jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net Security
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

subreddit:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. subreddit:pics site:imgur.com dog

advanced search: by author, sub...

Submit a new link
Submit a new text post

Security

subscribeunsubscribe18,963 readers

~4 users here now

created by noaha community for 3 years
message the moderators

MODERATORS

  • noah
  • moderation team • moderation log

5
1

Firefox & AppArmor hardening - Custom rules

submitted 2 days ago by TheRealPanzer from dedoimedo.com

  • 3 comments
loading...

3
-

Wi-Fine - it is fine to use public Wi-Fi

submitted 9 days ago by TheRealPanzer from wifine.gitlab.io

  • 1 comment
loading...

4
-

More Pixel 6a owners find that any fingerprint can unlock the phone

submitted 11 days ago by TheRealPanzer from 9to5google.com

  • 1 comment
loading...

2
-

Router Security

submitted 12 days ago by TheRealPanzer from routersecurity.org

  • 1 comment
loading...

16
3

Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us

submitted 16 days ago by TheRealPanzer from arstechnica.com

  • 5 comments
loading...

4
-

Critical flaws in GPS tracker enable “disastrous” and “life-threatening” hacks

submitted 17 days ago by TheRealPanzer from arstechnica.com

  • comment
loading...

7
2

The US requests access to national databases of fingerprints and faces in exchange for visaless entry to the US for up to 90 days. At least 5 countries already gave the US access to their police databases.

submitted 1 month ago by TheRealPanzer from self.Security

  • comment
loading...

2
-

Researchers have discovered a vulnerability in Honda vehicles that could allow hackers to unlock doors and start the cars remotely. Affects all Honda models released between 2012 and 2022.

submitted 1 month ago by TheRealPanzer from bogleheads.org

  • 1 comment
loading...

2
-

Threema: Three Strikes, You’re Out

submitted 1 month ago by Drewski from soatok.blog

  • comment
loading...

3
-

Oblivious DNS-over-HTTPS - security engineers are proposing an experimental protocol that promises greater privacy in how DNS operates.

submitted 1 month ago by TheRealPanzer from portswigger.net

  • comment
loading...

3
-

The HDMI firewall prevents devices from hacking HDMI equipment, and vice-versa.

submitted 1 month ago by TheRealPanzer from git.cuvoodoo.info

  • 1 comment
loading...

2
-

Mega says it can’t decrypt your files. New POC exploit shows otherwise.

submitted 1 month ago by TheRealPanzer from arstechnica.com

  • 1 comment
loading...

13
3

All Chromium browsers store passwords and sensitive data in clear text in memory

submitted 1 month ago by TheRealPanzer from borncity.com

  • 4 comments
loading...

2
-

LastPass no longer requires a password to access your vault, moving to flawed FIDO

submitted 2 months ago by SoCo from engadget.com

  • comment
loading...

3
-

Add Privacy and Security Using Email Aliases With Bitwarden

submitted 2 months ago by TheRealPanzer from bitwarden.com

  • comment
loading...

3
1

Netbird is an open-source VPN management platform built on top of WireGuard making it easy to create secure private networks for your organization or home.

submitted 2 months ago by TheRealPanzer from github.com

  • comment
loading...

3
-

Defending against malicious bots with a zip bomb

submitted 2 months ago by TheRealPanzer from kerkour.com

  • comment
loading...

6
1

Tor Browser in Tails 5.0 and earlier is unsafe to use. You should stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).

submitted 2 months ago by TheRealPanzer from tails.boum.org

  • comment
loading...

3
1

The passwords most used by CEOs are startlingly dumb

submitted 2 months ago by TheRealPanzer from pcgamer.com

  • comment
loading...

3
-

Firefox debuts improved process isolation to reduce browser attack surface

submitted 2 months ago by TheRealPanzer from portswigger.net

  • comment
loading...

7
2

NSA Swears It Won't Allow Backdoors in New Encryption Standards

submitted 2 months ago by Drewski from gizmodo.com

  • 4 comments
loading...

3
-

Some Cryptography Books I Like - Cronokirby

submitted 2 months ago by Drewski from cronokirby.com

  • comment
loading...

4
-

Researchers Identify ‘Master Problem’ Underlying All Cryptography

submitted 2 months ago by Drewski from quantamagazine.org

  • 2 comments
loading...

2
-

deSEC is a free DNS hosting service, designed with security in mind

submitted 3 months ago by TheRealPanzer from desec.io

  • comment
loading...

2
-

Mistborn is your own virtual private cloud platform and WebUI that manages self hosted services, and secures them with firewall, Wireguard VPN w/ PiHole-DNSCrypt, and IP filtering

submitted 3 months ago by TheRealPanzer from gitlab.com

  • comment
loading...

2
-

WebApps provides a secure way to browse popular webapps by eliminating referrers, 3rd party requests, cookies, cross-site scripting, etc.

submitted 3 months ago by TheRealPanzer from f-droid.org

  • comment
loading...

4
1

7-Zip up to 21.07 on Windows allows privilege escalation and command execution

submitted 3 months ago by Drewski from github.com

  • comment
loading...

5
2

Researchers Uncover a Hardware Security Vulnerability on Android Phones

submitted 4 months ago by Drewski from cyberkendra.com

  • comment
loading...

3
1

Lupinia Studios - I'm a Scam Prevention Expert, and I Got Scammed

submitted 4 months ago by Drewski from lupinia.net

  • 1 comment
loading...

2
-

Kicksecure - a secure by default operating system

submitted 4 months ago by TheRealPanzer from kicksecure.com

  • comment
loading...

2
-

AppTotal - analyze suspicious OAuth apps to identify malicious apps, highlight risks, ...

submitted 4 months ago by TheRealPanzer from apptotal.io

  • comment
loading...

4
1

North Korean hackers exploit Chrome zero-day weeks before patch

submitted 4 months ago by Drewski from bleepingcomputer.com

  • 2 comments
loading...

2
-

A team of Ukrainian software engineers have developed a game called “Play for Ukraine” that crowdsources and gamifies participation in DDOS attacks against selected Russian government and media websites

submitted 4 months ago by TheRealPanzer from fastcompany.com

  • comment
loading...

4
-

Another data-leaking Spectre bug found, smashes Intel, Arm defenses

submitted 4 months ago by TheRealPanzer from theregister.com

  • comment
loading...

3
2

"I can probably hack your password in MINUTES!"

submitted 5 months ago by TheRealPanzer from docs.aista.com

  • 1 comment
loading...

1
-

SentryPeer - a distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot

submitted 5 months ago by TheRealPanzer from sentrypeer.org

  • 1 comment
loading...

2
1

Merry Maker is a fully scalable tool to detect the presence of digital skimmers

submitted 5 months ago by TheRealPanzer from csoonline.com

  • comment
loading...

4
1

LAN port scan forbidder - forbid untrusted web to scan localhost or LAN

submitted 5 months ago by TheRealPanzer from github.com

  • comment
loading...

4
1

wolfBoot will secure the boot process of your device against malicious attacks that seek to replace your firmware and take control of your device, and/or steal its data

submitted 5 months ago by TheRealPanzer from wolfssl.com

  • comment
loading...

2
-

Rogueport identifies network ports which are not supposed to be open

submitted 5 months ago by TheRealPanzer from github.com

  • comment
loading...

9
3

JShelter - an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection

submitted 5 months ago by TheRealPanzer from jshelter.org

  • comment
loading...

2
1

SafeToOpen detects never-before-seen phishing websites by inspecting the visual and non-visual elements of the websites in real-time and preventing users give away their sensitive information

submitted 5 months ago by TheRealPanzer from safetoopen.com

  • comment
loading...

2
-

Researchers shared technical details of NSA Equation Group’s 'Bvp47' Backdoor

submitted 5 months ago by infocom6502 from cybersecurityworldconference.com

  • comment
loading...

1
-

Block malware, spyware, ads, and trackers across all apps with RethinkDNS

submitted 6 months ago by [deleted] from rethinkdns.com

  • comment
loading...

2
-

ESSE - an open source encrypted peer-to-peer system for data security, and allow data to be sent securely from one terminal to another without going through third-party services

submitted 6 months ago by [deleted] from github.com

  • comment
loading...

1
-

TOR Fone - p2p secure and anonymous VoIP tool

submitted 6 months ago by [deleted] from torfone.org

  • comment
loading...

2
-

Are the Tutanota and Ctemplar Encrypted Email Providers, Honeypots?

submitted 7 months ago by raven9 from self.Security

  • comment
loading...

6
1

Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package

submitted 8 months ago by Drewski from lunasec.io

  • comment
loading...

2
-

Public CDNs Are Useless and Dangerous

submitted 8 months ago by infocom6502 from news.ycombinator.com

  • 1 comment
loading...

3
-

A mysterious threat actor is running hundreds of malicious Tor relays

submitted 8 months ago by Drewski from therecord.media

  • 1 comment
loading...

2
1

Missouri Admits It Fucked Up In Exposing Teacher Data, Offers Apology To Teachers -- But Not To Journalists It Falsely Accused Of Hacking

submitted 9 months ago by Drewski from techdirt.com

  • comment
loading...

5
-

Confessions of a ransomware negotiator

submitted 11 months ago by Drewski from theregister.com

  • comment
loading...

1
-

Hackers claim significant Epik breach

submitted 11 months ago by Drewski from domainnamewire.com

  • comment
loading...

1
-

Hackers leak passwords for 500,000 Fortinet VPN accounts

submitted 11 months ago by Drewski from bleepingcomputer.com

  • comment
loading...

1
-

How I re-over-engineered my home network for privacy and security

submitted 11 months ago by [deleted] from ben.balter.com

  • comment
loading...

1
-

Cambridge Locksmith 247

submitted 11 months ago by locksmithcambridgema from self.Security

  • comment
loading...

2
-

“Worst cloud vulnerability you can imagine” discovered in Microsoft Azure

submitted 11 months ago by Drewski from arstechnica.com

  • comment
loading...

1
-

Github Now Demanding Device Verification

submitted 11 months ago by raven9 from self.Security

  • comment
loading...

1
-

GitHub Kisses Passwords Goodbye

submitted 11 months ago by [deleted] from thenewstack.io

  • 1 comment
loading...

2
-

Tinder Will Soon Require Users To Verify Their Account Using Local ID For Added Security Online

submitted 11 months ago by [deleted] from indiatimes.com

  • comment
loading...

1
-

Wapiti allows you to audit the security of your websites or web applications

submitted 11 months ago by [deleted] from wapiti.sourceforge.io

  • comment
loading...

2
-

Wanted: Disgruntled Employees to Deploy Ransomware

submitted 11 months ago by Drewski from krebsonsecurity.com

  • comment
loading...

5
-

Secret terrorist watchlist with 2 million records exposed online

submitted 11 months ago by Drewski from bleepingcomputer.com

  • 1 comment
loading...

2
-

Should browsers remember 2FA codes?

submitted 12 months ago by [deleted] from shkspr.mobi

  • comment
loading...

2
-

Apple's disregard for security and privacy is mind-boggling

submitted 12 months ago by [deleted] from evermeet.cx

  • 3 comments
loading...

2
-

Large batch of high score Vulnerabilities in Mozilla Firefox are disclosed. High risk for government, businesses, and targeted individuals who use Mozilla open sores.

submitted 1 year ago by infocom6502 from cisecurity.org

  • 1 comment
loading...

3
-

Hidden Radios in Home Devices (IOT)! The next Cyberthreat

submitted 1 year ago by [deleted] from youtube.com

  • comment
loading...

2
-

pwn.college - learn about, and practice, core cybersecurity concepts in a hands-on fashion

submitted 1 year ago by [deleted] from pwn.college

  • comment
loading...

1
-

The problems with Antivirus software and how in 2021, they actually detract from security and privacy and not enhance it.

submitted 1 year ago by [deleted] from youtube.com

  • comment
loading...

2
-

How to keep your smartphone safe from spying

submitted 1 year ago by [deleted] from archive.is

  • 1 comment
loading...

2
1

Canary tokens are a free, quick, painless way to help you discover that you've been breached

submitted 1 year ago by [deleted] from canarytokens.org

  • comment
loading...

4
-

‘Master Faces’ That Can Bypass Over 40% Of Facial ID Authentication Systems

submitted 1 year ago by Drewski from unite.ai

  • comment
loading...

3
-

Facebook is reportedly trying to analyze encrypted data without decrypting it

submitted 1 year ago by [deleted] from techspot.com

  • 1 comment
loading...

1
-

Molly is a hardened version of Signal for Android

submitted 1 year ago by [deleted] from github.com

  • comment
loading...

3
-

Windscribe VPN servers seized by Ukrainian authorities weren’t encrypted

submitted 1 year ago by Drewski from arstechnica.com

  • comment
loading...

4
-

With help from Google, impersonated Brave.com website pushes malware

submitted 1 year ago by [deleted] from arstechnica.com

  • comment
loading...

1
-

We can't believe people use browsers to manage their passwords, says maker of password management tools

submitted 1 year ago by [deleted] from theregister.com

  • comment
loading...

1
-

HTTP Security Headers: Why? How? What?

submitted 1 year ago by [deleted] from kerkour.com

  • comment
loading...

1
-

Do a Security Checklist for Your Digital Life

submitted 1 year ago by [deleted] from brianlovin.com

  • comment
loading...

2
-

VisibleV8 allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs

submitted 1 year ago by [deleted] from kapravelos.com

  • 1 comment
loading...

1
-

Is Microsoft a National Security Threat?

submitted 1 year ago by [deleted] from techrights.org

  • comment
loading...

3
-

JavaScript will probably ruin your life. Disable it, block it, and stay safe from the most common vector of malware infection.

submitted 1 year ago by [deleted] from youtube.com

  • 1 comment
loading...

2
-

Lantern - fast, reliable and secure access to the open internet (no logging, no cooperation with law enforcement)

submitted 1 year ago by [deleted] from getlantern.org

  • comment
loading...

2
-

Ybits - Firefox send alternative with malware protection

submitted 1 year ago by [deleted] from ybits.io

  • comment
loading...

2
-

APKPure app contained malicious adware, say researchers

submitted 1 year ago by Drewski from techcrunch.com

  • comment
loading...

2
-

+Link - a simple link shortening service to combat phishing

submitted 1 year ago by [deleted] from plus.link

  • comment
loading...

1
-

How to Secure and Optimize your Website or Blog

submitted 1 year ago by [deleted] from cyberhost.uk

  • comment
loading...

1
-

Passwords cross all boundaries, how can we manage them?

submitted 1 year ago by [deleted] from viewfromtheweb.com

  • comment
loading...

3
-

Carrier suspected of injecting ads into two-factor SMS messages

submitted 1 year ago by [deleted] from xda-developers.com

  • comment
loading...

2
1

Yes, we want cryptographic protection for email

submitted 1 year ago by [deleted] from sequoia-pgp.org

  • comment
loading...

1
-

How to Make Sure Your Browser Extensions Are Safe

submitted 1 year ago by [deleted] from archive.is

  • comment
loading...

2
-

Tinfoil Chat - onion-routed, endpoint secure messaging system

submitted 1 year ago by [deleted] from github.com

  • comment
loading...

1
-

Mirotalk - free browser based real-time video calls

submitted 1 year ago by [deleted] from mirotalk.up.railway.app

  • comment
loading...

1
-

Hey Signal! Great Encryption Needs Great Authentication

submitted 1 year ago by Drewski from sequoia-pgp.org

  • comment
loading...

1
-

ESET SysRescue Live disc - a malware cleaning tool that runs independent of the operating system from a CD, DVD, or a USB. It has direct access to the disc and the file system, and therefore is capable of removing the most persistent threats.

submitted 1 year ago by [deleted] from eset.com

  • comment
loading...

1
-

1ty.me - One Time Self Destructing Links For Sharing Sensitive Information

submitted 1 year ago by [deleted] from 1ty.me

  • comment
loading...

1
-

sploitus - exploits & tools search engine

submitted 1 year ago by [deleted] from sploitus.com

  • comment
loading...

1
-

DerivePass - compute secure passwords without storing them anywhere

submitted 1 year ago by [deleted] from derivepass.com

  • comment
loading...

2
-

Trackmedown - Identify potential scammers to safeguard yourself and others

submitted 1 year ago by [deleted] from trackemdown.com

  • comment
loading...

1
-

SpiderFoot provides an easy-to-use interface that enables you to automatically collect Open Source Intelligence about IP addresses, domain names, e-mail addresses, usernames, names, subnets and ASNs from many sources such as AlienVault, HaveIBeenPwned, SecurityTrails, SHODAN and more

submitted 1 year ago by [deleted] from spiderfoot.net

  • comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • report spam and site abuse
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2022 SaidIt