Bits of Cyber @ Substack
Looks like 3 district bots use keypair-utils directly 😱😲
Looks like 3 district bots use keypair-utils directly 😱😲
Yolo K8s
No 'known good' seccomp?
Yolo all syscalls K8s
No identities for requests in your zero trust?
Yolo only server identity authenticated once and blind trust them for a year with all requests allowed through with K8s UNcontrol planes
Co trainers are doing just fine
Yolo K8s
No 'known good' seccomp?
Yolo all syscalls K8s
No identities for requests in your zero trust?
Yolo only server identity authenticated once and blind trust them for a year with all requests allowed through with K8s UNcontrol planes
Co trainers are doing just fine
V1 and V6 are time based, but 6 has a clock sequence and variant to be more precise
V7 is like V1 but has a different ra.dom segment
V8 is just guidelines for a custom UUID where you won't get a generator
And experimental
V1 and V6 are time based, but 6 has a clock sequence and variant to be more precise
V7 is like V1 but has a different ra.dom segment
V8 is just guidelines for a custom UUID where you won't get a generator
And experimental
Means I need to adjust business process, automation, and reporting logic - to use the proprietary tooling whereas tools that follow standards slide in and out without effecting any of that
Means I need to adjust business process, automation, and reporting logic - to use the proprietary tooling whereas tools that follow standards slide in and out without effecting any of that