A few hours of running a honeypot

I often come across various communities that strongly encourage people to self-host for a variety of reasons: in the interest of data sovereignty, to break free from big tech, or simply because it’s “FUN”. However, I believe that many of these encouragements do not take into account the risks associated with running your infrastructure, nor do they take into account the competence required to correctly configure specific products, systems, applications so that they can provide a secure solution. And if you can’t accomplish this (or if you run outdated, vulnerable software), you might end up with an entry point in your setup, allowing an outsider to gain access to your server. Moreover, without the ability to respond promptly 24/7, you may not be able to react in a timely manner — assuming you’ve even set up some kind of intrusion detection. ...

September 7, 2023

Cybersecurity basics, 2023 edition

Picture from the seminar at Stockholm Pride House. Today, I had the pleasure of discussing cybersecurity with 30 enthusiastic attendees at Stockholm Pride House who defied the rain and the risk of getting wet. I’ve conducted this seminar since 2020. At the height of the pandemy, I noticed a sharp rise in the need for cybersecurity as more and more individuals had to communicate and collaborate digitally due to the pandemic. These seminars is provided to level the playing field between those advocating for human rights and their antagonists who typically possess far more resources in terms of offensive cyber capabilities. ...

August 3, 2023

Are endusers really the weakest link?

I’ve recently started a cybersecurity course in university and got very engaged by an assignment where I was to make a list on how to reduce the human factor when dealing with cyber security, and wrote these thoughts. I’d like to delve deeper into an idea within cybersecurity professionals that “a chain is only as strong as its weakest link” that often is pointingat the end-users as that weakest link (1). After the article “In Defence of the Human Factor“ (2), and following the latest discourse in the cybersec community, I’d like to challenge the idea of end-users being the weakest link. ...

February 5, 2023