Reply

Hey thanks for letting me know! Shall I add a note to the post to say that depending in what you use, exec may be needed?

 Like

Liked Terence Eden (@Edent@mastodon.social)
Post details
A question for #infosec practitioners. I've found an abandoned AWS bucket from a very large company. It serves all the images & fonts in their billing emails. I defensively registered it to prevent an attacker from injecting malicious content into the emails I receive. Then I emailed their security.txt contact to inform them and offering to transfer it back (for free, obviously). Was that the right thing to do? Should I have waited for a response from them before securing the bucket?

 Like

Liked a post on Twitter
Post details

 Like

Liked a post on Twitter
Post details

 Like

Liked a post on Twitter
Post details

 Like

Liked Will Norris 🦦 (@will@willnorris.com)
Post details
Some of the most common requests we get for the @Tailscale API relate to authentication. Users want the ability to create credentials with fine-grained permissions, more than 90 days expiration, and keys that aren't tied to individual user accounts. It took a little longer than expected, but I'm happy to say that what was actually my starter project(?!) with @jordanwhited@inuh.net has shipped: OAuth support for the API. https://tailscale.com/blog/oauth/