Are we surprised? Not really no... you don't own any of the data you're feeding it. Keep it away from your secrets.
Looks very interesting, I guess I will switch some of my devices to using this and we'll see how it goes.
That's really a massive leak again! The amount of personal data in the wild... will likely help with identity theft too.
That's an "interesting" leak, both for how it happens and what it contains. I shows serious biases in the "no fly list" used by airlines.
This is apparently a somewhat common mistake. Something is apparently not easy enough to handle and error prone.
International Domain Names indeed opened a whole can of worms. This creates plenty of opportunities for confusions and mistakes waiting to happen... or to be exploited.
Interesting bug in SQLite. In particular look for the conclusion regarding tests and coverage. It's something I often have to remind people of.
It's nice to see Tor is still winning even in difficult countries.
This is an interesting (and concerning) type of rootkits. Hard to tell how much of it really is in the wild at the moment.
Alright, this one looks somewhat concerning...
Interesting forensic of a supply chain attack targetting crates.io. Especially fascinating to me is how it then tries to target CI build environments as preparation for larger attacks.
Looks like a very interesting toolkit for low level network related or security related operations.
Admittedly, the go toolchain seems to handle supply chain problems in a neat way. I especially like the VCS as the source of truth.
Also a good reminder of why the fact that it's proprietary makes things harder security wise.
Interesting forensic of a device left around to spy a network.
Indeed, don't use this by default. This is likely overkill and has terrible side effects. Look up for the alternatives proposed in this article first.
Always amazed when such important routing systems are reached through very insecure means.
Good reminder of why fingerprint readers are really a poor security device.
Now this one is really nasty...
Fascinating attack vector. It was just a matter of time I guess, the more you use blurry frontiers (be it between OSes or other important domains) the more opportunities for exploits show up.