Searching txt.sour.is

Twts matching #attack
Sort by: Newest, Oldest, Most Relevant

Hundreds walk in solidarity after ‘unspeakable’ attack on running woman
Hundreds of Canberrans take part in a solidarity walk to show support for a woman grabbed from behind and assaulted while running at the Mulligan’s Flat Nature Reserve in Bonner last Monday. ⌘ Read more

⤋ Read More

What we know about the suspected ‘terror attack’ at the Colorado mall
Six people are injured after an attack on a group of people raising awareness about Israeli hostages held in Gaza. The FBI is treating the incident in Boulder, Colorado, as an act of terrorism but local police are refusing to speculate on the motive. ⌘ Read more

⤋ Read More

22yo woman dies in Darwin hospital after alleged domestic violence attack
A 22-year-old woman has died at Royal Darwin Hospital 10 days after an alleged domestic violence attack. A man has been charged as police continue to investigate. ⌘ Read more

⤋ Read More

How Ukraine pulled off its ‘extremely complex’ drone attack on Russia
Ukraine’s security services say they have destroyed 34 per cent of Russia’s air missile carriers with a bold drone attack. Here’s what we know. ⌘ Read more

⤋ Read More

FBI investigating ‘targeted terror attack’ in Colorado
Local police in Boulder, Colorado and FBI agents establish an evacuation zone at a popular pedestrian area, where authorities say “several victims” have been targeted. ⌘ Read more

⤋ Read More

[$] Glibc project revisits infrastructure security
The GNU C Library
(glibc) is the core C library for most Linux distributions, so it is a
crucial part of the open-source ecosystem—and an attractive
target for any attackers looking to carry out supply-chain
attacks. With that being the case, securing the project’s
infrastructure using industry best practices and improving the
security of its development practices are a frequent topic among glibc
developers. A recent discussion suggests that improveme … ⌘ Read more

⤋ Read More

[$] System-wide encrypted DNS
The increasing sophistication of attackers has organizations
realizing that perimeter-based security models are inadequate. Many
are planning to transition their internal networks to a zero-trust\
architecture. This requires every communication on the network to
be encrypted, authenticated, and authorized. This can be achieved in
applications and services by using modern communication
protocols. However, the world still depends on Domain Name Syste … ⌘ Read more

⤋ Read More

Did Harvard reject Barron Trump? Truth behind his college choice has sparks buzz online
,    -  The Economic Times (India)

_Stephan: I have been following closely Trump’s attack on Harvard. At one level it is clearly part of MAGAt coup to intimidate or take over universities, so they do what the MAGAt fascists want, indoctrinate instead of educate. But there is something weird and personal about what Trump is doing and saying. According … ⌘ Read more

⤋ Read More

[$] Injecting speculation barriers into BPF programs
The disclosure of the Spectre\
class of hardware vulnerabilities created a lot of pain for kernel
developers (and many others). That pain was especially acutely felt in the
BPF community. While an attacker might have to painfully search the kernel
code base for exploitable code, an attacker using BPF can simply write and
load their own speculation gadgets, which is a much more efficient way of
operating. The BPF comm … ⌘ Read more

⤋ Read More

So, the “AI” bots have reached my website. Looks like they’re just slowly crawling everything at the moment – no DDoS-like attack yet. I wonder if that has something to do with my website being 100% static HTML. There are no GET parameters they can tweak and, at the end of the day, there’s not that much data on my server anyway … And maybe they have no idea what stagit is, so it doesn’t trigger “standard behavior”, like “this is a Gitea instance, let’s crawl this like crazy!”?

⤋ Read More

CNCF Announces Graduation of in-toto Security Framework, Enhancing Software Supply Chain Integrity Across Industries
NYU Tandon-developed software security framework achieves highest CNCF maturity level, combating rising software supply chain attacks SAN FRANCISCO, CA, April 23, 2025 – The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native… ⌘ Read more

⤋ Read More

Also, I should cut down on coffee. Seriously, I’ve nearly had a … I honestly don’t know what it was; A Panic attack? A heart attack? I dunno, I just felt like my heart and lungs were so about to burst I had to go for a run to cope.

⤋ Read More

‘Deep red rural America’ hurts most as Trump attacks on liberal programs backfire: report
Jennifer Bowers Bahney,  Contributing Writer  -  Raw Story

_Stephan: Just as I, and many others have predicted, MAGAt world is going to experience the worst effects of the Trump coup and dismantlement of the economy and government. And in many ways, MAGAt voters didn’t even think about that when they voted. Here is an example of what I mean. I think … ⌘ Read more

⤋ Read More
In-reply-to » @prologic @bender @eapl.me I think opening another file is a bad idea because it adds complexity to the clients, breaks the single feed and I think keeping legacy clients will be more complex to add new features in the future. A modern approach is important. I'll be honest, I'm a bit tired of the fight around the direct message. Perhaps, we can remove it as an extension and use the alternative @prologic . My suggestion apparently doesn't like to the community. I have no problem with remove it.

@eapl.me@eapl.me This is one of my concerns too. The moment you post publicly ciphertext, you open yourself up for future attacks on the ciphertext, which you really want to avoid if you can. If you have a read of the Salty.im Spec you’ll note we went to great lengths to protect the user’s privacy as well as their identity and make it incredibly hard to guess at inboxes. It’s still a WIP, but I’d love to see it progressed even further – I truly feel strongly about a purely decentralised messaging ecosystem 👌

⤋ Read More

(#2zhuzoa) @eapl.me@eapl.me This is one of my concerns too. The moment you post publicly ciphertext, you open yourself up for future attacks on …
@eapl.me @eapl.me This is one of my concerns too. The moment you post publicly ciphertext, you open yourself up for future attacks on the ciphertext, which you really want to avoid if you can. If you have a read of the Salty.im Spec you’ll note we went to great lengths to protect the user’s … ⌘ Read more

⤋ Read More
In-reply-to » Another nice stroll in nature last week: https://lyse.isobeef.org/waldspaziergang-2025-04-03/

@movq@www.uninformativ.de @ionores@twtxt.net Thank you! Nope, still a petting farm over here. The only dangerous (to humans) animals are boars and ticks. But I only ever encountered a wild hog once in my entire life so far. Luckily, it took off and didn’t attack me. Ticks, on the other hand, regularly attack me.

⤋ Read More

Chaos and Corruption Weekly Digest: Week 11
,    -   American Federation of Government Employees

Stephan: Week 11 of the corruption that is the unacknowledged but defining character of the coup.

Image

Week 11 saw Trump’s attack on the free press, our country’s economy and ability to fight diseases and find cures. But the American people pushed back against his attacks in four elect … ⌘ Read more

⤋ Read More

Hardening the Firefox frontend
Tom Schuster, Frederik Braun, and Christoph Kerschbaumer have
published an article
on the Firefox Security team’s Attack & Defense
blog that explains recent work to harden Firefox’s frontend code.

We have rewritten over 600 JavaScript event handlers to mitigate XSS
and other injection attacks in the main Firefox user interface. This
mitigation will ship in … ⌘ Read more

⤋ Read More

10 People Who Were Attacked for the Clothes They Wore
Black clothing. A sweatshirt. A “too small” skirt. A “blasphemous” dress. A crop top. Pretentious attire. Hats. A bikini. Jeans. Zoot suits. These clothes outraged some, who associated the articles of clothing with devil worship, immorality, nontraditional attire, and beliefs, attitudes, or behaviors that outraged the spectators. The attacks weren’t really about the victims’ clothing. […]

The post [10 People Who Were Attacke … ⌘ Read more

⤋ Read More
In-reply-to » greek myth is crazy bc there's the misogny but also yeah she IS getting that man pregnant. penelope and odysseus obviously (he literally WAS the one that carried telemachus) and ofc andromeda and perseus & hektor and andromache but also like. you cannot tell me helen didn't get menelaos pregnant bffr

athena was NOT making that night longer for ODYSSEUS to enjoy the sex get serious. she made that man see the gods above so clearly that he almost had a panic attack

⤋ Read More

Law firms refuse to represent Trump opponents in the wake of his attacks
Michael Birnbaum ,    -  msn | The Washington Post

_Stephan: One of the keys to all fascist takeovers of democracies when the democracy is being taken apart is to so threaten and badly damage the legal system that when critics and opponents are attacked by the authoritarian, they cannot even get a lawyer to represent and defend them in the courts while, at the same time, the cour … ⌘ Read more

⤋ Read More

Speaker Mike Johnson floats eliminating federal courts as GOP ramps up attacks on judges
Scott Wong, Melanie Zanona and Rebecca Kaplan,  Reporters  -  NBC News

_Stephan: The Speaker of the House, Mike Johnson, is not functioning as the leader of a coequal branch of the Executive branch. Instead, he behaves like a White House staff assistant. He is clearly a participant in the authoritarian dismantlement of the legal system of the United … ⌘ Read more

⤋ Read More

Hi! i’m a paralyzed cat. When i was just one month old, i was attacked by a dog or a human and my spine was broken. This is how meowmy found me and adopted. Meowmy always helps me with difficulties in my daily lifeRead more

⤋ Read More

Here are the 60 universities under investigation by the Trump administration
Ray Bogan ,  Political Correspondent  -  Straight Arrow News

_Stephan: The Trump coup has made clear it considers the universities of America enemies of its authoritarian takeover of the United States. So completely predictably, like all fascist coups in history, the Trumpers (read neo-Nazis) are attacking and attempting to take control of American higher education. They g … ⌘ Read more

⤋ Read More

[$] LWN.net Weekly Edition for March 20, 2025
Inside this week’s LWN.net Weekly Edition:

  • Front: Oxidizr; Spectre mitigations; Frozen pages; Mapcount madness; Open-source risks; /e/OS.

  • Briefs: Supply chain attacks; SystemRescue 12.00; Casual Make; GIMP 3.0; Git 2.49.0; GNOME 48; PeerTube 7.1; Quotes; …

  • Announcements: Newsletters, conferences, security updates, patches, and more. ⌘ Read more

⤋ Read More

Apple Passwords App Bug Left Users Vulnerable to Phishing Attacks for Months Before Being Fixed
Apple fixed a bug in its Passwords app with December’s iOS 18.2 update that had left users vulnerable to phishing attacks in the three months since the launch of iOS 18.

Image

According to an Apple security update spotted by _[9to5Mac](https://9to5mac.com/2025/03/18/apples-passwords-app-was-vulnerable-to-phi … ⌘ Read more

⤋ Read More

Trump’s FBI Moves to Criminally Charge Major Climate Groups
Marin Scotten,  Staff Writer  -  The New Republic

_Stephan: Habitat for Humanity, a non-profit organization dedicated to fostering wellbeing that President Jimmy Carter worked with for years, and to which my wife and I have sent support, is one of a number of wellbeing fostering foundations now being attacked by psychopath fascist Trump using as his agents his corrupted FBI. I predict that any 501©3 that … ⌘ Read more

⤋ Read More

‘A Hallmark of Autocracy’: Flurry of Trump Attacks on Universities Sparks Alarm
Eloise Goldsmith,  Staff Writer  -  Common Dreams

_Stephan: As many, perhaps most of you, know I live mostly in the world of research and science as an experimentalist. Many of my friends and colleagues come from that world and today, in addition to the letter from the woman about why I call Trump a psychopath, I heard from a researcher at John Hopkins University who ha … ⌘ Read more

⤋ Read More

RFK Jr. targets childhood psychiatric drugs; doctors push back
Joseph Choi ,  Staff Writer  -  The Hill

_Stephan: And so it starts. The first child in a decade in the United States has just died of measles, and now Robert Kennedy, jr. is attacking psychiatric drugs used in the treatment of children. So if you have a child who is depressed, anxious, or hyperactive. Trump and the Republican Congress members are telling you, “tough… you need to understand your well … ⌘ Read more

⤋ Read More

I got promoted today to try using Passkeys on Github.com. Fine 😅 I did that, but I discovered that when you use your Passkey to login, Chrome prompts you for your device’s password (i.e: The password you use to login to your macOS Desktop). Is that intentional? Kind of defeats the point no? I mean sure, now there’s no Password being transmitted, stored or presented to Github.com but still, all an attacker has to do is somehow be on my device and know my login password to my device right? Is that better or worse? 🤔

⤋ Read More