@Cyberoutsider@infosec.exchange cover
@Cyberoutsider@infosec.exchange avatar

Cyberoutsider

@Cyberoutsider@infosec.exchange

He/Him/His

Allegedly works in information security as a professional, but not sure anything he does counts as professional.

Likes to dabble in some of that hacking stuff, maybe some of the stuff like the OSINTs, but really just likes to advise people not to do things.

Also does some of those exercise stuffs. You know, like running 🏃, swimming 🏊 and other heavy breathing things 🤸.

Spouts political nonsense from time-to-time. And probably isn't being that serious in most of his toots.

This profile is from a federated server and may be incomplete. For a complete list of posts, browse on the original instance.

jerry , to random
@jerry@infosec.exchange avatar

sorry about the extended downtime. I'll explain what happened shortly

Cyberoutsider ,
@Cyberoutsider@infosec.exchange avatar

@jerry Wait... was everyone cancelled?

jerry , to random
@jerry@infosec.exchange avatar

Least privilege just means that you made an attempt to see whether all those ports need to be open, or the app needs all those permissions. It’s probably fine.

Cyberoutsider ,
@Cyberoutsider@infosec.exchange avatar

@jerry Similar to Need-to-know.

No one needs to know how a system was built (that'd be a potential security weakness cause an attacker could read it to understand it, right?) - so why bother documenting anything you've done?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines