Security

1540 readers
3 users here now

A community for discussion about cybersecurity, hacking, cybersecurity news, exploits, bounties etc.

Rules :

  1. All instance-wide rules apply.
  2. Keep it totally legal.
  3. Remember the human, be civil.
  4. Be helpful, don't be rude.

Icon base by Delapouite under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
76
 
 

I think the title of the talk is click-bait, but the content is interesting otherwise. The talk is roughly 40min + 15min Q&A

77
78
79
80
 
 

As we often report here, it’s common for tech companies to help each other improve their security systems by sharing zero-day exploits found by security researchers. Google, for example, does this a lot. But recently, an Apple employee reportedly found a zero-day exploit in Google Chrome – and that bug was never reported to Apple by that person.

81
82
83
84
85
 
 

cross-posted from: https://programming.dev/post/160750

Dominick Baier's talk is a great introduction to the often confusing world of OAuth. There are many good resources about details of a given flow, but the challenging thing is which flow to use for what.

86
87
 
 

Yeah, uh.... at least ublock's EasyPrivacy list catches most of them