-
May 27, 2024
Back in 2017, I shared a detailed post about the configuration of my Linux laptops on my blog (you can find it here). Since then, not only has my tech setup evolved, but my understanding and awareness of security and… read more »
-
May 25, 2024
Welcome, dear readers, to the frenetic world of modern work, where the rush is glorified and the only thing that matters is the end result. Ah, the culture of results! It’s as if we’re all running on a hamster wheel,… read more »
-
May 21, 2024
The world of work today if full of tasks, emails, meetings, and personal projects: In this situation, you may feel overwhelmed. But the Getting Things Done (GTD), a productivity system developed by David Allen, may helps you! GTD is not… read more »
-
May 20, 2024
For several years I have been using Jekyll as a platform for my site, and for publication I use a simple GitHub Action which converts an issue into a markdown file which is then processed by Jekyll (in one of… read more »
-
May 13, 2024
In the past I have often spoken (1,2) about Pegasus, the spyware originally produced and distributed by the Israeli company NSO, which has been used by various states to spy on activists, opponents and journalists. Now, with the upcoming European… read more »
-
Apr 26, 2024
The Wayback Machine is a digital archive of the internet, maintained by the Internet Archive. It allows you to view past versions of websites, which can be a valuable tool for OSINT investigations. For example, you can use the Wayback… read more »
-
Apr 3, 2024
Google recently disclosed two critical vulnerabilities (CVE-2024-29745 and CVE-2024-29748) affecting Pixel smartphones that are being actively exploited by forensic companies. These zero-day flaws, which haven’t yet been patched, could potentially allow unauthorised access to user data. The news comes more… read more »
-
Mar 31, 2024
On March 29, 2024, a serious security vulnerability was discovered in the XZ Utils library. This library is used by many Linux distributions for data compression. The vulnerability, which has been assigned the CVE identifier CVE-2024-3094, is a backdoor that… read more »