jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net Security
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

subreddit:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. subreddit:pics site:imgur.com dog

advanced search: by author, sub...

Submit a new link
Submit a new text post

Security

subscribeunsubscribe18,961 readers

~1 user here now

created by noaha community for 4 years
message the moderators

MODERATORS

  • noah
  • moderation team • moderation log
links from:
all time
past hour
past 24 hours
past week
past month
past year

55
55

Authelia is an open-source full-featured authentication server

submitted 1 year ago by [deleted] from authelia.com

  • comment
loading...

54
54

The Secret Security Wiki

submitted 1 year ago by [deleted] from doubleoctopus.com

  • comment
loading...

27
26

Hetzner Cloud Firewall

submitted 1 year ago by [deleted] from console.hetzner.cloud

  • 1 comment
loading...

27
23

Privacy Plus 2.0 - a non-caching security proxy based on the open-source software Privoxy

submitted 1 year ago by [deleted] from nextvectorsecurity.com

  • comment
loading...

22
20

Link Lock is a tool for adding a password to a link; in other words, for encrypting and decrypting URLs.

submitted 1 year ago by [deleted] from github.com

  • comment
loading...

22
20

If you use Encryptr password manager app, today is the last day for users to migrate their data off

submitted 1 year ago by [deleted] from spideroak.support

  • comment
loading...

17
18

Secure Password reGenerator

submitted 1 year ago by [deleted] from 22.00-59.com

  • comment
loading...

17
17

Snort is an Open Source network intrusion prevention system capable of performing real-time traffic analysis and packet logging on IP networks.

submitted 1 year ago by [deleted] from snort.org

  • 1 comment
loading...

18
17

Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications

submitted 1 year ago by [deleted] from firejail.wordpress.com

  • comment
loading...

18
17

Bitwarden Send - a trusted way to securely share information directly with anyone

submitted 1 year ago by [deleted] from bitwarden.com

  • comment
loading...

18
17

OWASP Cheat Sheet Series

submitted 1 year ago by [deleted] from cheatsheetseries.owasp.org

  • comment
loading...

15
14

ShieldWall embraces the zero-trust principle and instruments your server firewall to block inbound connections from every IP on any port, by default

submitted 1 year ago by [deleted] from shieldwall.me

  • comment
loading...

14
13

Zenlogin - suspicious login detection in minutes

submitted 1 year ago by [deleted] from zenlogin.co

  • comment
loading...

12
13

Cloaker.mobi - a simple in-browser file encryption

submitted 1 year ago by [deleted] from cloaker.mobi

  • 2 comments
loading...

15
13

Nzyme is a free and open WiFi defense system that detects and physically locates threats using an easy to build and deploy sensor system

submitted 1 year ago by [deleted] from nzyme.org

  • comment
loading...

8
6

A Valentine from the NSA...

submitted 3 years ago by JasonCarswell from cdn.discordapp.com

  • comment
loading...

12
3

U.S. airline accidentally exposes ‘No Fly List’ on unsecured server

submitted 13 days ago by TheRealPanzer from dailydot.com

  • 1 comment
loading...

6
3

The world's best password advice

submitted 5 months ago by TheRealPanzer from michaelhorowitz.com

  • 2 comments
loading...

5
3

iOS VPNs have leaked traffic for more than 2 years, researcher claims

submitted 5 months ago by TheRealPanzer from arstechnica.com

  • comment
loading...

16
3

Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us

submitted 6 months ago by TheRealPanzer from arstechnica.com

  • 5 comments
loading...

13
3

All Chromium browsers store passwords and sensitive data in clear text in memory

submitted 7 months ago by TheRealPanzer from borncity.com

  • 4 comments
loading...

9
3

JShelter - an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection

submitted 11 months ago by TheRealPanzer from jshelter.org

  • comment
loading...

10
3

Irish police to be given powers over passwords

submitted 1 year ago by Drewski from bbc.com

  • 1 comment
loading...

7
3

Windows 10: HOSTS file blocking telemetry is now flagged as a 'Severe' security risk

submitted 2 years ago by [deleted] from bleepingcomputer.com

  • 2 comments
loading...

5
3

UK Police's Facial Recognition System has an 81% Error Rate

submitted 3 years ago by Stankmango from engadget.com

  • comment
loading...

4
2

Hackers now use Microsoft OneNote attachments to spread malware

submitted 12 days ago by TheRealPanzer from bleepingcomputer.com

  • comment
loading...

8
2

Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer

submitted 4 months ago by TheRealPanzer from thehackernews.com

  • comment
loading...

10
2

The most secure cloud is your computer

submitted 4 months ago by TheRealPanzer from anita-app.com

  • 2 comments
loading...

3
2

We can make our phones harder to hack but complete security is a pipe dream

submitted 5 months ago by TheRealPanzer from theguardian.com

  • comment
loading...

5
2

NthLink VPN found to be using same pre-shared keys for all users

submitted 5 months ago by TheRealPanzer from twitter.com

  • comment
loading...

7
2

The US requests access to national databases of fingerprints and faces in exchange for visaless entry to the US for up to 90 days. At least 5 countries already gave the US access to their police databases.

submitted 6 months ago by TheRealPanzer from self.Security

  • comment
loading...

7
2

NSA Swears It Won't Allow Backdoors in New Encryption Standards

submitted 8 months ago by Drewski from gizmodo.com

  • 3 comments
loading...

5
2

Researchers Uncover a Hardware Security Vulnerability on Android Phones

submitted 10 months ago by Drewski from cyberkendra.com

  • comment
loading...

3
2

"I can probably hack your password in MINUTES!"

submitted 10 months ago by TheRealPanzer from docs.aista.com

  • 1 comment
loading...

5
2

Are Xiaomi browsers spyware? Yes, they are …

submitted 1 year ago by [deleted] from palant.info

  • comment
loading...

6
2

Malware found on laptops given out by government

submitted 2 years ago by [deleted] from bbc.com

  • comment
loading...

7
2

FBI and Europol Shut Down 'Bulletproof' VPN Service That Helped Criminals

submitted 2 years ago by Drewski from torrentfreak.com

  • 1 comment
loading...

6
2

Linux under WSL2 can be leaking

submitted 2 years ago by [deleted] from mullvad.net

  • comment
loading...

3
2

7 Common Cyberattacks and How to Prevent Them

submitted 3 years ago by KateMC from 2muchcoffee.com

  • comment
loading...

12
2

US Police Have Quietly Brought A "Terrifying" Robot Dog Into Their Ranks

submitted 3 years ago by magnora7 from zerohedge.com

  • 5 comments
loading...

4
2

Huawei's kit removed from British emergency services 4G network

submitted 4 years ago by OldManCorley from bbc.com

  • comment
loading...

6
1

LastPass breach gets worse

submitted 8 days ago by Drewski from goto.com

  • 2 comments
loading...

3
1

A government watchdog spent $15,000 to crack a federal agency's passwords in minutes

submitted 21 days ago by SoCo from techcrunch.com

  • comment
loading...

3
1

Passwords are weaker than you believe

submitted 25 days ago by TheRealPanzer from cendyne.dev

  • 1 comment
loading...

2
1

Consider Disabling Browser Push Notifications on Family and Friends Devices

submitted 2 months ago by Drewski from lloydatkinson.net

  • 1 comment
loading...

5
1

Heat from fingertips can be used to crack passwords

submitted 3 months ago by TheRealPanzer from archive.ph

  • comment
loading...

3
1

Signal is secure, as proven by hackers

submitted 3 months ago by TheRealPanzer from kaspersky.co.uk

  • 1 comment
loading...

4
1

Google, Microsoft can get your passwords via web browser's spellcheck

submitted 4 months ago by TheRealPanzer from bleepingcomputer.com

  • comment
loading...

2
1

Blocking Ads and malware with Pi-hole

submitted 5 months ago by TheRealPanzer from allthingstech.ch

  • comment
loading...

3
1

Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug

submitted 5 months ago by Drewski from bleepingcomputer.com

  • 2 comments
loading...

2
1

Erik Prince wants to sell you a “secure” smartphone that’s too good to be true

submitted 5 months ago by TheRealPanzer from technologyreview.com

  • comment
loading...

6
1

Firefox & AppArmor hardening - Custom rules

submitted 5 months ago by TheRealPanzer from dedoimedo.com

  • 3 comments
loading...

3
1

Netbird is an open-source VPN management platform built on top of WireGuard making it easy to create secure private networks for your organization or home.

submitted 8 months ago by TheRealPanzer from github.com

  • comment
loading...

6
1

Tor Browser in Tails 5.0 and earlier is unsafe to use. You should stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).

submitted 8 months ago by TheRealPanzer from tails.boum.org

  • comment
loading...

3
1

The passwords most used by CEOs are startlingly dumb

submitted 8 months ago by TheRealPanzer from pcgamer.com

  • comment
loading...

4
1

7-Zip up to 21.07 on Windows allows privilege escalation and command execution

submitted 9 months ago by Drewski from github.com

  • comment
loading...

3
1

Lupinia Studios - I'm a Scam Prevention Expert, and I Got Scammed

submitted 10 months ago by Drewski from lupinia.net

  • 1 comment
loading...

4
1

North Korean hackers exploit Chrome zero-day weeks before patch

submitted 10 months ago by Drewski from bleepingcomputer.com

  • 2 comments
loading...

2
1

Merry Maker is a fully scalable tool to detect the presence of digital skimmers

submitted 10 months ago by TheRealPanzer from csoonline.com

  • comment
loading...

4
1

LAN port scan forbidder - forbid untrusted web to scan localhost or LAN

submitted 11 months ago by TheRealPanzer from github.com

  • comment
loading...

4
1

wolfBoot will secure the boot process of your device against malicious attacks that seek to replace your firmware and take control of your device, and/or steal its data

submitted 11 months ago by TheRealPanzer from wolfssl.com

  • comment
loading...

2
1

SafeToOpen detects never-before-seen phishing websites by inspecting the visual and non-visual elements of the websites in real-time and preventing users give away their sensitive information

submitted 11 months ago by TheRealPanzer from safetoopen.com

  • comment
loading...

6
1

Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package

submitted 1 year ago by Drewski from lunasec.io

  • comment
loading...

2
1

Missouri Admits It Fucked Up In Exposing Teacher Data, Offers Apology To Teachers -- But Not To Journalists It Falsely Accused Of Hacking

submitted 1 year ago by Drewski from techdirt.com

  • comment
loading...

2
1

Canary tokens are a free, quick, painless way to help you discover that you've been breached

submitted 1 year ago by [deleted] from canarytokens.org

  • comment
loading...

2
1

Yes, we want cryptographic protection for email

submitted 1 year ago by [deleted] from sequoia-pgp.org

  • comment
loading...

3
1

How governments and spies text each other: Matrix has become the messaging app of choice for top-secret communications

submitted 1 year ago by Drewski from wired.co.uk

  • 2 comments
loading...

2
1

HTTPS Everywhere? Let's not

submitted 1 year ago by [deleted] from changelog.com

  • comment
loading...

2
1

Secure Network - tools to protect yourself

submitted 1 year ago by [deleted] from matteoguadrini.github.io

  • comment
loading...

3
1

Scientists harness chaos to protect devices from hackers

submitted 1 year ago by [deleted] from news.osu.edu

  • comment
loading...

2
1

(in)security - Yet another blog with some security related posts

submitted 1 year ago by [deleted] from insecurity.blog

  • comment
loading...

4
1

How us shady geeks put others off security

submitted 1 year ago by [deleted] from consult.sauvik.me

  • comment
loading...

5
1

Smart Homes Can Easily Be Hacked and Most Internet of Things Devices Don’t Have Any Security Standards

submitted 2 years ago by Drewski from simius.ai

  • comment
loading...

5
1

Kazakhstan government is intercepting HTTPS traffic in its capital

submitted 2 years ago by Drewski from zdnet.com

  • comment
loading...

3
1

Boom! Hacked page on mobile phone website is stealing customers’ card data

submitted 2 years ago by [deleted] from arstechnica.com

  • 1 comment
loading...

3
1

A Security Flaw Could Send Your Dick to Jail Forever

submitted 2 years ago by [deleted] from gizmodo.com

  • 1 comment
loading...

3
1

Apple's Operating Systems Are Malware

submitted 2 years ago by [deleted] from gnu.org

  • comment
loading...

3
1

Not all attacks are equal: understanding and preventing DoS in web applications

submitted 2 years ago by [deleted] from r2c.dev

  • comment
loading...

6
1

Check if your IP is exposing any ports. If you see 404 page, nothing is exposed.

submitted 2 years ago by [deleted] from me.shodan.io

  • comment
loading...

6
1

Fail2ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time.

submitted 2 years ago by [deleted] from fail2ban.org

  • comment
loading...

2
1

China Has Weaponized The Smartphone: Here’s Why You Should Be Concerned

submitted 2 years ago by christnmusicreleases from forbes.com

  • comment
loading...

2
1

Running your own secure communication service with Matrix and Jitsi

submitted 2 years ago by [deleted] from matrix.org

  • comment
loading...

2
1

Fake privacy/security initiatives

submitted 2 years ago by [deleted] from digdeeper.neocities.org

  • comment
loading...

1
1

TV stations – stop broadcasting your passwords!

submitted 2 years ago by [deleted] from grahamcluley.com

  • 1 comment
loading...

6
1

They Who Control Encryption

submitted 2 years ago by [deleted] from qvault.io

  • comment
loading...

1
1

Phishing 101 – Everything You Need to Know About Phishing Attacks and Their Solutions

submitted 3 years ago by KateMC from 2muchcoffee.com

  • comment
loading...

8
1

For deep security, use ARM, avoid Intel & AMD processors

submitted 3 years ago by fred_red_beans from chiefio.wordpress.com

  • 7 comments
loading...

4
-

Rootkit Hunter scans systems for known and unknown rootkits, backdoors, sniffers and exploits

submitted 5 days ago by TheRealPanzer from rkhunter.sourceforge.net

  • comment
loading...

2
-

A network of knockoff apparel stores exposed 330,000 customer credit cards

submitted 7 days ago by TheRealPanzer from techcrunch.com

  • comment
loading...

2
-

NortonLifeLock warns that hackers breached Password Manager accounts

submitted 17 days ago by SoCo from bleepingcomputer.com

  • comment
loading...

3
-

Android TV box on Amazon came pre-installed with malware

submitted 17 days ago by SoCo from bleepingcomputer.com

  • 2 comments
loading...

3
-

Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More

submitted 23 days ago by SoCo from samcurry.net

  • comment
loading...

4
-

Threema Messenger billed as better than Signal is riddled with vulnerabilities

submitted 23 days ago by Drewski from arstechnica.com

  • 1 comment
loading...

3
-

Rackspace says hackers accessed customer data (of their antiquated hosted email services) during ransomware attack

submitted 24 days ago by SoCo from techcrunch.com

  • 1 comment
loading...

3
-

Watch out for QR code scams being sent through email

submitted 1 month ago by TheRealPanzer from komando.com

  • comment
loading...

1
-

The Man Who Angered Anonymous And Lived To Regret It (25:17) ~ KiraTV

submitted 1 month ago by JasonCarswell from youtube.com

  • comment
loading...

2
-

SSH server hardening

submitted 1 month ago by TheRealPanzer from ittavern.com

  • comment
loading...

3
-

It’s time to stop ignoring the risks of passwords

submitted 1 month ago by TheRealPanzer from venturebeat.com

  • comment
loading...

4
-

Apple fixes ‘actively exploited’ zero-day affecting most iPhones

submitted 1 month ago by Drewski from techcrunch.com

  • 1 comment
loading...

5
-

How North Korea’s Hackers Became Dangerously Good

submitted 1 month ago by Drewski from wsj.com

  • 1 comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • report spam and site abuse
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2023 SaidIt