spraci.info

Search

Items tagged with: authentication

Image/photo

Avoid Intel and AMD Universal Backdoors


Only use computers certified to Respect Your Freedom (RYF)

The #Intel #Management #Engine is present on all Intel #desktop, #mobile ( #laptop ), and #... Show more...
 
Image/photo

Freedom and Security Issues with Single-board Computers


Single-board computers (SBCs) normally run the GNU/Linux system, but that doesn't mean that all is well for software freedom on these boards. Many require #proprietary software to even boot up; others are "TiVoized," enforcing #signature #checks to prevent the user from modifying the #... Show more...
 
Nextcloud 📱☁️💻 - Mon Apr 01 11:36:16 +0000 2019 GMT
The "It is really me" 2FA security pattern will revolutionize and disrupt the way people authenticate on their devices:
We have developed a new, unique two-factor #2FA #authentication method: "yes it is really me". Learn more on the blog of our #security expert.
rullzer.com/2019/04/01/sec…
Image/photo
 

Office 365 global authentication outage


HN Discussion: https://news.ycombinator.com/item?id=19030099
Posted by Jedd (karma: 2644)
Post stats: Points: 175 - Comments: 87 - 2019-01-29T21:48:01Z

\#HackerNews #365 #authentication #global #office #outage
HackerNewsBot debug: Calculated post rank: 145 - Loop: 177 - Rank min: 100 - Author rank: 27
 

Our weekly meeting archive audio


And some upcoming meetups in Berlin and the UK.
https://packetsofeverything.libsyn.com/vuc735-in-the-wind
#vuc735 #identification #authentication
 

USB Type-C to Become More Secure with Authentication Standard


The USB Type-C authentication standard is moving forward in an effort to help protect systems against malicious USB devices.
Article word count: 633

HN Discussion: https://news.ycombinator.com/item?id=18808759
Posted by CrankyBear (karma: 4551)
Post stats: Points: 119 - Comments: 147 - 2019-01-02T18:42:33Z

\#HackerNews #authentication #become #more #secure #... Show more...
 

Ask HN: What do you use for authentication and authorization?


I am currently starting work on a new app/website. Currently planning to have 1 BE API set to start, probably graphql (which will be user data/information and need to check with the auth server about being protected). I will also have many client apps (web, mobile, potential partners) that will need to make queries to that BE. Do you usually roll your own authentication or use something like auth0/fusionauth/gluu/etc? This product is going to need to be secure as it will be in the healthcare space (so think oidc).

HN Discussion: https://news.ycombinator.com/item?id=18767767
Posted by nates (karma: 105)
Post stats: Points: 122 - Comments: 100 - 2018-12-27T06:16:59Z

\#HackerNews #and #ask #authentication #authorization #for #use #what #you
HackerNewsBot debug: Calculated post rank: 114 - Loop: 102 - Rank min: 100 - Author rank: 80
 

Two-factor authentication can save you from hackers


#2018 year in review #authentication #computer security #credential stuffing #cryptography #cybersecurity 101 #facial recognition #factor #hackers #multi-factor authentic... Show more...
 

How to protect your cell phone number and why you should care


#2018 year in review #authentication #care #cell #computer security #cryptography #cybersecurity 101 #e-commerce #mobile phone #multi-factor authentication #... Show more...
 

Two-factor authentication can save you from hackers


#2018 year in review #authentication #computer security #credential stuffing #cryptography #cybersecurity 101 #facial recognition #factor #hackers #multi-factor authentication #password #phishing #privacy #save #security #security token #smartphone #sms #two
Two-factor authentication can save you from hackers

TechCrunch: Two-factor authentication can save you from hackers (Zack Whittaker)

 

How to protect your cell phone number and why you should care


#2018 year in review #authentication #care #cell #computer security #cryptography #cybersecurity 101 #e-commerce #mobile phone #multi-factor authentication #number #phone #privacy #protect #security #should #telephony #why
How to protect your cell phone number and why you should care

TechCrunch: How to protect your cell phone number and why you should care (Zack Whittaker)

 

Login_duress: A BSD authentication module for duress passwords


A BSD authentication module for duress passwords. Contribute to jcs/login_duress development by creating an account on GitHub.
Article word count: 43

HN Discussion: https://news.ycombinator.com/item?id=18153862
Posted by djsumdog (karma: 14059)
Post stats: Points: 100 - Comments: 44 - 2018-10-06T06:35:13Z

\#HackerNews #authentication #bsd #duress #for #login duress #module #passwords
Article content:

Image/photo

You can’t perform that action at this time.

You signed in with another tab or window. [1]Reload to refresh your session. You signed out in another tab or window. [2]Reload to refresh your session.

Press h to open a hovercard with more details.

References

Visible links
1. file:///dev/
2. file:///dev/

HackerNewsBot debug: Calculated post rank: 81 - Loop: 283 - Rank min: 80 - Author rank: 42
 

Facebook using phone numbers from two factor authentication for ad targeting


“Ugggghhh. Facebook confirms what @kashhill reported: Facebook is taking phone numbers given to them for two factor authentication and using them for ad targeting. Gross and completely irresponsible.…
Article word count: 714

HN Discussion: https://news.ycombinator.com/item?id=18082017
Posted by dhotson (karma: 6650)
Post stats: Points: 142 - Comments: 24 - 2018-09-27T03:49:51Z

\#HackerNews #authentication #facebook #factor #... Show more...
 
Image/photo
Before you start throwing collectively stones at me, I ask you step back and wonder what I have done, what I have fought for here, was it really for the federation demise or I was just asking for people to realize that things need to change if this network wants to survive in the real world ?

I have release my right to privacy to prove my point, what I have you sacrificed ? I won't be your scapegoat. Get a grip !

Who am i ?


My tags :

#correction (1) #psyanalysis (1) #socialhome (6) #dark-web (1) #... Show more...
 

Feature idea : genuine user feature


Create a feature to prove that a user is genuine a bit like Twiter does. As it stands, if an email address is required to open an account, it doesn’t have to be valid, there is Z E R O accountability. I hear already some saying it is to protect freedom of expression and activists, etc,… This is a fallacious argument because any activitst involved in any serious illegal activities ( ie taking on government, etc… ), whatever that means in their country, would NOT use this platform, it is not secure at all., no pod that I know off encrypt their database, nevermind properly secure their servers. Some here use “tor” for instance, good for them, most exit nodes are state-owned nowadays, and frankly I don’t care about dark web people ( this is for the police to deal with them), I care about normal people, who, because of this twisted state of mind are at risk. There are lots of people up to no good in the #federation and... Show more...
 

Feature idea : genuine user feature


Create a feature to prove that a user is genuine a bit like Twiter does. As it stands, if an email address is required to open an account, it doesn’t have to be valid, there is Z E R O accountability. I hear already some saying it is to protect freedom of expression and activists, etc,… This is a fallacious argument because any activitst involved in any serious illegal activities ( ie taking on government, etc… ), whatever that means in their country, would NOT use this platform, it is not secure at all., no pod that I know off encrypt their database, nevermind properly secure their servers. Some here use “tor” for instance, good for them, most exit nodes are state-owned nowadays, and frankly I don’t care about dark web people ( this is for the police to deal with them), I care about normal people, who, because of this twisted state of mind are at risk. There are lots of people up to no good in the #federation and... Show more...
 

Feature idea : genuine user feature


Create a feature to prove that a user is genuine a bit like Twiter does. As it stands, if an email address is required to open an account, it doesn't have to be valid, there is Z E R O accountability. I hear already some saying it is to protect freedom of expression and activists, etc,... This is a fallacious argument because any activitst involved in illegal activities ( ie taking on government, etc.. ), whatever that means in their country, would NOT use this platform,it is not secure at all., no pod that I know off encrypt their database. Some here use "tor" for instance, good for them, most exit nodes are state own nowadays, and franky I don't care about dark web people , I care about normal people who, because of this twisted state of mind are at risk. There are lots of people up to no good in the federation and they are not made accountable at all, it is just free for all, they are having a ball.

#security #authentication #diaspora-dev #anonymous #hackers #dark-web
 
#cybersecurity #infosec #phone #SIM #authentication
 
#infosec #cybersecurity #authentication #password
Use Keepass!

https://youtu.be/20kcc5Z2C58
 
#infosec #cybersecurity #biometric #authentication

This is probably a bad idea. Biometry is OK for identification, but bad for authentication, and for privacy.
 

Top 10 HackerNews posts



Form a California LLC in 10 minutes for $70
Post stats: HN Link: link - Posted by: mmckelvy - Points: 137 - Comments: 94 - 2018-04-10T20:56:52Z

Why SQLite Does Not Use Git
Post stats: HN Link: link - Posted by: trextrex - Points: 127 - Comments: 92 - 2018-04-10T22:23:02Z

Why Does “=” Mean Assignment?
Post stats: HN Link: ... Show more...
 
Later posts Earlier posts