It’s only minor if the data points in this breach are used by themselves.
Once you aggregate this with other data breaches, you could end up with a much bigger capability to target anyone in this breach.
Knock it off, Microsoft. You’re not my buddy, you’re an OS. Your job is to sit down, shut up, and run the programs I choose. That’s it.
If I find a function that’s useful for more than a week, I might make a batch file for it. Until then, you’re spare code.
Only for version updates. Beyond that, dnf-automatic handles those invisibly in the background. I only notice them when Firefox gets an update and demands a relaunch before it lets me keep browsing.
Or the XCOM games.
SIP providers usually sell numbers in contiguous series for businesses. For example, if your company buys a block of 50 numbers, the SIP provider then allocates XXX-5100 to XXX-5150.
But since you’re keeping this strictly internal, you don’t have to worry about that.
Step 3: unfuck the SIP settings, then email both HR and their supervisor to throw them under the bus. Also covers your ass for step 4.
Step 4: Route the manager’s calls to a disconnected number. When they come knocking about their phone not working, tell them, “No, you should be able to dial out, unless someone changed the SIP trunk settings and didn’t tell me.”
Assuming you already have the IP phones, you need two things. A PBX server (for the VoIP stuff), and a SIP trunk with a block of external phone numbers.
Start with the PBX server software, there’s several free/open-source implementations. Once you’re comfortable with it and have internal calling good to go, then you can spend on the SIP trunk and number blocks.
There’s also a limited federation mode that server admins can use. Users and posts are still searchable, but they do not show on the public federated feed.
Useful for this exact case where a server may have beneficial accounts, but the rest should be hidden for moderation reasons.
Still would prefer it being on a proper mastodon server, but I can live with this. Whatever server ends up hosting a President’s account now has to deal with record preservation laws for their posts. Let’s leave that bureaucratic stuff to threads.
Having managed an exchange instance for my old job, I can safely say that DKIM and DMARC are just some extra DNS entries for out-of-band verification. They can be boiled down to a pair of checkboxes on a compliance sheet.
I can also say that most of the companies we got emails from didn’t have DKIM, and even fewer had DMARC. Or worse, they had DMARC set to p=ignore. Which is honestly even more infuriating.
Meanwhile, Microsoft’s Exchange platform blatantly ignores DMARC failures for senders and relays on its “Good PTR list”. Bit of a glaringly large hole for spam to pass through.
Wouldn’t be surprised if they got some personally delivered letters from the legal department of a big media company, given that they blocked visibility to some magazines on other servers.
Sounds more like poor self-checkout design.
All the stores I’ve been to with self-checkout require placing your just scanned item into the bag on a scale. If the weight change doesn’t match what it expects, it locks up and requires a store employee to check and clear it.
Downside is, it has problems with very light items.
748 million? I’ll be surprised if they get more than 748 thousand.
Personal firewall.
If an app doesn’t need internet access to do its job, it doesn’t get it. Simple as that.
Fedora Linux also comes with SELinux enabled by default. Did you check that the new home folder and all its contents have the proper SELinux tags?
Run an ls -lZ
and check that the directory has the user_home_t
tag,
The user’s home directory is also stored in the /etc/passwd file. Did you update the entry there?
No, do not “disable SELinux”. That advice hasn’t been valid for a good 20 years. You can set it to permissive though, to see if it’s the source of the problem.
It took me a minute to realize he wasn’t talking about a scene in the movie, like the hacking scene from Gumball.
Easy. It’s far too expensive to implement, both in money and man-hours. Especially man-hours.
The amount of people required to personally surveil the general populace is way too exorbitant, AND they have to monitor their own people to prevent leaks. The logistics explodes well before this becomes feasible.
Then there’s discoverability. Once such hardware is out there, it’s only a matter of time before it falls into the hands of someone capable of dissecting it. Given that such spying methods would be ‘sold’ to federal management on the grounds of national security, there’s an interest in not having it fall into such hands. Therefore, these methods are reserved for high-profile targets. Not the average Joe citizen.
To summarize: Too expensive (money), too expensive (logistics), and too expensive (R&D). Unless you’re on Interpol’s most wanted list or something, you don’t need to worry about this.
They got the training data from Reddit, what did they expect?
If I hadn’t already deleted all my posts and comments, I’d be poisoning all of them. Randomizing numbers, switching units, changing names, etc.
Really? You’re missing out, the original Looney Tunes was full of shenanigans like that.