Daily Shaarli

All links of one day in a single page.

August 1, 2021

5000x faster CRDTs: An Adventure in Optimization

The author explains how he optimized the performance of conflict-free replicated data types.

ENISA Telecom Security Incidents 2020 - Annual Report

Of the 170 registered incidents in 2020, 50 % were caused by system failures, 40 % by human errors, 7 % by natural phenomena, and 2 % by malicious actions.

Top Routinely Exploited Vulnerabilities

»Four of the most targeted vulnerabilities in 2020 affected remote work, VPNs, or cloud-based technologies.«

From Stolen Laptop to Inside the Company Network

Even a laptop following security best practices does not keep attackers from exploiting it. In this case, a TPM secured, FDE SSD was targeted.

IBM's z/OS Update for Mainframes About to Land
thumbnail

This article summarizes the information on the upcoming z/OS 2.5 release.

Netcat - All You Need to Know
thumbnail
Mobile Device Best Practices
Where Text Protocols Came From, and Why They're Not Going Anywhere
thumbnail

In this post, the author shows that even if not always the most efficient solution, there still are use-cases where human-readable protocols shine.

Sysadmins: Why Not Simply Verify There's No Backdoor in Every Program You Install, and Thus Avoid Any Cyber-Drama?
thumbnail

In this article, Gareth Corfield comments on ENISA's supply chain attack report.

Kernel Pwning with eBPF: A Love Story

This blog post provides the reader with an in-depth look at eBPF and its security implications in general and details of the specific bug CVE-2021-3490.

The Cost of Cloud, a Trillion Dollar Paradox
thumbnail

»You're crazy if you don't start in the cloud; you're crazy if you stay on it.«