shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

253
active users

#hardwaresecurity

0 posts0 participants0 posts today
HiSolutions<p>📢New in our Research-Blog: A Tale of Practical Keylogger Forensics</p><p>On a recent engagement, an interesting hardware side quest popped up.<br>A client had found a <a href="https://infosec.exchange/tags/keylogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>keylogger</span></a> and, naturally, Cass Rebellin and <span class="h-card" translate="no"><a href="https://infosec.exchange/@jrt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jrt</span></a></span> wanted to know what the adversary had seen and if they could gather any useful traces towards the perpetrator.<br>The full story 👉<a href="https://research.hisolutions.com/2025/07/a-tale-of-practical-keylogger-forensics/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">research.hisolutions.com/2025/</span><span class="invisible">07/a-tale-of-practical-keylogger-forensics/</span></a></p><p><a href="https://infosec.exchange/tags/ResearchBlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ResearchBlog</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a></p>
CHERI Alliance<p>One of our founding directors, Mike Eftimakis, sat down with Akshaya Asokan from Information Security Media Group (ISMG) to explore how CHERI is helping tackle one of cybersecurity’s biggest challenges: memory safety.</p><p>CHERI (Capability Hardware Enhanced RISC Instructions) is a hardware-based approach to security, designed to prevent around 70% of today’s common vulnerabilities. Backed by industry leaders and the UK government, we're working to ensure global adoption across the electronics supply chain.</p><p>Watch the interview to learn more about:</p><p>💠 How CHERI addresses memory safety issues<br>💠 Common hardware supply chain vulnerabilities<br>💠 Progress on adoption by chipmakers<br>💠 Scalability challenges associated with CHERI</p><p>🎥 Watch the full interview: <a href="https://www.bankinfosecurity.com/uks-cheri-alliance-expands-to-global-hardware-supply-chain-a-28942" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bankinfosecurity.com/uks-cheri</span><span class="invisible">-alliance-expands-to-global-hardware-supply-chain-a-28942</span></a></p><p><a href="https://infosec.exchange/tags/CHERI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CHERI</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/SecurityByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityByDesign</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
David Chisnall (*Now with 50% more sarcasm!*)<p>The <span class="h-card" translate="no"><a href="https://infosec.exchange/@cheri_alliance" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cheri_alliance</span></a></span> has around a thousand followers on LinkedIn and just joined the Fediverse today. Let’s see how quickly we can get them to more than that here!</p><p><a href="https://infosec.exchange/tags/CHERI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CHERI</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://infosec.exchange/tags/FollowFriday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FollowFriday</span></a></p>
Joseph Zikusooka (ZIK)<p>Had a great time at <span class="h-card" translate="no"><a href="https://fosstodon.org/@opensuse" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>opensuse</span></a></span> Conference 2025 in Nuremberg! A highlight was the hands-on workshop by @tropicsquar, showcasing <a href="https://mastodon.social/tags/TROPIC01" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TROPIC01</span></a> — the first open and auditable secure element. A big step for verifiable hardware <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> in <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> systems, edge devices &amp; secure infrastructure.</p><p>Thanks to the Tropic Square team for the great session and the devkit</p><p><a href="https://mastodon.social/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/EdgeComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EdgeComputing</span></a> <a href="https://mastodon.social/tags/TROPIC01" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TROPIC01</span></a> <a href="https://mastodon.social/tags/TrustedHardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrustedHardware</span></a> <a href="https://mastodon.social/tags/SecureChips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureChips</span></a><br><a href="https://mastodon.social/tags/IoTSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoTSecurity</span></a> <a href="https://mastodon.social/tags/NoObscurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NoObscurity</span></a> <a href="https://mastodon.social/tags/OpenHardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenHardware</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a></p>
CHERI Alliance<p>👋 Hey infosec.exchange! We’re the CHERI Alliance — excited to join the community!</p><p>🔐 We’re all about CHERI (Capability Hardware Enhanced RISC Instructions) — a powerful hardware-based approach to making memory safety and software security actually enforceable, by design.</p><p>💡 CHERI helps stop things like buffer overflows and use-after-free bugs before they cause trouble — with hardware-enforced protections built right into the architecture.</p><p>We’re here to:<br>- Share news about the CHERI community in general<br>- Talk about what our members are building with CHERI<br>- Connect with folks who care about deep, meaningful security improvements<br>Check us out 👉 cherialliance.org</p><p>Give us a follow if this sounds like your kind of thing!</p><p><a href="https://infosec.exchange/tags/CHERI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CHERI</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/SecureByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureByDesign</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a></p>
Seth G.<p>Has anyone done a proper <a href="https://chaos.social/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> analysis on the <a href="https://chaos.social/tags/Fairphone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fairphone</span></a> yet? I know <span class="h-card" translate="no"><a href="https://grapheneos.social/@GrapheneOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GrapheneOS</span></a></span> has said, "it doesn't meet their requirements" (fair enough), but what about for the OEM-installed <a href="https://chaos.social/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> ROM?</p><p><a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://chaos.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a></p>
Privacy Guides<p>Always remember, when it comes to hardware security keys: Two is one, one is none.</p><p>Our latest article covers the setup process for two YubiKeys (from Yubico's YubiKey 4 or 5 series) to keep your online accounts safe and secure 🔒 + it goes through resetting your existing keys to a blank slate, and the reasons you might want to do so!</p><p><a href="https://www.privacyguides.org/articles/2025/03/06/yubikey-reset-and-backup/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">privacyguides.org/articles/202</span><span class="invisible">5/03/06/yubikey-reset-and-backup/</span></a></p><p><a href="https://mastodon.neat.computer/tags/YubiKey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YubiKey</span></a> <a href="https://mastodon.neat.computer/tags/HardwareSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareSecurity</span></a> <a href="https://mastodon.neat.computer/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.neat.computer/tags/Yubico" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Yubico</span></a> <a href="https://mastodon.neat.computer/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.neat.computer/tags/PrivacyGuides" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivacyGuides</span></a> <a href="https://mastodon.neat.computer/tags/Article" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Article</span></a></p>
Slim Bill (He/Him)<p>Why I Prefer Hardware-based Authentication <br>A Bit of Security for December 2, 2024<br>I like hardware-based authentication – when it’s done right. Listen to this - <br>Let me know what you think in the comments below or at wjmalik@noc.social<br><a href="https://noc.social/tags/cybersecuritytips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritytips</span></a> <a href="https://noc.social/tags/SecureID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureID</span></a> <a href="https://noc.social/tags/hardwaresecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardwaresecurity</span></a> <a href="https://noc.social/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://noc.social/tags/identification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>identification</span></a> <a href="https://noc.social/tags/accesscontrol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accesscontrol</span></a> <a href="https://noc.social/tags/BitofSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitofSec</span></a><br><a href="https://youtu.be/m3vF3knbzHs?si=3-BTKClfspBBzISc" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/m3vF3knbzHs?si=3-BTKC</span><span class="invisible">lfspBBzISc</span></a></p>