Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Passkey Developer Resources
Passkey Developer Resources
Hello passkeys, goodbye passwords! passkeys.dev is a collection of resources and insights to help you deploy passkeys, including practical user experiences, device ecosystem support, frequently asked questions, and more.
·passkeys.dev·
Passkey Developer Resources
RFC 9421: HTTP Message Signatures
RFC 9421: HTTP Message Signatures
This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.
HTTP Message Signatures
·datatracker.ietf.org·
RFC 9421: HTTP Message Signatures
Cloudflare Takes a Stab at a Captcha That Doesn’t Suck
Cloudflare Takes a Stab at a Captcha That Doesn’t Suck
The internet infrastructure company has an alternative tool to check whether you’re human—and it doesn’t force you to pick out buses in tiny boxes.
·wired.com·
Cloudflare Takes a Stab at a Captcha That Doesn’t Suck
Challenge: Private Access Tokens - Discover - Apple Developer
Challenge: Private Access Tokens - Discover - Apple Developer
Private Access Tokens are powerful tools that prove when HTTP requests are coming from legitimate devices without disclosing someone's identity. They are simple to set up and test — and so, on Thursday, we're inviting you to try out Private Access Tokens on your own server.
·developer.apple.com·
Challenge: Private Access Tokens - Discover - Apple Developer
The Pyramid of Pain
The Pyramid of Pain
Update 2014-01-17 I'm updating this post to include a slightly revised version of the Pyramid.  The only real change I made was that I adde...
·detect-respond.blogspot.com·
The Pyramid of Pain
Unified Mobile App Defense, All Android & iOS Apps - Appdome
Unified Mobile App Defense, All Android & iOS Apps - Appdome
Try Appdome's Unified Mobile App Defense platform, continuous mobile app security, anti-fraud, anti-malware, anti-bot, geo compliance, more in Android & iOS apps in CI/CD.
·appdome.com·
Unified Mobile App Defense, All Android & iOS Apps - Appdome
Societal, ethical, and technical impacts of digital identities
Societal, ethical, and technical impacts of digital identities
This blog post introduces an analysis of Digital Identities and their various architectural models. The paper focuses on the impact of identities on the Web and users, particularly on privacy, security, and human rights, the role that Web standardization may play in managing that impact and how collaboration among various stakeholders can mitigate these threats.
·w3.org·
Societal, ethical, and technical impacts of digital identities
Cyber Scarecrow
Cyber Scarecrow
An app for scaring away malware
·cyberscarecrow.com·
Cyber Scarecrow
The technical complexities of decoupled authorization | Cerbos
The technical complexities of decoupled authorization | Cerbos
Decoupling the authorization module can bring about a host of benefits. But what are the complexities of this approach? And how can they be addressed? In this guide, you can familiarize yourself with the important technical aspects of decoupling authorization.
·cerbos.dev·
The technical complexities of decoupled authorization | Cerbos
New security loophole allows spying on internet users visiting websites and watching videos
New security loophole allows spying on internet users visiting websites and watching videos
Internet users leave many traces on websites and online services. Measures such as firewalls, VPN connections and browser privacy modes are in place to ensure a certain level of data protection. However, a newly discovered security loophole allows bypassing all of these protective measures.
·techxplore.com·
New security loophole allows spying on internet users visiting websites and watching videos
We analyzed the entire web and found a cybersecurity threat lurking in plain sight
We analyzed the entire web and found a cybersecurity threat lurking in plain sight
Our latest research has found that clickable links on websites can often be redirected to malicious destinations. We call these "hijackable hyperlinks" and have found them by the millions across the whole of the web, including on trusted websites.
·techxplore.com·
We analyzed the entire web and found a cybersecurity threat lurking in plain sight
Ente - Private cloud storage for your photos, videos and more
Ente - Private cloud storage for your photos, videos and more
Protect your photos and videos with Ente - a secure, cross-platform, open source, encrypted photo storage app. Automatic backups, end-to-end encryption, collaborative albums, family plans, free trial, library-sync, 1-click import, human support, locked photos, live photos, descriptions, private sharing, search and more.
·ente.io·
Ente - Private cloud storage for your photos, videos and more
MAC vs. DAC: Comparing Access Control Fundamentals | Permit
MAC vs. DAC: Comparing Access Control Fundamentals | Permit
Learn the differences between Mandatory Access Control (MAC) and Discretionary Access Control (DAC) and how to leverage both for application authorization.
·permit.io·
MAC vs. DAC: Comparing Access Control Fundamentals | Permit
tisiphone.net
tisiphone.net
[Lesley Carhart, Public Universal Cyber-Pal]
·tisiphone.net·
tisiphone.net
XKCD Password Generator
XKCD Password Generator
Let's generate a secure, totally in-browser XKCD password.
·xkcd.pw·
XKCD Password Generator