Rogue Justice: The Making of the Security State by Karen J. Greenberg
The definitive account of how America’s War on Terror sparked a decade-long assault on the rule of law, weakening our courts and our Constitution in the name of national security.
Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by Frank L. Smith III
This book covers topics such as cyber action during conventional war, information effects in conflict scenarios, individual versus group decision-making, the intersection of cyber conflicts and nuclear crises, business resilience, emerging technologies, and more.
HTMX enables arbitrary invocation of ANY api endpoint with cookies included, through html attributes, which inherently can’t be covered by Content Security Policy
Actually, as an even more basic question…you do know that HTMX is literally just an AJAX library, right? It doesn’t actually “do” anything via HTML attributes. The additional HTMX attributes, like hx-get, hx-post, etc. just tells HTMX where and how to make the API requests. These requests are executed by the browser’s native fetch or XMLHttpRequest APIs, depending on compatibility and implementation. Therefore, HTMX is subject to the same security constraints and policies as any other JavaScript-based operation that makes HTTP requests. Which also, by definition, means that it adheres to the Content Security Policy directives configured for that website.
In other words, an HTML button element with hx-get=“www.some-endpoint.com” on it would eventually translate into
Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security
Bombs and Bandwidth, a project of the Social Science Research Council, assembles leading scholars in a range of disciplines to explore the new nature of IT-related threats, the new power structures emerging around IT, and the ethical and political implications arising from this complex and important field.
Learning From the Octopus: How Secrets From Nature Can Help Us Fight Terrorist Attacks, Natural Disasters, and Disease
Sagarin argues that we can learn from observing how nature is organized, how organisms learn, how they create partnerships, and how life continually diversifies on this unpredictable planet.
#CfP Looking for Everyday Security: A Cross-Disciplinary Workshop (19 April)
Deadline: 12 February
This workshop aims to gather #ECRs from various fields who study #security or related phenomena in everyday life. It will provide an opportunity for participants to share and reflect on their work, and explore how cross-disciplinary exchanges could enhance research on the topic.
The Routledge Handbook on Environmental Security provides a comprehensive, accessible, and sophisticated overview of the field of environmental security.
This thought-provoking book explores how the global ecological crisis profoundly challenges conventional meanings of environmental security and raises important questions about how states and other institutions now face the future.
Regulating Cyber Technologies: Privacy vs Security
Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world.
Flatpak Firefox (and forks) very slow to start
While other flatpak apps have no problems. Any suggestions?
Single-Page Application (lemmy.ml)