This summer, our cryptography research team examined which components of Monero are theoretically vulnerable to quantum computers. The importance of this work is discussed in the CCS proposal, and the research produced several interesting findings that we described in three documents with varying levels of detail:
Please ask us anything!
By the way, you can learn more by checking out the MoneroTalk episodes about quantum computing: a pre-audit interview, and a post-audit followup. Some of my personal notes on this topic are detailed in the article "Mental models for security and privacy", which touches on the question of whether to include quantum adversaries in privacy tech design decisions.
I recently uninstalled WeChat on my computer. Do I have to go through and delete anything else in order to get rid of any safety/security/privacy issues? Thank you!
Next year I'm going to start uni and I don't know how much should I spend on a laptop and which characteristics should have. I've considered MSI GF63 THIN 10SCSR-876XES for around 850 euros (a little bit less than 800 pounds). I have also considered other gaming laptops 150-200 euros more expensive and with better characteristics and I don't know if it's worth paying extra. I would really appreciate help or any other laptop recomendation. Thanks!
during my search about Firefox's Remote settings service which is a service to "manage evergreen settings data in Firefox" (whatever that means, if anyone knows leave a comment)
I stumbled in an old bugzilla report for Firefox where a developer criticized the presence of the, now removed, preference "security.turn_off_all_security_so_that_viruses_can_take_over_this_computer: true", there some people even lable the pref as "necessary" and make fun of it.
I created a Mind Map for Computer Malware. Did the best I could with it. Please let me know if it needs editing.
Peer Review Please!
Hi All- We are deploying the Meraki client VPN through a PowerShell script deployed through Intune (script below), and we get an error trying to connect. After installing the VPN profile, we get the error: “The L2TP connection attempt failed because the security layer encountered a processing error during initial negotiations with the remote computer.” This is a fresh install of Windows 10, so there are no additional VPN providers or software on there, IKE and AuthIP IPsec Keying Modules = Automatic, IPSec Policy Agent = Automatic, PAP Encrption = checked, MS-ChapV2 = No not checked.
What is causing this issue? When I manually create the VPN profile with the same settings, it works perfectly. Any ideas?
$VPNName = "VPN"
$ServerAddress = "REMOVED"
$PreSharedKey = "REMOVED"
#Add the VPN Connection
Add-VpnConnection -Name $VPNName -ServerAddress $ServerAddress -L2tpPsk $PreSharedKey -TunnelType L2tp -EncryptionLevel Optional -AuthenticationMethod PAP,MSCHAPv2 -Force -PassThru -RememberCredential -AllUserConnection
I don’t want to build a TOR for network security. I’d rather be able to have individual ones in case I want to take one down.
Besides lighting, are there any projects that have been used to enhance how their computer functions?
With several hours of work, I managed to talk a family member through setting up a secure (meaning SSH keys) SSH server on their computer, but Comcast's advanced security blocked the incoming connection (Apparently my non-Comcast ISP's IP range is known for problematic activity, although this is not what I'm doing.). At first, this seemed like a sensible security caution on Comcast's part, but even after I disabled the advanced security and waited several days, I still can't SSH in from my home connection. When I tether with my phone I can connect just fine, so the SSH server is properly setup and I'm connecting fine. How can I get Comcast's advanced security to actually disabled?
EDIT: A lot of people are offering alternatives (e.g. use a real router + bridge mode, some other remote desktop system), and while these are good faith advice items, what I want is SSH — and I see no reason for Comcast's system to not support this. I can think of such alternatives myself, so the advice that I'm asking for here is how to make SSH work with Comcast.
What's this news that if I want to watch a video on YouTube that is subject to age limits (by the way it was a video that talked about computer security), I have to send an ID or credit card information? Do you know how to unlock it without sending these informations?
IT ONLY HAPPENS by mobile, not from PC.
I swear these customers pull the alarms so they can ask a quick question...every time you’re swamped with customers in computers, you have that one customer who pulls the alarm which requires you to walk away from your current customer to turn off the alarm and then that customer has the audacity to try to ask you a million questions...smh
I want a career in cybersecurity and am applying to drexel soon. Ive noticed the computing technology degree has a security concentration and the CS degree has one also. Im a bit confused what are the differences between them? Which one would be better for a career in cybersecurity?
It would be useful if there were a politically correct term for this, since people like this are an obvious risk to a company's security.
Hey guys I hope u're all doing well on the other side of the screen . Currently I'm doing bug bounties I've found few bugs on hackerone public/private programs and one bug on a google acquisition until now . The case is that I'm 20 yo which means I'm a university student ( in a field that has no relation with computer science ), I've been thinking about leaving the university and joining a private center but in reality I've one shot since I'm not that guy who has a father that supports him ( with money ) so leaving the university isn't really going to help . So what I can do is to keep doing bug bounties then passing some certifications Idk it depends on the market, for me I'm good with web and api's maybe I know few things about network ( exploiting CVE's ) but I can improve myself and I'm planning to learn a lot about ( cloud / android / network penetration testing ) so few certs would help .
I really need a honest advice is there a chance ? I know there's many bug hunters like Ron Chan ngalog he's a physician he has never been in the computer science department but he became a security engineer in Gitlab now. But I'm not Ron I have to keep it real I can find vulnerabilities but I'm just starting my career so please keep it real for me is there a real chance to get a job in penetration testing or any field related to cyber security without being in a university that has relation with computers ?
My work made some changes to their digital infrastructure, and now has asked us to install a VPN on our home computers in order to access our work. (We work from home.) This raises some concerns regarding privacy/security. I'm trying to figure out how I can mitigate these issues.
One idea I had is to create a new partition that I'll only use for work purposes. I'll put my VPN on there. The other partition would be for personal use. Would setting up separate partitions prevent any negative effects related to this VPN from affecting the portion of my computer that I use for personal reasons? Or are there other things I should do here?
I'm fairly new to Linux, but am picking up a lot of useful info here. Much appreciated.
Hi everyone - I'm interested in getting your advice / thoughts / perspectives on what masters degree to pursue - a masters of computer science or cyber security? I graduated in December 2015 with an Accounting and IT BS degree and obtained my CPA upon graduation and have been working in IT Audit since graduation. I'm currently studying for the CISA as I'm currently an IT Auditor. I'm then planning to study for the CISSP certification as I have long term career goals to transition into a cyber security position. My employer offers tuition assistance (around 5K / calendar year) and I'm starting to research the different offerings available and online courses. However, I'm still trying to decide what masters degree would be more relevant / value added in a cyber security role - Masters of Cyber or Computer Science?
Thank you for the feedback!
TLDR: What is more relevant / value add - Masters of Computer Science OR Masters of Cyber Security?
#Krack Attack a WPA2 la seguridad informática mundial en riesgo?#
#Crees que estamos en riesgo? #
If so, how is it? Is it worth it?