The Verge now has a subscription offering. RSS feeds? Great. Fewer ads and trackers? Sounds promising. But how much less annoying is it actually? To find out, I disabled my fortress of ad and tracker blocking (clean browser profile, no extensions, no Little Snitch, VPN-ed into a naked network). Then, I tested a car review across three setups, scrolling the page in 15 seconds each time. Here are the very manual, not-at-all scientific results:| Posts on Recyclebin.zip
Apple’s focus on security and privacy is making them release features that only work on devices on the same iCloud account, which will counterintuitively hurt people’s privacy as they log in to personal iCloud accounts on devices owned by their employers. As the Apple blogosphere is dominated by very good independant writers, this is an issue that is rarely discussed, as it impacts people working for larger organizations with dedicated Mac hardware.| Posts on Recyclebin.zip
Originally posted on the JupiterOne blog. Some seem to love Cyber Security Awareness Month. Of course, at least as many despise it, because it makes no sense to have intense focus for one month and then forget about it for the other 11. Without saying if I love it or if I hate it, I decided to write a set of rules. If any of this is a problem in your organization, you HAVE to fix it before you are allowed to fill up user’s inboxes with more “awareness”.| Posts on Recyclebin.zip
This summer, since WWDC, I was repeatedly asked: How do I disable Apple Intelligence on our company laptops? Apple Intelligence didn’t exist yet. Not even in the betas, plus, Apple is pretty strict around betas and NDAs. The features were clearly going to roll out in stages throughout the year, so my answer was always, “Yeah, you’ll probably be able to control each one via MDM once the new settings drop.”| Posts on Recyclebin.zip
Research can be interesting, useful for risk management purposes, helpful to those building software and even entertaining. Sometimes, the usefulness of research is undone by the public discourse on a security issue. In the last few weeks, you’ve heard of “AutoSpill”, a vulnerability affecting multiple password managers on Android. I’ve heard everything about this vulnerability on LinkedIn. The posts are often accompanied by a AI-Generated image of a crying Android baby and broken pad...| Posts on Recyclebin.zip
Security checklist for families using Apple devices If many people in your family are on the Apple ecosystem, here are a few things worth checking while you’re going to be in the same physical location over the holidays. Ensure they have enough iCloud data and recent backups, then, enable automatic updates, and nudge them into updating (bring a couple chargers!), as these features are recent. If they don’t have any iCloud storage, consider rolling them into your iCloud “Family” to sha...| Posts on Recyclebin.zip
This article was originally posted on Medium. As I am removing my Medium articles, this will be the archive for this content. Originally written on September 8, 2017. TL;DR Version: Make sure your iOS devices can connect to the HomeKit Devices on port 80 and 443, and replicate mDNS from VLAN/Subnet to VLAN/Subnet with Avahi. So, you’ve setup multiple VLANs and SSIDs at home, you’re keeping all those Internet Connected toasters away from the LAN where your crown jewels sit.| Posts on Recyclebin.zip
Scams targeting Google Groups This article was originally published on the Fleet blog. Minor style changes were applied. The Fleet handbook contains detailed information on how we have configured Google Workspace to block spam and phishing. Gmail has some exciting email security features, such as flagging or blocking mail from people with the same name as employees or quarantining it. These features are great for protecting from business email compromise (BEC) and other types of social engine...| Posts on Recyclebin.zip
Subscription websites now like to use magic email links for login. They are extremely annoying.| Recyclebin.zip