- Disable and try to exploit (best way to know really)
- If necessary file a bug report with the vendor
- Block perspective ports on your network.
On 14 May 2017 at 21:33, wrote:
> Hi,
>
> Just checked my router today and found out that the AMT vuln is on there and
> active/provisioning, probab
Is there any point on doing so, when most environments are hoarded by mobile
phones?
Nice to have, but too little of an "audience" imho.
‐‐‐ Original Message ‐‐‐
On March 7, 2018 5:34 AM, Jyri Hovila \[iki\] wrote:
>
>
> Dear everyone,
>
> the possibility to grab the content
Excuse me; quick read bites back. My mind went directly to the human factor.
That process limitation would be nice to have +1
‐‐‐ Original Message ‐‐‐
On March 7, 2018 5:34 AM, Jyri Hovila \[iki\] wrote:
>
>
> Dear everyone,
>
> the possibility to grab the contents of the scre
Hello misc,
I would like your comments on how could the below affect OpenBSD; if at all.
link:
http://www.tomshardware.com/news/canada-software-encryption-backdoors-feedback,33131.html
Best greetings,
Theodore
W^X is now mandatory.
Please follow the following:
"W^X violating programs can be permitted on a ffs/nfs filesystem-basis,
using the "wxallowed" mount option. One day far in the future
upstream software developers will understand that W^X violations are a
tremendously risky practice and that sty
Anybody who had used automatic disk allocation, it would have taken
care of this:
http://man.openbsd.org/disklabel#AUTOMATIC_DISK_ALLOCATION
/usr/local 10% of disk. 2G – 10G
On 9 June 2016 at 15:53, Kapetanakis Giannis
wrote:
> On 08/06/16 22:02, Mihai Popescu wrote:
>>>
>>> Sorry, no, I sho
Could someone trust a bootloader by e.g. having an aide-like system on
boot, confirming its' authenticity as part of the boot process?
Please share your thoughts.
On 20 June 2016 at 14:36, Ivan Markin wrote:
> Bodie:
>> What is that security reason worth of not using default full disk
>> encry
at 10:19:21 +0300 (+0300), Theodoros wrote:
> :Could someone trust a bootloader by e.g. having an aide-like system on
> :boot, confirming its' authenticity as part of the boot process?
> :
> :Please share your thoughts.
> :
> :
> :
> :On 20 June 2016 at 14:36, Ivan Mark
Fair point!
It would make it more complicated for an adversary, but not impossible.
On 21 June 2016 at 10:36, ludovic coues wrote:
> 2016-06-21 9:27 GMT+02:00 Theodoros :
>> Well TPM is a closed hardware-bound system that does this before boot
>> (as far as I know). I was ask
em if check is OK
3) repeat 2 until check is NOT OK, make copy of failed /boot volume and examine.
4) win.
On 22 June 2016 at 19:52, Ted Unangst wrote:
> Theodoros wrote:
>> Fair point!
>> It would make it more complicated for an adversary, but not impossible.
>
> If an adversar
+1, zfs and hammer are great filesystems for such a use.
Looking forward to RAID10 support on softraid (!).
On 20 July 2016 at 15:08, Kamil Cholewiński wrote:
> On Wed, 20 Jul 2016, Miles Keaton wrote:
>> So I figure if I use OpenBSD + softraid RAID 5 (across 4 disks) and then
>> write my own
11 matches
Mail list logo