logo FEDIDEVS

FEDIDEVS

Awesome Security accounts on Mastodon.

security Security
Header Image

LWN.net aims to be the premier news and information source for the free software community. We provide comprehensive coverage of development, legal, commercial, and security issues. The LWN.net Weekly Edition is our weekly summary of what has happened in the free software world; our front page offers up-to-the-minute coverage.

Have a news tip for LWN? Drop us a note at [email protected].

Last posted Less than a day ago
Posts 1,271
Followers ▼ 10
Following 17
Header Image
Chris Petrilli
@[email protected]

. Social Justice _________. Nerd. Architectural astronaut with a leaky suit. Do something with security. NB Pronouns: he/she/him/her. PNW

Press F1 to continue…

Last posted Less than a day ago
Posts 42,862
Followers ▼ 10
Following 1,131
Header Image

Scientist, safecracker, etc. McDevitt Professor of Computer Science and Law at Georgetown. Formerly UPenn, Bell Labs. So-called expert on election security and stuff. twitter.com/mattblaze on the Twitter. Slow photographer. Radio nerd. Blogs occasionally at mattblaze.org/blog . I probably won't see your DM; use something else. He/Him. Uses this wrong.

Last posted 1 day ago
Posts 23,299
Followers ▼ 10
Following 369
Header Image
Tarah Wheeler
@[email protected]

♦️ CSO of TPO Group ♦️EFF Board Of Directors♦️US/UK Fulbright Scholar in Cyber Security ♦️ Formerly Harvard, Brookings, Splunk, Symantec. ♦️she/her curmudgienne♦️standard disclaimer regarding personal opinions.♦️Searchable. t AT tarah DOT org

Last posted 1 day ago
Posts 1,762
Followers ▼ 10
Following 60
Header Image

DEF CON is the world's most influential hacker conference. Held every year since 1993 in Las Vegas, Nevada, DEF CON is the hub of a global community of hackers, security geeks and curious technophiles.

Last posted 1 day ago
Posts 2,377
Followers ▼ 9
Following 718
Header Image

Low-level systems stuff. Reverse engineering, security research, bit twiddling, optimisation, SIMD, uarch. 64-bit ARM enthusiast.

he/they

Last posted Less than a day ago
Posts 1,055
Followers ▼ 9
Following 304
Header Image

security engineer, holistic tester, quality enabler, agile experimenter, sociotechnical symmathecist, team glue. volleyball player, game lover, story escapist. she/her.

Last posted Less than a day ago
Posts 10,380
Followers ▼ 8
Following 935
Header Image
Davi Ottenheimer
@[email protected]

flyingpenguin.com since 1995.
Gebrüder Ottenheimer since 1862.
History of security, security of history.

Last posted Less than a day ago
Posts 242
Followers ▼ 8
Following 0
Header Image

Investigative Tech-Reporterin Republik & Dnip.ch
Eigener Blog: techjournalismus.ch

Interests:

Awards for the years: 2018, 2020, 2021, 2023 and 2024.

And:

Last posted 1 day ago
Posts 941
Followers ▼ 8
Following 239
Header Image

👀 Tracking all things Valve and Steam.
ℹ️ We are not affiliated with Valve in any way.

Last posted 2 days ago
Posts 935
Followers ▼ 8
Following 1
Header Image
Attack and Defense
@[email protected]

Mozilla Firefox Security News. Featuring internals for Enthusiasts, Security Engineers, Security Researchers, and Bug Bounty Hunters.

Last posted 2 days ago
Posts 36
Followers ▼ 7
Following 15
Header Image

I know a thing or two about AirPods. App developer, security researcher. 🏳️‍🌈🧩

Last posted 1 day ago
Posts 870
Followers ▼ 6
Following 291
Header Image
TrendAI Zero Day Initiative
@[email protected]

TrendAI Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.

Last posted 2 days ago
Posts 1,283
Followers ▼ 6
Following 7
Header Image
Smartphone, don't spy!
@[email protected]

Hi, this is "Smartphone, don't spy!". This project collects all relevant tips and news on smartphone security and prepares them for you as a clear checklist in several languages. The unicorn is looking forward to exciting discussions and is open to requests and suggestions.

You can find the checklist here: smartphone-dont-spy.de/en

Without JavaScript: smartphone-dont-spy.de/en/hand

Maintained by social.tchncs.de/@steampixel

Last posted 2 days ago
Posts 816
Followers ▼ 6
Following 167
Header Image

Security and Fellow at the Python Software Foundation 🐍 Trans rights, BLM, Minnesoootan, retro gaming, he/him



Blog: sethmlarson.dev

Last posted 1 day ago
Posts 1,101
Followers ▼ 6
Following 409
Header Image
I love this, so I
@[email protected]

I’m Joel, the WiFi whacker, network noodler, IoT idiot, Linux licker, and security spooner. Can C, a bit Rusty, also Bashing Pythons. Sandal appreciator. Anti-sock crusader. Now contains at least 65% shitpost by weight. Meets or exceeds ISO3533:2021 standards. Not for human consumption. Not for animal consumption. Not for quality or training purposes.

Geek for hire - if you’ve got a cool project let me know!

Last posted Less than a day ago
Posts 77,401
Followers ▼ 6
Following 970
Header Image

Qubes OS is a security-oriented operating system that allows you to compartmentalize your data and activities into isolated environments called "qubes" so that a single cyberattack can't take down your entire digital life in one fell swoop.

Last posted 1 day ago
Posts 232
Followers ▼ 6
Following 0
Header Image

Creator of @haveibeenpwned. Microsoft Regional Director and MVP. Pluralsight author. Online security, technology and “The Cloud”. Australian.

Last posted 1 day ago
Posts 1,256
Followers ▼ 6
Following 54
Header Image

Nothing2Hide provides capacity building and security assistance to civil society activists, Human Rights defenders and journalists around the globe. We focus especially on technology and information and how the first can empower the latter.

Last posted 1 day ago
Posts 2,228
Followers ▼ 5
Following 175
Header Image

AI Luddite. Extremely online since 1994. Solidarity forever.

Last posted 1 day ago
Posts 17,146
Followers ▼ 5
Following 1,090
Header Image
Kim Crawley (she/her) 😷🍉
@[email protected]

Cybersecurity writing, and former professor at the Open Institute of Technology.

Previously IOActive, Venafi, AT&T Cybersecurity, BlackBerry, Hack The Box, Synack, Tripwire

Author of:

The Pentester Blueprint via Wiley Tech
Hacker Culture: A to Z available now via O'Reilly Media
Technofascism Survival Guide
kickstarter.com

!
She/her

I'm a friend and ally to zeroes.ca. ❤

Certified zero COVID zealot!

Last posted 1 day ago
Posts 6,973
Followers ▼ 5
Following 1,129