There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

lemmyreader , to linux in Flatpak Firefox (and forks) very slow to start

While toolbox and distrobox seem very similar, distrobox comes with a slight warning :

appassionato , to bookstodon
@appassionato@mastodon.social avatar

Rogue Justice: The Making of the Security State by Karen J. Greenberg

The definitive account of how America’s War on Terror sparked a decade-long assault on the rule of law, weakening our courts and our Constitution in the name of national security.

@bookstodon




appassionato , to bookstodon
@appassionato@mastodon.social avatar

Cyber Wargaming: Research and Education for Security in a Dangerous Digital World by Frank L. Smith III

This book covers topics such as cyber action during conventional war, information effects in conflict scenarios, individual versus group decision-making, the intersection of cyber conflicts and nuclear crises, business resilience, emerging technologies, and more.

@bookstodon



rwhitisissle , (edited ) to programmerhumor in Single-Page Application

HTMX enables arbitrary invocation of ANY api endpoint with cookies included, through html attributes, which inherently can’t be covered by Content Security Policy

I want you to please explain how HTMX bypasses the Content Security Policy connect-src directive, or any -src directive, for that matter, assuming it is specified (which it should be). Because I’m genuinely curious why the HTMX dev team would include a section on CSP in their docs if it did literally nothing, as you say.

Actually, as an even more basic question…you do know that HTMX is literally just an AJAX library, right? It doesn’t actually “do” anything via HTML attributes. The additional HTMX attributes, like hx-get, hx-post, etc. just tells HTMX where and how to make the API requests. These requests are executed by the browser’s native fetch or XMLHttpRequest APIs, depending on compatibility and implementation. Therefore, HTMX is subject to the same security constraints and policies as any other JavaScript-based operation that makes HTTP requests. Which also, by definition, means that it adheres to the Content Security Policy directives configured for that website.

In other words, an HTML button element with hx-get=“www.some-endpoint.com” on it would eventually translate into


<span style="color:#323232;">const xhr = new XMLHttpRequest();
</span><span style="color:#323232;">xhr.open("GET", "https://www.some-endpoint.com/");
</span><span style="color:#323232;">xhr.send();
</span>

on click.

You do understand that, right?

appassionato , to bookstodon
@appassionato@mastodon.social avatar

Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security

Bombs and Bandwidth, a project of the Social Science Research Council, assembles leading scholars in a range of disciplines to explore the new nature of IT-related threats, the new power structures emerging around IT, and the ethical and political implications arising from this complex and important field.

@bookstodon



estelle , to random
@estelle@techhub.social avatar
appassionato , to bookstodon
@appassionato@mastodon.social avatar

Learning From the Octopus: How Secrets From Nature Can Help Us Fight Terrorist Attacks, Natural Disasters, and Disease

Sagarin argues that we can learn from observing how nature is organized, how organisms learn, how they create partnerships, and how life continually diversifies on this unpredictable planet.

@bookstodon





davidrypel , to sociology
@davidrypel@sciences.social avatar

Looking for Everyday Security: A Cross-Disciplinary Workshop (19 April)

Deadline: 12 February

This workshop aims to gather from various fields who study or related phenomena in everyday life. It will provide an opportunity for participants to share and reflect on their work, and explore how cross-disciplinary exchanges could enhance research on the topic.

https://www.ucl.ac.uk/institute-of-advanced-studies/news/2024/jan/cfp-looking-everyday-security-cross-disciplinary-workshop

@anthropology @sociology @geography @politicalscience @psychology

appassionato , to bookstodon
@appassionato@mastodon.social avatar

Routledge Handbook of Environmental Security

The Routledge Handbook on Environmental Security provides a comprehensive, accessible, and sophisticated overview of the field of environmental security.

@bookstodon




appassionato , to bookstodon
@appassionato@mastodon.social avatar

Rethinking Environmental Security

This thought-provoking book explores how the global ecological crisis profoundly challenges conventional meanings of environmental security and raises important questions about how states and other institutions now face the future.

@bookstodon



appassionato , to bookstodon
@appassionato@mastodon.social avatar

Regulating Cyber Technologies: Privacy vs Security

Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world.

@bookstodon





appassionato , to bookstodon
@appassionato@mastodon.social avatar

Security in the Cyber Age: An Introduction to Policy and Technology

Explore how cyberspace works, analyze how state and non-state actors exploit vulnerabilities, and discover ways to improve cybersecurity.

@bookstodon



rsstosecurity , to random
@rsstosecurity@mastodon.clinicians-exchange.org avatar

Private, vetted email list for mental health professionals: https://www.clinicians-exchange.org
Open LEMMY instance for all mental health workers: https://lem.clinicians-exchange.org
.
DATE:
September 29, 2023 at 10:59AM
.
TITLE:
AHA: HHS should withdraw health-data tracking rule
.
URL:
https://www.beckershospitalreview.com/cybersecurity/aha-hhs-should-withdraw-health-data-tracking-rule.html

<p>The American Hospital Association is <a href="https://www.aha.org/lettercomment/2023-09-28-aha-responds-senate-rfi-health-data-privacy" target="_blank" rel="noopener">asking</a> Congress to urge HHS to "immediately" rescind a rule restricting the use of third-party tracking technologies by hospitals and health systems.</p>

.
.
@infosec

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines