veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

202
active users

#xmp

0 posts0 participants0 posts today
Vasileios Kemerlis<p>📢 Honored to return to Yale University last week to speak at the Department of Computer Science colloquium on Operating Systems security -- exactly 10 years after my first talk there on the same topic!</p><p>In this "tin anniversary" edition, I reflected on how OS kernel exploitation and defense have evolved over the past decade, and shared highlights from some of our recent work in the field over the last five years:</p><p>✳️ xMP (IEEE S&amp;P 2020: 📄 <a href="https://cs.brown.edu/~vpk/papers/xmp.sp20.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cs.brown.edu/~vpk/papers/xmp.s</span><span class="invisible">p20.pdf</span></a>, 💾 <a href="https://github.com/virtsec/xmp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/virtsec/xmp</span><span class="invisible"></span></a>) — Selective intra-kernel memory isolation using hardware-assisted virtualization.</p><p>✳️ SafeSLAB (ACM CCS 2024: 📄 <a href="https://cs.brown.edu/~vpk/papers/safeslab.ccs24.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cs.brown.edu/~vpk/papers/safes</span><span class="invisible">lab.ccs24.pdf</span></a>, 💾 <a href="https://github.com/tum-itsec/safeslab" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/tum-itsec/safeslab</span><span class="invisible"></span></a>) — Kernel heap hardening through memory tagging.</p><p>✳️ EPF (USENIX ATC 2023: 📄 <a href="https://cs.brown.edu/~vpk/papers/epf.atc23.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cs.brown.edu/~vpk/papers/epf.a</span><span class="invisible">tc23.pdf</span></a>, 💾 <a href="https://gitlab.com/brown-ssl/epf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gitlab.com/brown-ssl/epf</span><span class="invisible"></span></a>) — Exploiting the (e)BPF sub-system for bypassing modern protections and ways to fix this.</p><p>(Joint work with <span class="h-card" translate="no"><a href="https://infosec.exchange/@mikepo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mikepo</span></a></span>, Marius Momeu, Vaggelis Atlidakis, <span class="h-card" translate="no"><a href="https://mastodon.social/@dijin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dijin</span></a></span>, and Sergej Proskurin.)</p><p>If this area of research interests you, you might also find our recent work on BeeBox (strengthening eBPF against transient execution attacks, USENIX Security 2024: 📄 <a href="https://cs.brown.edu/~vpk/papers/beebox.sec24.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cs.brown.edu/~vpk/papers/beebo</span><span class="invisible">x.sec24.pdf</span></a>, 💾 <a href="https://gitlab.com/brown-ssl/beebox" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gitlab.com/brown-ssl/beebox</span><span class="invisible"></span></a>) and IUBIK (leveraging memory tagging and pointer authentication to isolate attacker-controlled data in kernel space, to appear in IEEE S&amp;P 2025) worth a look.</p><p>It was a real pleasure catching up with friends, colleagues, and students. And with the spring weather fully cooperating, I couldn't resist snapping a few photos of Yale's beautiful campus in the early morning light.</p><p>Thank you to my host Charalampos Papamanthou and the Yale CS department for the warm welcome and thoughtful discussion!</p><p><a href="https://infosec.exchange/tags/xmp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xmp</span></a> <a href="https://infosec.exchange/tags/safeslab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>safeslab</span></a> <a href="https://infosec.exchange/tags/epf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>epf</span></a> <a href="https://infosec.exchange/tags/brownssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>brownssl</span></a></p>
utzer [Pleroma]Ich bin überzeugt: Fotoverwaltungssoftware sollte Metadaten immer direkt in den Bilddateien speichern – plattform- und softwareübergreifend nutzbar.<br><br>Ob Gesichterkennung, Beschreibungstext, Kategorien oder manuelle Tags – all diese Infos gehören nicht nur in eine Datenbank, sondern auch als Metadaten direkt ins <a class="hashtag" href="https://soc.utzer.de/tag/bild" rel="nofollow noopener" target="_blank">#Bild</a> (EXIF/XMP/IPTC etc.).<br><br>Ich habe im Laufe der Jahre zwei Programme intensiver genutzt:<br>Damals unter Windows: <a class="hashtag" href="https://soc.utzer.de/tag/picasa" rel="nofollow noopener" target="_blank">#Picasa</a> (RIP). Heute unter Linux: <a class="hashtag" href="https://soc.utzer.de/tag/digikam" rel="nofollow noopener" target="_blank">#Digikam</a>.<br>Jetzt überlege ich, auf eine serverbasierte Lösung umzusteigen – aber immer bleibt dieselbe Frage:<br>Wie <a class="hashtag" href="https://soc.utzer.de/tag/portabel" rel="nofollow noopener" target="_blank">#portabel</a> sind meine Daten, wenn die Software ausfällt oder ich wechseln will?<br><br>Eine Metadatenstrategie, die auf offene Standards setzt, erleichtert Backups, Migration, parallele Nutzung und langfristige Verfügbarkeit.<br><br>Wie seht ihr das?<br><br><a class="hashtag" href="https://soc.utzer.de/tag/fotomanagement" rel="nofollow noopener" target="_blank">#Fotomanagement</a> <a class="hashtag" href="https://soc.utzer.de/tag/exif" rel="nofollow noopener" target="_blank">#EXIF</a> <a class="hashtag" href="https://soc.utzer.de/tag/xmp" rel="nofollow noopener" target="_blank">#XMP</a> <a class="hashtag" href="https://soc.utzer.de/tag/linux" rel="nofollow noopener" target="_blank">#Linux</a> <a class="hashtag" href="https://soc.utzer.de/tag/selfhosted" rel="nofollow noopener" target="_blank">#Selfhosted</a> <a class="hashtag" href="https://soc.utzer.de/tag/fotosammlung" rel="nofollow noopener" target="_blank">#Fotosammlung</a> <a class="hashtag" href="https://soc.utzer.de/tag/foto" rel="nofollow noopener" target="_blank">#Foto</a>
Orion77176 ✅ ⏚ ᓚᘏᗢ ☢️ :lfin:<p><span class="h-card" translate="no"><a href="https://piaille.fr/@quiou" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>quiou</span></a></span> <span class="h-card" translate="no"><a href="https://mamot.fr/@Chtixof" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Chtixof</span></a></span> bonjour, j'utilise <a href="https://orion.isintu.fr/tags/YunoHost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YunoHost</span></a> qui est un serveur <a href="https://orion.isintu.fr/tags/xmp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xmp</span></a> sous debian 12.<br>L'instance est une application de <a href="https://orion.isintu.fr/tags/yunohost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yunohost</span></a> <a href="https://orion.isintu.fr/tags/mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mastodon</span></a> tout est assez automatique.<br>Aucun souci pour l'interconnexion avec le fediverse...<br>Le serveur possède son firewall, tous les outils sont intégrés.</p><p><a href="https://yunohost.org/index.fr.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">yunohost.org/index.fr.html</span><span class="invisible"></span></a></p>
ℒӱḏɩę :blahaj:<p>About time <a href="https://tech.lgbt/tags/Gigabyte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gigabyte</span></a> fixed <a href="https://tech.lgbt/tags/XMP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XMP</span></a> working on their <a href="https://tech.lgbt/tags/Aorus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aorus</span></a> Master <a href="https://tech.lgbt/tags/x670e" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x670e</span></a> board. When I first built this rig in Sept 2022 (release day), my RAM ran at 5200, the entire system was perfect. Then every BIOS update after that busted it, I had to run stock until now with f33b when XMP started working again (I don't have EXPO RAM). Needless to say, never touching this <a href="https://tech.lgbt/tags/BIOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BIOS</span></a> again! If it ain't broke.... <a href="https://tech.lgbt/tags/amd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amd</span></a></p>