard Fixes DNS Rebinding Flaw that Put All the Company&#39;s Users at Risk" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/">Blizzard Fixes DNS Rebinding Flaw that Put All the Company's Users at Risk</a></li><li><a title="What is DNS rebinding, in layman&#39;s terms?" rel="nofollow" href="https://www.quora.com/What-is-DNS-rebinding-in-laymans-terms">What is DNS rebinding, in layman's terms?</a></li><li><a title="An Introduction to Kubernetes" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-kubernetes">An Introduction to Kubernetes</a> &mdash; Kubernetes, at its basic level, is a system for managing containerized applications across a cluster of nodes. In many ways, Kubernetes was designed to address the disconnect between the way that modern, clustered infrastructure is designed, and some of the assumptions that most applications and services have about their environments.</li><li><a title="What is Kubernetes?" rel="nofollow" href="https://www.redhat.com/en/topics/containers/what-is-kubernetes">What is Kubernetes?</a> &mdash; Kubernetes was originally developed and designed by engineers at Google. Google was one of the early contributors to Linux container technology and has talked publicly about how everything at Google runs in containers. (This is the technology behind Google’s cloud services.) Google generates more than 2 billion container deployments a week—all powered by an internal platform: Borg. Borg was the predecessor to Kubernetes and the lessons learned from developing Borg over the years became the primary influence behind much of the Kubernetes technology.</li><li><a title="Scaling Kubernetes to 2,500 Nodes" rel="nofollow" href="https://blog.openai.com/scaling-kubernetes-to-2500-nodes/">Scaling Kubernetes to 2,500 Nodes</a> &mdash; We’ve been running Kubernetes for deep learning research for over two years. While our largest-scale workloads manage bare cloud VMs directly, Kubernetes provides a fast iteration cycle, reasonable scalability, and a lack of boilerplate which makes it ideal for most of our experiments.</li><li><a title="Feedback: Talk more about Windows" rel="nofollow" href="https://slexy.org/view/s21GdmdxDs">Feedback: Talk more about Windows</a> &mdash; I listened to your intro to change management and it seemed like it will be very Linux centric ("everything is she"). I'm future segments, please try to include windows desktop and server OS as well.</li><li><a title="Question: Starting with Ansible Quick" rel="nofollow" href="https://slexy.org/view/s2sGYopuRw">Question: Starting with Ansible Quick</a> &mdash; Are there any way to get started other than writing a playbook and trying it out with trial and error?</li><li><a title="Ansible Best Practises: A project structure that outlines some best practises of how to use ansible" rel="nofollow" href="https://github.com/enginyoyen/ansible-best-practises">Ansible Best Practises: A project structure that outlines some best practises of how to use ansible</a> &mdash; A project structure that outlines some best practises of how to use ansible</li><li><a title="ansible-console: An Interactive REPL for Ansible" rel="nofollow" href="https://yobriefca.se/blog/2017/01/10/ansible-console-an-interactive-repl-for-ansible/">ansible-console: An Interactive REPL for Ansible</a> &mdash; omething found out recently is that Ansible has an interactive REPL of sorts in ansible-console for doing some adhoc things on a collection of hosts.</li><li><a title="Introduction To Ad-Hoc Commands — Ansible Documentation" rel="nofollow" href="http://docs.ansible.com/ansible/latest/intro_adhoc.html">Introduction To Ad-Hoc Commands — Ansible Documentation</a> &mdash; An ad-hoc command is something that you might type in to do something really quick, but don’t want to save for later.

</li><li><a title="About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support" rel="nofollow" href="https://support.apple.com/en-us/HT208465">About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan - Apple Support</a> &mdash; This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 352: Stop Using apt-get </title>
  <link>https://techsnap.systems/352</link>
  <guid isPermaLink="false">a35e6ff5-f699-4f4a-b6dd-3f01fff2a445</guid>
  <pubDate>Mon, 22 Jan 2018 21:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a35e6ff5-f699-4f4a-b6dd-3f01fff2a445.mp3" length="26958801" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.
</itunes:subtitle>
  <itunes:duration>36:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.
Plus the news of the week that could impact your systems, feedback, and more. 
</description>
  <content:encoded>
    <![CDATA[<p>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.</p>

<p>Plus the news of the week that could impact your systems, feedback, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="SamSam Ransomware Hits Hospitals, City Councils, ICS Firms" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">SamSam Ransomware Hits Hospitals, City Councils, ICS Firms</a> &mdash; The SamSam crew usually scans the Internet for computers with open RDP connections and they break into networks by brute-forcing these RDP endpoints to spread to more computers.
</li><li><a title="RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…" rel="nofollow" href="https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6">RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…</a> &mdash; How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software.</li><li><a title="EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World" rel="nofollow" href="https://www.eff.org/press/releases/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around">EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World</a> &mdash; The trojanized apps, including Signal and WhatsApp, function like the legitimate apps and send and receive messages normally. However, the fake apps also allow the attackers to take photos, retrieve location information, capture audio, and more.</li><li><a title="Lenovo Discovers and Removes Backdoor in Networking Switches" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/lenovo-discovers-and-removes-backdoor-in-networking-switches/">Lenovo Discovers and Removes Backdoor in Networking Switches</a> &mdash; Lenovo engineers have discovered a backdoor in the firmware of RackSwitch and BladeCenter networking switches. The company released firmware updates earlier this week.</li><li><a title="Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too" rel="nofollow" href="https://www.theverge.com/2018/1/18/16904726/intel-meltdown-spectre-fix-higher-reboots">Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too</a> &mdash; Data center performance can degrade by up to 25 percent for certain workloads.</li><li><a title="VMware pulled Spectre patches on Friday." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/7qjnfx/vmware_pulled_spectre_patches_on_friday/">VMware pulled Spectre patches on Friday.</a> &mdash; Affected updates are the ones for ESXi under VMSA-2018-0004 that contained CPU microcode. Despite these being the affected patches, all of the patches under VMSA-2018-004 have been pulled.</li><li><a title="Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=GCC-8-Spectre-Mitigation-Lands">Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7</a> &mdash; The set of Spectre mitigation patches for the GNU Compiler Collection (GCC) were accepted to mainline and will be part of GCC 8 with the GCC 8.1 stable release that will likely be due out around March. This is on top of many other changes/features of GCC 8. </li><li><a title="New Linux Method to Check your System" rel="nofollow" href="http://kroah.com/log/blog/2018/01/19/meltdown-status-2/">New Linux Method to Check your System</a> &mdash; grep . /sys/devices/system/cpu/vulnerabilities/*</li><li><a title="AMD Processor Security" rel="nofollow" href="https://www.amd.com/en/corporate/speculative-execution">AMD Processor Security</a> &mdash; AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC processors starting this week.</li><li><a title="Skyfall and Solace" rel="nofollow" href="https://skyfallattack.com/">Skyfall and Solace</a></li><li><a title="An Introduction to Configuration Management | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-configuration-management">An Introduction to Configuration Management | DigitalOcean</a> &mdash; As a broader subject, configuration management (CM) refers to the process of systematically handling changes to a system in a way that it maintains integrity over time. Even though this process was not originated in the IT industry, the term is broadly used to refer to server configuration management</li><li><a title="Configuration Management on the Desktop" rel="nofollow" href="https://slexy.org/view/s23m6LwSnL">Configuration Management on the Desktop</a> &mdash; It installs GNOME, sets up my wallpaper, applies my GTK/icon themes, sets up my keyboard shortcuts, etc. It also sets up my SSH keys, user dotfiles, OpenSSH config, and much more. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>And start using configuration management. Embrace reproducibility of systems, and streamlined management with TechSNAP’s introduction to Configuration Management.</p>

<p>Plus the news of the week that could impact your systems, feedback, and more.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="SamSam Ransomware Hits Hospitals, City Councils, ICS Firms" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">SamSam Ransomware Hits Hospitals, City Councils, ICS Firms</a> &mdash; The SamSam crew usually scans the Internet for computers with open RDP connections and they break into networks by brute-forcing these RDP endpoints to spread to more computers.
</li><li><a title="RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…" rel="nofollow" href="https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6">RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…</a> &mdash; How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software.</li><li><a title="EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World" rel="nofollow" href="https://www.eff.org/press/releases/eff-and-lookout-uncover-new-malware-espionage-campaign-infecting-thousands-around">EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World</a> &mdash; The trojanized apps, including Signal and WhatsApp, function like the legitimate apps and send and receive messages normally. However, the fake apps also allow the attackers to take photos, retrieve location information, capture audio, and more.</li><li><a title="Lenovo Discovers and Removes Backdoor in Networking Switches" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/lenovo-discovers-and-removes-backdoor-in-networking-switches/">Lenovo Discovers and Removes Backdoor in Networking Switches</a> &mdash; Lenovo engineers have discovered a backdoor in the firmware of RackSwitch and BladeCenter networking switches. The company released firmware updates earlier this week.</li><li><a title="Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too" rel="nofollow" href="https://www.theverge.com/2018/1/18/16904726/intel-meltdown-spectre-fix-higher-reboots">Intel says Meltdown / Spectre patch causes reboots in computers with newer processors too</a> &mdash; Data center performance can degrade by up to 25 percent for certain workloads.</li><li><a title="VMware pulled Spectre patches on Friday." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/7qjnfx/vmware_pulled_spectre_patches_on_friday/">VMware pulled Spectre patches on Friday.</a> &mdash; Affected updates are the ones for ESXi under VMSA-2018-0004 that contained CPU microcode. Despite these being the affected patches, all of the patches under VMSA-2018-004 have been pulled.</li><li><a title="Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=GCC-8-Spectre-Mitigation-Lands">Spectre Mitigation Added To GCC 8, Seeking Backport To GCC 7</a> &mdash; The set of Spectre mitigation patches for the GNU Compiler Collection (GCC) were accepted to mainline and will be part of GCC 8 with the GCC 8.1 stable release that will likely be due out around March. This is on top of many other changes/features of GCC 8. </li><li><a title="New Linux Method to Check your System" rel="nofollow" href="http://kroah.com/log/blog/2018/01/19/meltdown-status-2/">New Linux Method to Check your System</a> &mdash; grep . /sys/devices/system/cpu/vulnerabilities/*</li><li><a title="AMD Processor Security" rel="nofollow" href="https://www.amd.com/en/corporate/speculative-execution">AMD Processor Security</a> &mdash; AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC processors starting this week.</li><li><a title="Skyfall and Solace" rel="nofollow" href="https://skyfallattack.com/">Skyfall and Solace</a></li><li><a title="An Introduction to Configuration Management | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/an-introduction-to-configuration-management">An Introduction to Configuration Management | DigitalOcean</a> &mdash; As a broader subject, configuration management (CM) refers to the process of systematically handling changes to a system in a way that it maintains integrity over time. Even though this process was not originated in the IT industry, the term is broadly used to refer to server configuration management</li><li><a title="Configuration Management on the Desktop" rel="nofollow" href="https://slexy.org/view/s23m6LwSnL">Configuration Management on the Desktop</a> &mdash; It installs GNOME, sets up my wallpaper, applies my GTK/icon themes, sets up my keyboard shortcuts, etc. It also sets up my SSH keys, user dotfiles, OpenSSH config, and much more. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 351: Performance Meltdown</title>
  <link>https://techsnap.systems/351</link>
  <guid isPermaLink="false">92c20700-9d53-4470-a263-d3e009a19100</guid>
  <pubDate>Thu, 11 Jan 2018 16:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/92c20700-9d53-4470-a263-d3e009a19100.mp3" length="30893583" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.

Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </itunes:subtitle>
  <itunes:duration>41:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.
Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. 
Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.</p>

<p>Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </p>

<p>Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="Meltdown and Spectre" rel="nofollow" href="https://meltdownattack.com/">Meltdown and Spectre</a> &mdash; Meltdown and Spectre exploit critical vulnerabilities in modern processors. </li><li><a title="The Meltdown and Spectre CPU Bugs, Explained" rel="nofollow" href="https://blog.barkly.com/meltdown-spectre-bugs-explained">The Meltdown and Spectre CPU Bugs, Explained</a></li><li><a title="How we got to Spectre and Meltdown A Timeline My version of the timeline..." rel="nofollow" href="https://plus.google.com/+jwildeboer/posts/jj6a9JUaovP">How we got to Spectre and Meltdown A Timeline My version of the timeline...</a> &mdash; My version of the timeline on Spectre Meltdown. This post will be updated! If you want to add/correct something, please comment.</li><li><a title="How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/01/06/how-tier-2-cloud-vendors-banded-together-to-cope-with-spectre-and-meltdown/">How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch</a> &mdash; Eventually six cloud providers — Scaleway, DigitalOcean, Packet, Vultr, Linode and OVH — formed a consortium of sorts to help one another and share information. In order to make the process more efficient, they started a Slack channel with CEOs, CTOs and engineers from the various companies sharing information and fixes as they became available.</li><li><a title="FreeBSD was made aware of Meltdown and Spectre in late December. There&#39;s currently no ETA for mitigation." rel="nofollow" href="https://www.reddit.com/r/freebsd/comments/7och5a/freebsd_was_made_aware_of_meltdown_and_spectre_in/">FreeBSD was made aware of Meltdown and Spectre in late December. There's currently no ETA for mitigation.</a> &mdash; It looks like Dragonfly BSD has a patch, so hopefully that will be useful for FreeBSD.</li><li><a title="heads up: Fix for intel hardware bug will lead to performance regressions" rel="nofollow" href="https://www.postgresql.org/message-id/20180102222354.qikjmf7dvnjgbkxe@alap3.anarazel.de">heads up: Fix for intel hardware bug will lead to performance regressions</a> &mdash; Upcoming versions of the linux kernel (and apparently also windows and
others), will include new feature that apparently has been implemented
with haste to work around an intel hardware bug.</li><li><a title="AWS Developer Forums: Degraded performance" rel="nofollow" href="https://forums.aws.amazon.com/thread.jspa?threadID=269858">AWS Developer Forums: Degraded performance</a> &mdash; Immediately following the reboot my server running on this instance started to suffer from cpu stress.</li><li><a title="Google is pushing Retpoline" rel="nofollow" href="https://www.blog.google/topics/google-cloud/protecting-our-google-cloud-customers-new-vulnerabilities-without-impacting-performance/">Google is pushing Retpoline</a> &mdash; With Retpoline, we could protect our infrastructure at compile-time, with no source-code modifications. Furthermore, testing this feature, particularly when combined with optimizations such as software branch prediction hints, demonstrated that this protection came with almost no performance loss.

</li><li><a title="PCID is now a critical performance/security feature on x86 " rel="nofollow" href="http://archive.is/ma8Iw#selection-341.2-344.0">PCID is now a critical performance/security feature on x86 </a> &mdash; On any system that does not currently show "pcid" in the flags line of /proc/cpuinfo, Meltdown is a bigger issue than "install latest updates".
</li><li><a title="Spectre &amp; Meltdown vulnerability/mitigation checker for Linux" rel="nofollow" href="https://github.com/speed47/spectre-meltdown-checker">Spectre &amp; Meltdown vulnerability/mitigation checker for Linux</a> &mdash; A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.</li><li><a title="Microsoft PowerShell Script to check for Meltdown" rel="nofollow" href="https://support.microsoft.com/en-gb/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in">Microsoft PowerShell Script to check for Meltdown</a> &mdash; To help customers verify that protections are enabled, Microsoft has published a PowerShell script that customers can run on their systems. Install and run the script by running the following commands.

</li><li><a title="Why Raspberry Pi isn&#39;t vulnerable to Spectre or Meltdown" rel="nofollow" href="https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/">Why Raspberry Pi isn't vulnerable to Spectre or Meltdown</a> &mdash; To help us understand why, here’s a little primer on some concepts in modern processor design. </li><li><a title="macOS High Sierra&#39;s App Store System Preferences Can Be Unlocked With Any Password" rel="nofollow" href="https://www.macrumors.com/2018/01/10/macos-high-sierra-app-store-password-bug/">macOS High Sierra's App Store System Preferences Can Be Unlocked With Any Password</a> &mdash; A bug report submitted on Open Radar this week has revealed a security flaw in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. </li><li><a title="Major macOS High Sierra Bug Allows Full Admin Access Without Password" rel="nofollow" href="https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/">Major macOS High Sierra Bug Allows Full Admin Access Without Password</a></li><li><a title="WD My Cloud NAS devices have hard-wired backdoor" rel="nofollow" href="https://www.theregister.co.uk/2018/01/08/wd_mycloud_nas_backdoor/">WD My Cloud NAS devices have hard-wired backdoor</a> &mdash; Lets anyone log in as user mydlinkBRionyg with the password abc12345cba.</li><li><a title="Question: How could I measure all of these overhead performance hits?" rel="nofollow" href="https://slexy.org/view/s2hNxl4Ras">Question: How could I measure all of these overhead performance hits?</a> &mdash; My question: how could I measure all of these overhead performance hits, so I can put in a well educated request to adjust all of these components, so I have a computer that performs near its capacity?</li><li><a title="Perfmon" rel="nofollow" href="https://technet.microsoft.com/en-us/library/bb490957.aspx">Perfmon</a></li><li><a title="Troubleshooting with the Windows Sysinternals Tools" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/learn/troubleshooting-book">Troubleshooting with the Windows Sysinternals Tools</a></li><li><a title="ProcDump" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procdump">ProcDump</a></li><li><a title="Process Monitor - Replaces filemon" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procmon">Process Monitor - Replaces filemon</a></li><li><a title="Question: MySQL Replication Woes" rel="nofollow" href="https://slexy.org/view/s2iRKPgsGI">Question: MySQL Replication Woes</a> &mdash; The problem is that during some larger deletes on the master, the tables on the slave get locked and the slave lag goes through the roof.. During this time all of my selects that have been sent to the slave are just sitting there and waiting for the table to unlock while the master is just fine.</li><li><a title="Ask Noah 44: Red Hat with Brandon Johnson" rel="nofollow" href="http://www.jupiterbroadcasting.com/121292/redhat-with-brandon-johnson-ask-noah-44/">Ask Noah 44: Red Hat with Brandon Johnson</a></li><li><a title="BSD Now 228: The Spectre of Meltdown" rel="nofollow" href="http://www.jupiterbroadcasting.com/121362/the-spectre-of-meltdown-bsd-now-228/">BSD Now 228: The Spectre of Meltdown</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.</p>

<p>Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </p>

<p>Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="Meltdown and Spectre" rel="nofollow" href="https://meltdownattack.com/">Meltdown and Spectre</a> &mdash; Meltdown and Spectre exploit critical vulnerabilities in modern processors. </li><li><a title="The Meltdown and Spectre CPU Bugs, Explained" rel="nofollow" href="https://blog.barkly.com/meltdown-spectre-bugs-explained">The Meltdown and Spectre CPU Bugs, Explained</a></li><li><a title="How we got to Spectre and Meltdown A Timeline My version of the timeline..." rel="nofollow" href="https://plus.google.com/+jwildeboer/posts/jj6a9JUaovP">How we got to Spectre and Meltdown A Timeline My version of the timeline...</a> &mdash; My version of the timeline on Spectre Meltdown. This post will be updated! If you want to add/correct something, please comment.</li><li><a title="How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/01/06/how-tier-2-cloud-vendors-banded-together-to-cope-with-spectre-and-meltdown/">How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch</a> &mdash; Eventually six cloud providers — Scaleway, DigitalOcean, Packet, Vultr, Linode and OVH — formed a consortium of sorts to help one another and share information. In order to make the process more efficient, they started a Slack channel with CEOs, CTOs and engineers from the various companies sharing information and fixes as they became available.</li><li><a title="FreeBSD was made aware of Meltdown and Spectre in late December. There&#39;s currently no ETA for mitigation." rel="nofollow" href="https://www.reddit.com/r/freebsd/comments/7och5a/freebsd_was_made_aware_of_meltdown_and_spectre_in/">FreeBSD was made aware of Meltdown and Spectre in late December. There's currently no ETA for mitigation.</a> &mdash; It looks like Dragonfly BSD has a patch, so hopefully that will be useful for FreeBSD.</li><li><a title="heads up: Fix for intel hardware bug will lead to performance regressions" rel="nofollow" href="https://www.postgresql.org/message-id/20180102222354.qikjmf7dvnjgbkxe@alap3.anarazel.de">heads up: Fix for intel hardware bug will lead to performance regressions</a> &mdash; Upcoming versions of the linux kernel (and apparently also windows and
others), will include new feature that apparently has been implemented
with haste to work around an intel hardware bug.</li><li><a title="AWS Developer Forums: Degraded performance" rel="nofollow" href="https://forums.aws.amazon.com/thread.jspa?threadID=269858">AWS Developer Forums: Degraded performance</a> &mdash; Immediately following the reboot my server running on this instance started to suffer from cpu stress.</li><li><a title="Google is pushing Retpoline" rel="nofollow" href="https://www.blog.google/topics/google-cloud/protecting-our-google-cloud-customers-new-vulnerabilities-without-impacting-performance/">Google is pushing Retpoline</a> &mdash; With Retpoline, we could protect our infrastructure at compile-time, with no source-code modifications. Furthermore, testing this feature, particularly when combined with optimizations such as software branch prediction hints, demonstrated that this protection came with almost no performance loss.

</li><li><a title="PCID is now a critical performance/security feature on x86 " rel="nofollow" href="http://archive.is/ma8Iw#selection-341.2-344.0">PCID is now a critical performance/security feature on x86 </a> &mdash; On any system that does not currently show "pcid" in the flags line of /proc/cpuinfo, Meltdown is a bigger issue than "install latest updates".
</li><li><a title="Spectre &amp; Meltdown vulnerability/mitigation checker for Linux" rel="nofollow" href="https://github.com/speed47/spectre-meltdown-checker">Spectre &amp; Meltdown vulnerability/mitigation checker for Linux</a> &mdash; A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.</li><li><a title="Microsoft PowerShell Script to check for Meltdown" rel="nofollow" href="https://support.microsoft.com/en-gb/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in">Microsoft PowerShell Script to check for Meltdown</a> &mdash; To help customers verify that protections are enabled, Microsoft has published a PowerShell script that customers can run on their systems. Install and run the script by running the following commands.

</li><li><a title="Why Raspberry Pi isn&#39;t vulnerable to Spectre or Meltdown" rel="nofollow" href="https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/">Why Raspberry Pi isn't vulnerable to Spectre or Meltdown</a> &mdash; To help us understand why, here’s a little primer on some concepts in modern processor design. </li><li><a title="macOS High Sierra&#39;s App Store System Preferences Can Be Unlocked With Any Password" rel="nofollow" href="https://www.macrumors.com/2018/01/10/macos-high-sierra-app-store-password-bug/">macOS High Sierra's App Store System Preferences Can Be Unlocked With Any Password</a> &mdash; A bug report submitted on Open Radar this week has revealed a security flaw in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. </li><li><a title="Major macOS High Sierra Bug Allows Full Admin Access Without Password" rel="nofollow" href="https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/">Major macOS High Sierra Bug Allows Full Admin Access Without Password</a></li><li><a title="WD My Cloud NAS devices have hard-wired backdoor" rel="nofollow" href="https://www.theregister.co.uk/2018/01/08/wd_mycloud_nas_backdoor/">WD My Cloud NAS devices have hard-wired backdoor</a> &mdash; Lets anyone log in as user mydlinkBRionyg with the password abc12345cba.</li><li><a title="Question: How could I measure all of these overhead performance hits?" rel="nofollow" href="https://slexy.org/view/s2hNxl4Ras">Question: How could I measure all of these overhead performance hits?</a> &mdash; My question: how could I measure all of these overhead performance hits, so I can put in a well educated request to adjust all of these components, so I have a computer that performs near its capacity?</li><li><a title="Perfmon" rel="nofollow" href="https://technet.microsoft.com/en-us/library/bb490957.aspx">Perfmon</a></li><li><a title="Troubleshooting with the Windows Sysinternals Tools" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/learn/troubleshooting-book">Troubleshooting with the Windows Sysinternals Tools</a></li><li><a title="ProcDump" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procdump">ProcDump</a></li><li><a title="Process Monitor - Replaces filemon" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procmon">Process Monitor - Replaces filemon</a></li><li><a title="Question: MySQL Replication Woes" rel="nofollow" href="https://slexy.org/view/s2iRKPgsGI">Question: MySQL Replication Woes</a> &mdash; The problem is that during some larger deletes on the master, the tables on the slave get locked and the slave lag goes through the roof.. During this time all of my selects that have been sent to the slave are just sitting there and waiting for the table to unlock while the master is just fine.</li><li><a title="Ask Noah 44: Red Hat with Brandon Johnson" rel="nofollow" href="http://www.jupiterbroadcasting.com/121292/redhat-with-brandon-johnson-ask-noah-44/">Ask Noah 44: Red Hat with Brandon Johnson</a></li><li><a title="BSD Now 228: The Spectre of Meltdown" rel="nofollow" href="http://www.jupiterbroadcasting.com/121362/the-spectre-of-meltdown-bsd-now-228/">BSD Now 228: The Spectre of Meltdown</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 349: All Natural Namespaces</title>
  <link>https://techsnap.systems/349</link>
  <guid isPermaLink="false">1f0cbb01-a231-4cf6-9f5d-f3ded5714065</guid>
  <pubDate>Thu, 21 Dec 2017 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1f0cbb01-a231-4cf6-9f5d-f3ded5714065.mp3" length="36892159" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
</itunes:subtitle>
  <itunes:duration>50:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back. 
</description>
  <content:encoded>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
