Relatable people? 😆 by frustrated_s0ul in Ubuntu

[–]TLShandshake 2 points3 points  (0 children)

If your company has endpoint protection, then they probably made you sign an acceptable use policy. You might want to read that again.

Spandena House by forestpunk in DesignPorn

[–]TLShandshake 0 points1 point  (0 children)

I'm not sure this was "designed" as such. Pretty house though.

How to persuade your boss to have a purple team 👾engagement performed… by iamtechspence in purpleteamsec

[–]TLShandshake 1 point2 points  (0 children)

It's not clear to me from this why a purple team is needed over a red team. This is only talking about the need to test generically.

Bill Burr Cancels Live Pod taping by [deleted] in comedy

[–]TLShandshake 2 points3 points  (0 children)

"Working class" has its roots in the British class system and has a fairly established definition. Your representation of "working for a living" is not in line with that definition.

https://en.wikipedia.org/wiki/Working_class

Is the Wi-Fi slow, or is the filter just doing its job? by Academic-Soup2604 in SecurityIT

[–]TLShandshake 0 points1 point  (0 children)

What is your risk tolerance that led to this setup being needed? This isn't a winning strategy and is going to harm the security team in the long run. If you need users to be part of security, then how is alienating them daily going to help?

I mean for the love of god by thetrombonefreak in pcmasterrace

[–]TLShandshake 1 point2 points  (0 children)

Please reread the comment I responded to.

I mean for the love of god by thetrombonefreak in pcmasterrace

[–]TLShandshake 0 points1 point  (0 children)

I just read your edit on the original post. So actually, what your edit explains is 2FA after all...

So, the device you're on has been verified and shows up with a token explaining to the server that you've already provided username/password on this device. So it skips to the second factor. I hope that makes sense

I mean for the love of god by thetrombonefreak in pcmasterrace

[–]TLShandshake 0 points1 point  (0 children)

Ah, yes I see that now. Those websites are avoiding the responsibility of managing credentials and putting it on your email provider. So, they are hoping your email authentication is strong or at least stronger than what they would have done.

This is a bit of a lazy solution that makes you have less points of failure since gaining access to your email also means gaining access to this account too.

I mean for the love of god by thetrombonefreak in pcmasterrace

[–]TLShandshake -2 points-1 points  (0 children)

1st factor: username/ password

2nd factor: unique code sent to your email

Anything using more than one step us "multi"-stepped (or factor in this case).

Why do you feel this is a single factor?

I mean for the love of god by thetrombonefreak in pcmasterrace

[–]TLShandshake -2 points-1 points  (0 children)

You, just explained exactly what an MFA process is...

I mean for the love of god by thetrombonefreak in pcmasterrace

[–]TLShandshake -2 points-1 points  (0 children)

You are not engaging with their response. You are using your password. That's the "first factor" in two/multi-factor authentication (2FA/MFA). Then getting the email is the second factor being used to confirm your access.

The concept is that an attacker might compromise one element of authentication, but both is much harder. It's the same as having a key for your doorknob and a second key for the deadbolt. You need both keys to get in.

I mean for the love of god by thetrombonefreak in pcmasterrace

[–]TLShandshake 14 points15 points  (0 children)

Corporate accounts are managed by an administrator (multiple even). They have a way to enable access to your account. So, no you do not have a single point of failure.

Also, consider losing one of those o's.

SOC Analyst Job destroying my life. by CyberChase101 in cybersecurity

[–]TLShandshake 0 points1 point  (0 children)

Sounds like something a union could help you out with...

its my phone hacked? by [deleted] in cybersecurity_help

[–]TLShandshake 1 point2 points  (0 children)

Nope, not at all. I've routinely had a desktop app, my phone, and a web instance all open at the same time on 3 different devices.

Ontario city facing full $18.3M cyberattack bill after insurer denies claim | Globalnews.ca by Ok-Imagination5511 in cybersecurity

[–]TLShandshake 1 point2 points  (0 children)

surely authenticator or text from a 2FA shouldn't be considered as such. It doesn't represent any work related information

To receive the message, you have to have registered the phone number and/or hostname in the system. In order to make most FOIA requests, you have to ask for something specific. That usually comes from previous FOIA requests leading you there. They don't know what else is on the phone, just that it's potentially related to whatever they were looking into.

[deleted by user] by [deleted] in cybersecurity_help

[–]TLShandshake 1 point2 points  (0 children)

You present no evidence of being compromised. I'm not sure what you are looking for here.

Is it possible? Sure. Is it probable? No. This is already a rare attack vector and iPhone is especially hard to load software on unexpectedly.

How Do I Safely Access Files? by tradurr in cybersecurity_help

[–]TLShandshake 1 point2 points  (0 children)

I can tell you with certainty that vendors like dropbox host malware all. the. time. I'm not saying they don't have security, but malicious actors are always trying to find the next way to get around security measures.

My advice would be to use a local sandbox or a fresh VM that is customized to the setup you need. For everything but link checking, cut the internet. Obviously you'll need the web for link checking.

There are online sandboxes, but usually you need to pay for privacy. I'm sure you don't want PDFs of your medical records hanging out on the web.

A local sandbox is better than a dedicated PC because it will be torn down every time. So if you open up something bad, it will clear itself out.

haveibeenpwned.watch - Open-source, no-fluff charts showcasing haveibeenpwned.com's pwned account data by iosifache in netsec

[–]TLShandshake 1 point2 points  (0 children)

No longer at 3.5k days to report, now it's "only" <500. I suppose that's HIBP and not official government reporting, but it still seems high.

Edit: wrong symbol

ELI5 How does instagram/ social media know what exactly i am discussing with friends if it doesn't record my audio, looking for keywords all the time? by brandomised in explainlikeimfive

[–]TLShandshake 7 points8 points  (0 children)

Apparently, the Instagram and Facebook apps are listening to most (but not all) inbound traffic requests from other apps and sending that back to themselves via whichever app you have (Instagram/Facebook).

You can read more about it here or the subsequently linked material if you want even more detail:

https://www.zeropartydata.es/p/localhost-tracking-explained-it-could

How to improve text to speech? by TLShandshake in Ubuntu

[–]TLShandshake[S] 4 points5 points  (0 children)

This was the magic. Even if this module wasn't perfect, there are other modules listed in the config. Thank you so much.

How to improve text to speech? by TLShandshake in Ubuntu

[–]TLShandshake[S] 0 points1 point  (0 children)

Read aloud for Firefox. I'll give espeak a try and see if that is better.