cazabon, to security

1/13 So, this week I discovered my first in a public system.

In the past I've found in , problems with , with bureaucratic processes, some of which were significant, but they all pale in comparison to this one.

It starts with a of .

cazabon,

9/13 So an attacker can find out exactly what you're taking, what you're taking, and how often you're taking it.

They can see when I last picked up each prescription, and what date it is next available for refill.

They can see exactly which doctor prescribed it.

That is a lot of information to just give out with essentially no of the .

Even better, you can order refills, or turn auto-refill on or off.

enhance_dev, to random
@enhance_dev@fosstodon.org avatar

OAuth Authentication with Enhance?

Yes, please.

Read @ryanbethel latest post on how to set it up.

https://begin.com/blog/posts/2023-06-15-oauth-authentication

Ubuntu Azure AD Authentication

I recently found: AAD Auth from Canonical/Ubuntu for native AzureAD auth for Ubutnu systems. For the past bit we've mostly been Windows/macOS, and never really entertained linux for business use - mostly because we've never had the tooling for it. We exclusively use Azure AD (no on-prem AD), so in the past when looking the...

stefan, to fediverse
@stefan@stefanbohacek.online avatar

Usually I polish my work a bit more before releasing it publicly, but I really wanted to give people interested in making fediverse apps for everyone a bit of a head start.

Here's a very work-in-progress authentication server I use for my fediverse connections data visualization project:

https://github.com/stefanbohacek/auth-server

zaproxy, to random

Lots happened with ZAP in May https://www.zaproxy.org/blog/2023-06-01-zap-updates-may-2023/
Including some exciting new features around authentication, the AJAX spider, and the GraphQL add-on.

itnewsbot, to random
@itnewsbot@schleuss.online avatar

Frontegg launches entitlements engine to streamline access authorization - Frontegg’s new entitlement engine will be powered by context-aware logic controls (CALC) ... - https://www.csoonline.com/article/3697735/frontegg-launches-entitlements-engine-to-streamline-access-authorization.html#tk.rss_all

F0rm4t, to random Italian

Announcing General Availability of Authenticator Lite (in Outlook)

"Authenticator Lite (in Outlook) expands the opportunity to convert users by bringing the enhanced security of push notifications to devices that have not yet downloaded the Microsoft Authenticator App. "

https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/announcing-general-availability-of-authenticator-lite-in-outlook/ba-p/3773136

PrivacyDigest, to random
@PrivacyDigest@mas.to avatar

Here’s how long it takes new attack to unlock 10 different smartphones

Researchers have devised a low-cost attack that cracks the used to unlock the screen and perform other sensitive actions on a range of devices in as little as 45 minutes.

https://arstechnica.com/?p=1941070

johnl, to random
@johnl@mastodon.social avatar

Why on earth does the Docker bearer token flow reference oauth so much but then just isn't quite oauth? It even uses a GET request for the token, not POST, which is particularly weird. I'm not much of a fan of oauth but being oauth-esque is a bit annoying!

eingfoan, to random

Newbie question: what is best method for networks? I am playing around with a lab environment where I want good mfa inside but don’t want it to connect to the internet. My current point of view is: I can not place there since it „needs“ internet in many ways.. right? . My current way of thinking is i build a PKI into this network and use it with acting as a Smartcard but not or . Am I wrong ? Is there better options?

simonzerafa, to random

For your OS lock screens 🙂

Yes, we did drive there especially to take new photos, as it's a nice sunny day.

Croeso! 🙂🖖

itnewsbot, to random
@itnewsbot@schleuss.online avatar

Passkeys may not be for you, but they are safe and easy—here’s why - Enlarge (credit: Aurich Lawson | Getty Images)

My recent featu... - https://arstechnica.com/?p=1939003 &it

stshank, to random
@stshank@mstdn.social avatar

If passkeys are easy enough to use, will people be less inclined to stay logged in via cookies? (Password managers have shifted me this direction.) Will websites cut down on the "stay logged in" option? Because there's a market for cookie credentials to break into accounts.

fosslife, to random
@fosslife@fosstodon.org avatar

Protecting Your Privacy: Google passkeys are now available for personal accounts https://www.fosslife.org/how-set-google-passkeys

swiefling, to random
@swiefling@hci.social avatar

Happy to annouce that I successfully defended my doctoral thesis "Usability, Security, and Privacy of Risk-Based Authentication" at Ruhr University Bochum.

It started in 2017 with a study on RBA use on popular websites. Never thought that this would end in 7 publications, >125 citations, public recognition by people I'm a big fan of, a DAAD RISE Germany scholarship, an internship at Meta, and the Open Data Impact Award 2022.

itnewsbot, to random
@itnewsbot@schleuss.online avatar

Passwordless Google accounts are easier and more secure than passwords. Here’s why. - Enlarge (credit: Aurich Lawson | Getty Images)

By now, you’ve ... - https://arstechnica.com/?p=1937113 &it

jasontucker, to php
@jasontucker@simian.rodeo avatar

🔐 WP-WebAuthn – Passkey on WordPress

With Google recently announcing “The beginning of the end of the password” I started thinking about and what plugins are available that allow for support for . Using only your username you can use the passkey system to use your computer or mobile device to perform the rest of the login sequence.

https://jasontucker.blog/14616/wp-webauthn-passkey-on-wordpress

omeraltundal, to random

Error handling is one of the crucial elements in security.

Especially in the authentication process, the messages you give shouldn't give any information about the user database

(there is another issue below, they might be storing the passwords in reversable format or using the same hash salt for all users)

ghalldev, to random

The latest episode of Under the Radar got me rethinking my approach for accessing the IGDB API.

At the moment I’ve got a proxy server I set up which basically just handles the authentication process between QuestLogger and the API.

This is apparently the way IGDB suggests to access the API through a native app but I’m wondering if it’s feasible to do that on-device without causing issues.

Any devs out there who are knowledgeable about Oauth with thoughts? 🤷‍♂️

https://api-docs.igdb.com/#authentication

jcn, to ruby

I’ll probably regret asking, but what are people’s preferred gems these days?

I’ve used but hated . Have no opinions on . Really enjoyed but it seems like there’s a v1 rewrite happening which I am always suspicious of. I have been reading up on but since this is going to be a app I’m hesitant to jam into it. And does the answer change for an api-only app?

The answer is to suck it up and use devise isn’t it?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • magazineikmin
  • osvaldo12
  • GTA5RPClips
  • mdbf
  • Youngstown
  • tacticalgear
  • slotface
  • rosin
  • kavyap
  • ethstaker
  • everett
  • khanakhh
  • JUstTest
  • DreamBathrooms
  • InstantRegret
  • cubers
  • normalnudes
  • Leos
  • ngwrru68w68
  • cisconetworking
  • modclub
  • Durango
  • provamag3
  • anitta
  • tester
  • lostlight
  • All magazines