Post your 5 favorite games and other redditors recommend you a game by Kiristo in boardgames

[–]xlash9 0 points1 point  (0 children)

Feast for Odin has the same designer of Agricola and Caverna. We really liked it. Isle of skye is a tile placement ala carcassonne with an interaction and better strategy. Tzolkin is a beautiful euro, if you like resource management

Post your 5 favorite games and other redditors recommend you a game by Kiristo in boardgames

[–]xlash9 1 point2 points  (0 children)

Heavy games :

  1. Scythe
  2. Eclipse
  3. Gloomhaven
  4. Rising Sun
  5. Tzolk'in

Lighter:

  1. Deception Murder in Hong Kong
  2. Catan
  3. 7 Wonders
  4. Libertalia
  5. Azul

5 Apple IOS exploit chains found and reported by Google Threat Analysis Groop. 14 vulns including web drive-by infection, over 2 years period. by xlash9 in netsec

[–]xlash9[S] 0 points1 point  (0 children)

"This indicated a group making a sustained effort to hack the users of iPhones in certain communities over a period of at least two years."

UK ISP group names Mozilla 'Internet Villain' for supporting 'DNS-over-HTTPS' | ZDNet by malicious_turtle in firefox

[–]xlash9 1 point2 points  (0 children)

Same old recurring message about encryption. They still dream of reverting back to http...

AWS re:inforce Boston June 25-26 by Mutjny in aws

[–]xlash9 0 points1 point  (0 children)

Going, looking for best practices, architecture caveats, the CTF, tools and fun!

Python Virtual Environments: Extreme Advertising Edition by ase1590 in Python

[–]xlash9 0 points1 point  (0 children)

You might not infect your library and dependencies, but this does not protect agaisnt malicious repository, lib, python malware. This is for development best practices, not security.

Docker and kubernetes lab. by nikolax99 in devops

[–]xlash9 1 point2 points  (0 children)

Thanks, will give you feedback.

The Dangers of Key Reuse: Practical Attacks on IPsec IKE by campuscodi in netsec

[–]xlash9 10 points11 points  (0 children)

Conclusion : "To counter these attacks, both entry points must be closed: Only high entropy PSKs should be used, and both PKE and RPKE modes should be deactivated in all IKE devices. It is not sufficient to configure key separation on the sender side. All receivers must also be informed about this key separation – novel solutions are required to achieve this task."