jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
saidit.net Security
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

subreddit:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. subreddit:pics site:imgur.com dog

advanced search: by author, sub...

Submit a new link
Submit a new text post

Security

subscribeunsubscribe18,961 readers

~0 users here now

created by noaha community for 4 years
message the moderators

MODERATORS

  • noah
  • moderation team • moderation log
links from:
all time
past hour
past 24 hours
past week
past month
past year

55
55

Authelia is an open-source full-featured authentication server

submitted 1 year ago by [deleted] from authelia.com

  • comment
loading...

54
54

The Secret Security Wiki

submitted 1 year ago by [deleted] from doubleoctopus.com

  • comment
loading...

27
23

Privacy Plus 2.0 - a non-caching security proxy based on the open-source software Privoxy

submitted 1 year ago by [deleted] from nextvectorsecurity.com

  • comment
loading...

27
26

Hetzner Cloud Firewall

submitted 1 year ago by [deleted] from console.hetzner.cloud

  • 1 comment
loading...

22
20

Link Lock is a tool for adding a password to a link; in other words, for encrypting and decrypting URLs.

submitted 1 year ago by [deleted] from github.com

  • comment
loading...

22
20

If you use Encryptr password manager app, today is the last day for users to migrate their data off

submitted 1 year ago by [deleted] from spideroak.support

  • comment
loading...

18
17

Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications

submitted 1 year ago by [deleted] from firejail.wordpress.com

  • comment
loading...

18
17

Bitwarden Send - a trusted way to securely share information directly with anyone

submitted 1 year ago by [deleted] from bitwarden.com

  • comment
loading...

18
17

OWASP Cheat Sheet Series

submitted 1 year ago by [deleted] from cheatsheetseries.owasp.org

  • comment
loading...

17
17

Snort is an Open Source network intrusion prevention system capable of performing real-time traffic analysis and packet logging on IP networks.

submitted 1 year ago by [deleted] from snort.org

  • 1 comment
loading...

17
18

Secure Password reGenerator

submitted 1 year ago by [deleted] from 22.00-59.com

  • comment
loading...

16
3

Discovery of new UEFI rootkit exposes an ugly truth: The attacks are invisible to us

submitted 6 months ago by TheRealPanzer from arstechnica.com

  • 5 comments
loading...

15
14

ShieldWall embraces the zero-trust principle and instruments your server firewall to block inbound connections from every IP on any port, by default

submitted 1 year ago by [deleted] from shieldwall.me

  • comment
loading...

15
13

Nzyme is a free and open WiFi defense system that detects and physically locates threats using an easy to build and deploy sensor system

submitted 1 year ago by [deleted] from nzyme.org

  • comment
loading...

14
13

Zenlogin - suspicious login detection in minutes

submitted 1 year ago by [deleted] from zenlogin.co

  • comment
loading...

13
3

All Chromium browsers store passwords and sensitive data in clear text in memory

submitted 7 months ago by TheRealPanzer from borncity.com

  • 4 comments
loading...

12
3

U.S. airline accidentally exposes ‘No Fly List’ on unsecured server

submitted 13 days ago by TheRealPanzer from dailydot.com

  • 1 comment
loading...

12
13

Cloaker.mobi - a simple in-browser file encryption

submitted 1 year ago by [deleted] from cloaker.mobi

  • 2 comments
loading...

12
2

US Police Have Quietly Brought A "Terrifying" Robot Dog Into Their Ranks

submitted 3 years ago by magnora7 from zerohedge.com

  • 5 comments
loading...

10
2

The most secure cloud is your computer

submitted 4 months ago by TheRealPanzer from anita-app.com

  • 2 comments
loading...

10
3

Irish police to be given powers over passwords

submitted 1 year ago by Drewski from bbc.com

  • 1 comment
loading...

9
3

JShelter - an anti-malware Web browser extension to mitigate potential threats from JavaScript, including fingerprinting, tracking, and data collection

submitted 11 months ago by TheRealPanzer from jshelter.org

  • comment
loading...

9
-

Have you heard of the AITA? Wikipedia calls them "the world aviation cartel", they control the rules for 82% of all world air traffic. They have a program called "Annex 17" that partnered airports around the world must comply with, including increased security

submitted 3 years ago by magnora7 from self.Security

  • 1 comment
loading...

9
-

Facebook Uncovers 'Security Issue' Affecting Nearly 50 Million Accounts

submitted 4 years ago by noah from newsroom.fb.com

  • comment
loading...

8
-

TSA now wants to scan your face at security

submitted 2 months ago by TheRealPanzer from archive.ph

  • 1 comment
loading...

8
2

Popular YouTube Channel Caught Distributing Malicious Tor Browser Installer

submitted 4 months ago by TheRealPanzer from thehackernews.com

  • comment
loading...

8
1

For deep security, use ARM, avoid Intel & AMD processors

submitted 3 years ago by fred_red_beans from chiefio.wordpress.com

  • 7 comments
loading...

8
6

A Valentine from the NSA...

submitted 3 years ago by JasonCarswell from cdn.discordapp.com

  • comment
loading...

7
2

The US requests access to national databases of fingerprints and faces in exchange for visaless entry to the US for up to 90 days. At least 5 countries already gave the US access to their police databases.

submitted 6 months ago by TheRealPanzer from self.Security

  • comment
loading...

7
2

NSA Swears It Won't Allow Backdoors in New Encryption Standards

submitted 8 months ago by Drewski from gizmodo.com

  • 3 comments
loading...

7
2

FBI and Europol Shut Down 'Bulletproof' VPN Service That Helped Criminals

submitted 2 years ago by Drewski from torrentfreak.com

  • 1 comment
loading...

7
3

Windows 10: HOSTS file blocking telemetry is now flagged as a 'Severe' security risk

submitted 2 years ago by [deleted] from bleepingcomputer.com

  • 2 comments
loading...

6
1

LastPass breach gets worse

submitted 8 days ago by Drewski from goto.com

  • 2 comments
loading...

6
3

The world's best password advice

submitted 5 months ago by TheRealPanzer from michaelhorowitz.com

  • 2 comments
loading...

6
1

Firefox & AppArmor hardening - Custom rules

submitted 5 months ago by TheRealPanzer from dedoimedo.com

  • 3 comments
loading...

6
1

Tor Browser in Tails 5.0 and earlier is unsafe to use. You should stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.).

submitted 8 months ago by TheRealPanzer from tails.boum.org

  • comment
loading...

6
1

Log4Shell: RCE 0-day exploit found in log4j2, a popular Java logging package

submitted 1 year ago by Drewski from lunasec.io

  • comment
loading...

6
2

Malware found on laptops given out by government

submitted 2 years ago by [deleted] from bbc.com

  • comment
loading...

6
2

Linux under WSL2 can be leaking

submitted 2 years ago by [deleted] from mullvad.net

  • comment
loading...

6
1

Check if your IP is exposing any ports. If you see 404 page, nothing is exposed.

submitted 2 years ago by [deleted] from me.shodan.io

  • comment
loading...

6
1

Fail2ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time.

submitted 2 years ago by [deleted] from fail2ban.org

  • comment
loading...

6
1

They Who Control Encryption

submitted 2 years ago by [deleted] from qvault.io

  • comment
loading...

6
-

Twitter Has "Struggled For Years" To Control The Number Of Employees Who Have The Ability To Reset Accounts

submitted 2 years ago by [deleted] from zerohedge.com

  • comment
loading...

6
-

"The TSA (and other experiments in evil)" by Corbett Report (2019-02-01) on YouTube

submitted 4 years ago by JasonCarswell from youtube.com

  • comment
loading...

5
-

How North Korea’s Hackers Became Dangerously Good

submitted 1 month ago by Drewski from wsj.com

  • 1 comment
loading...

5
-

Linux Foundation, Not ‘Supply Chain’ Nonsense, is Becoming the Biggest Threat to Linux Security and Computing Security (It’s Deliberate)

submitted 3 months ago by TheRealPanzer from techrights.org

  • 1 comment
loading...

5
1

Heat from fingertips can be used to crack passwords

submitted 3 months ago by TheRealPanzer from archive.ph

  • comment
loading...

5
-

Unhide is a forensic tool to find hidden processes and TCP/UDP ports by rootkits/LKMs or by another hidden technique.

submitted 5 months ago by TheRealPanzer from unhide-forensics.info

  • 1 comment
loading...

5
3

iOS VPNs have leaked traffic for more than 2 years, researcher claims

submitted 5 months ago by TheRealPanzer from arstechnica.com

  • comment
loading...

5
2

NthLink VPN found to be using same pre-shared keys for all users

submitted 5 months ago by TheRealPanzer from twitter.com

  • comment
loading...

5
2

Researchers Uncover a Hardware Security Vulnerability on Android Phones

submitted 10 months ago by Drewski from cyberkendra.com

  • comment
loading...

5
-

Confessions of a ransomware negotiator

submitted 1 year ago by Drewski from theregister.com

  • comment
loading...

5
-

Secret terrorist watchlist with 2 million records exposed online

submitted 1 year ago by Drewski from bleepingcomputer.com

  • 1 comment
loading...

5
2

Are Xiaomi browsers spyware? Yes, they are …

submitted 1 year ago by [deleted] from palant.info

  • comment
loading...

5
1

Smart Homes Can Easily Be Hacked and Most Internet of Things Devices Don’t Have Any Security Standards

submitted 2 years ago by Drewski from simius.ai

  • comment
loading...

5
1

Kazakhstan government is intercepting HTTPS traffic in its capital

submitted 2 years ago by Drewski from zdnet.com

  • comment
loading...

5
3

UK Police's Facial Recognition System has an 81% Error Rate

submitted 3 years ago by Stankmango from engadget.com

  • comment
loading...

4
-

Rootkit Hunter scans systems for known and unknown rootkits, backdoors, sniffers and exploits

submitted 5 days ago by TheRealPanzer from rkhunter.sourceforge.net

  • comment
loading...

4
2

Hackers now use Microsoft OneNote attachments to spread malware

submitted 12 days ago by TheRealPanzer from bleepingcomputer.com

  • comment
loading...

4
-

Threema Messenger billed as better than Signal is riddled with vulnerabilities

submitted 23 days ago by Drewski from arstechnica.com

  • 1 comment
loading...

4
-

Apple fixes ‘actively exploited’ zero-day affecting most iPhones

submitted 1 month ago by Drewski from techcrunch.com

  • 1 comment
loading...

4
-

Lastpass says hackers accessed customer data in new breach

submitted 2 months ago by Drewski from bleepingcomputer.com

  • 1 comment
loading...

4
-

Security Vulnerabilities in Covert CIA Websites

submitted 4 months ago by TheRealPanzer from schneier.com

  • comment
loading...

4
1

Google, Microsoft can get your passwords via web browser's spellcheck

submitted 4 months ago by TheRealPanzer from bleepingcomputer.com

  • comment
loading...

4
-

More Pixel 6a owners find that any fingerprint can unlock the phone

submitted 6 months ago by TheRealPanzer from 9to5google.com

  • 1 comment
loading...

4
-

Critical flaws in GPS tracker enable “disastrous” and “life-threatening” hacks

submitted 6 months ago by TheRealPanzer from arstechnica.com

  • comment
loading...

4
-

Researchers Identify ‘Master Problem’ Underlying All Cryptography

submitted 8 months ago by Drewski from quantamagazine.org

  • 2 comments
loading...

4
1

7-Zip up to 21.07 on Windows allows privilege escalation and command execution

submitted 9 months ago by Drewski from github.com

  • comment
loading...

4
1

North Korean hackers exploit Chrome zero-day weeks before patch

submitted 10 months ago by Drewski from bleepingcomputer.com

  • 2 comments
loading...

4
-

Another data-leaking Spectre bug found, smashes Intel, Arm defenses

submitted 10 months ago by TheRealPanzer from theregister.com

  • comment
loading...

4
1

LAN port scan forbidder - forbid untrusted web to scan localhost or LAN

submitted 11 months ago by TheRealPanzer from github.com

  • comment
loading...

4
1

wolfBoot will secure the boot process of your device against malicious attacks that seek to replace your firmware and take control of your device, and/or steal its data

submitted 11 months ago by TheRealPanzer from wolfssl.com

  • comment
loading...

4
-

‘Master Faces’ That Can Bypass Over 40% Of Facial ID Authentication Systems

submitted 1 year ago by Drewski from unite.ai

  • comment
loading...

4
-

With help from Google, impersonated Brave.com website pushes malware

submitted 1 year ago by [deleted] from arstechnica.com

  • comment
loading...

4
-

What is Lacking in Linux Security and What Are or Should We be Doing about This

submitted 1 year ago by [deleted] from youtube.com

  • 3 comments
loading...

4
-

Spectre exploits in the "wild"

submitted 1 year ago by Drewski from dustri.org

  • 1 comment
loading...

4
1

How us shady geeks put others off security

submitted 1 year ago by [deleted] from consult.sauvik.me

  • comment
loading...

4
-

Double Blind Passwords (aka Horcruxing)

submitted 2 years ago by Drewski from kaizoku.dev

  • comment
loading...

4
-

Adding Encrypted Group Calls to Signal

submitted 2 years ago by Drewski from signal.org

  • comment
loading...

4
-

Source code used by Central Banks and Stock Exchanges leaked online

submitted 2 years ago by Drewski from securityreport.com

  • comment
loading...

4
-

Phishing with Worms – The Greatest Password Theft I’ve Ever Seen

submitted 2 years ago by [deleted] from craighays.com

  • comment
loading...

4
-

Let's talk about safety of Pinephone

submitted 2 years ago by [deleted] from xnux.eu

  • comment
loading...

4
-

The EU is set to declare war on encryption

submitted 2 years ago by [deleted] from tech.newstatesman.com

  • comment
loading...

4
-

Any encryption backdoor would do more harm than good.

submitted 2 years ago by [deleted] from tutanota.com

  • 3 comments
loading...

4
-

Shieldon is a Web Application Firewall for PHP, with a beautiful and useful control panel that helps you easily manage the firewall rules and security settings.

submitted 2 years ago by [deleted] from shieldon.io

  • 1 comment
loading...

4
-

Hackers can now clone your keys just by listening to them with a smartphone

submitted 2 years ago by [deleted] from mashable.com

  • 1 comment
loading...

4
-

Why Cyber Command’s Latest Warning is a Win for the Government's Information Sharing Efforts

submitted 3 years ago by Stankmango from cyberscoop.com

  • comment
loading...

4
-

"The Age of Surveillance Capitalism" by Ralph Nader Radio Hour (2019-01-26)

submitted 3 years ago by JasonCarswell from youtube.com

  • comment
loading...

4
2

Huawei's kit removed from British emergency services 4G network

submitted 4 years ago by OldManCorley from bbc.com

  • comment
loading...

4
-

Will extra-strenght padlocks withstand a cheap hydraulic bolt cutter? Spoilers: No.

submitted 4 years ago by OldManCorley from youtu.be

  • comment
loading...

3
-

Android TV box on Amazon came pre-installed with malware

submitted 17 days ago by SoCo from bleepingcomputer.com

  • 2 comments
loading...

3
1

A government watchdog spent $15,000 to crack a federal agency's passwords in minutes

submitted 21 days ago by SoCo from techcrunch.com

  • comment
loading...

3
-

Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More

submitted 23 days ago by SoCo from samcurry.net

  • comment
loading...

3
-

Rackspace says hackers accessed customer data (of their antiquated hosted email services) during ransomware attack

submitted 24 days ago by SoCo from techcrunch.com

  • 1 comment
loading...

3
1

Passwords are weaker than you believe

submitted 25 days ago by TheRealPanzer from cendyne.dev

  • 1 comment
loading...

3
-

Watch out for QR code scams being sent through email

submitted 1 month ago by TheRealPanzer from komando.com

  • comment
loading...

3
-

It’s time to stop ignoring the risks of passwords

submitted 1 month ago by TheRealPanzer from venturebeat.com

  • comment
loading...

3
-

Critical Remote Code Execution Vulnerability in JXPath Library (CVE-2022-41852)

submitted 3 months ago by majk from hackinglab.cz

  • comment
loading...

3
1

Signal is secure, as proven by hackers

submitted 3 months ago by TheRealPanzer from kaspersky.co.uk

  • 1 comment
loading...

3
-

Serious vulnerabilities in Matrix’s end-to-end encryption have been patched

submitted 4 months ago by Drewski from arstechnica.com

  • 1 comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • report spam and site abuse
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2023 SaidIt