Be inspired or be DESTROYED - daily wholesomeness in your terminal

Following this guide, you’ll have the latest Inspirational Skeletor💀 post in your terminal when you open your shell. Be inspired or be DESTROYED! Prerequisites The following applications must be present on the system and in your $PATH: curl jq Fetching statuses from the terminal Since the response from Mastodon is delivered as a JSON-array, having jq installed will help greatly with parsing the content. Mastodon has support for alt-text on images, and the user @[email protected] is kind enough to provide that with each posted image which makes it trivial to fetch the latest wholesome inspirational quote, even though the quote is images with text. This is accomplished by the following command: ...

July 6, 2024

Chako paul city and the spread of disinformation

Do you remember the tale of 25,000 lesbian lumberjacks living together in northern Sweden? Chako Paul City, as the story goes, was guarded with an iron resolve to prevent any men from entering the city. Those daring enough to try were beaten to death, while any woman returning to the city had to undergo a ceremonial wash before reentry. This was, of course, utter nonsense. This story was fabricated by a journalist from the newspaper Xinhuanet. To be clear, this was not intended as a satirical piece. This story took on a life of its own, rapidly spreading like wildfire leading leading to Swedish tourism websites crashing and causing internet service providers in China to grind to a halt due to the flood of traffic. ...

October 14, 2023

A few hours of running a honeypot

I often come across various communities that strongly encourage people to self-host for a variety of reasons: in the interest of data sovereignty, to break free from big tech, or simply because it’s “FUN”. However, I believe that many of these encouragements do not take into account the risks associated with running your infrastructure, nor do they take into account the competence required to correctly configure specific products, systems, applications so that they can provide a secure solution. And if you can’t accomplish this (or if you run outdated, vulnerable software), you might end up with an entry point in your setup, allowing an outsider to gain access to your server. Moreover, without the ability to respond promptly 24/7, you may not be able to react in a timely manner — assuming you’ve even set up some kind of intrusion detection. ...

September 7, 2023

Cybersecurity basics, 2023 edition

Picture from the seminar at Stockholm Pride House. Today, I had the pleasure of discussing cybersecurity with 30 enthusiastic attendees at Stockholm Pride House who defied the rain and the risk of getting wet. I’ve conducted this seminar since 2020. At the height of the pandemy, I noticed a sharp rise in the need for cybersecurity as more and more individuals had to communicate and collaborate digitally due to the pandemic. These seminars is provided to level the playing field between those advocating for human rights and their antagonists who typically possess far more resources in terms of offensive cyber capabilities. ...

August 3, 2023

Are endusers really the weakest link?

I’ve recently started a cybersecurity course in university and got very engaged by an assignment where I was to make a list on how to reduce the human factor when dealing with cyber security, and wrote these thoughts. I’d like to delve deeper into an idea within cybersecurity professionals that “a chain is only as strong as its weakest link” that often is pointingat the end-users as that weakest link (1). After the article “In Defence of the Human Factor“ (2), and following the latest discourse in the cybersec community, I’d like to challenge the idea of end-users being the weakest link. ...

February 5, 2023