{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":403163356,"defaultBranch":"main","name":"Security-link-collection","ownerLogin":"beerisgood","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2021-09-04T21:58:33.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/9625159?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1630792713.9171069","currentOid":""},"activityList":{"items":[{"before":"bed59fbbabcfafde7a35ed28816249a76381a3f1","after":"b161770da78edbce73183c747b48d1cf129d568e","ref":"refs/heads/main","pushedAt":"2024-07-24T19:15:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Asus router insecurity\n\nhttps://www.bleepingcomputer.com/news/security/asus-warns-of-critical-remote-authentication-bypass-on-7-routers/","shortMessageHtmlLink":"Asus router insecurity"}},{"before":"deb44ebb75210368aabd8ee30f8277991044baae","after":"bed59fbbabcfafde7a35ed28816249a76381a3f1","ref":"refs/heads/main","pushedAt":"2024-07-16T04:22:04.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Avast browser\n\nhttps://palant.info/2024/07/15/how-insecure-is-avast-secure-browser/\r\n\r\nThx @jermanuts\r\nhttps://github.com/beerisgood/Security-link-collection/issues/1#issuecomment-2229418341","shortMessageHtmlLink":"Avast browser"}},{"before":"2497c6512d05f1f0b1981e3e8d495269ac7f916b","after":"deb44ebb75210368aabd8ee30f8277991044baae","ref":"refs/heads/main","pushedAt":"2024-07-14T14:12:38.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Pfsense\n\nhttps://www.bleepingcomputer.com/news/security/over-1-450-pfsense-servers-exposed-to-rce-attacks-via-bug-chain/","shortMessageHtmlLink":"Pfsense"}},{"before":"b5a152ec0ed6761b33663532ab6389a990ff2cfc","after":"2497c6512d05f1f0b1981e3e8d495269ac7f916b","ref":"refs/heads/main","pushedAt":"2024-07-14T12:40:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"More Netgear router insecurity \n\nhttps://www.bleepingcomputer.com/news/security/netgear-warns-users-to-patch-authentication-bypass-xss-router-flaws/","shortMessageHtmlLink":"More Netgear router insecurity"}},{"before":"54bdbfd28e8fb7ee5504c1823ce3bc9fb9ea9a75","after":"b5a152ec0ed6761b33663532ab6389a990ff2cfc","ref":"refs/heads/main","pushedAt":"2024-07-12T12:08:31.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Signal messenger downplays encryption key flaw\n\nhttps://www.bleepingcomputer.com/news/security/signal-downplays-encryption-key-flaw-fixes-it-after-x-drama/","shortMessageHtmlLink":"Signal messenger downplays encryption key flaw"}},{"before":"1ae9fa75459598d6a00064a827105f8167ddccd6","after":"54bdbfd28e8fb7ee5504c1823ce3bc9fb9ea9a75","ref":"refs/heads/main","pushedAt":"2024-06-30T18:29:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"D-Link router insecurity\n\nhttps://www.bleepingcomputer.com/news/security/hackers-exploit-critical-d-link-dir-859-router-flaw-to-steal-passwords/","shortMessageHtmlLink":"D-Link router insecurity"}},{"before":"ab9f7238f7aae3f6ff5143a0d92361c192df3ec2","after":"1ae9fa75459598d6a00064a827105f8167ddccd6","ref":"refs/heads/main","pushedAt":"2024-06-16T12:42:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Netgear Router InSecurity\n\nhttps://web.archive.org/web/20240610184918/https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/","shortMessageHtmlLink":"Netgear Router InSecurity"}},{"before":"2152c523cbe79981b681b1a2b727cbdbdcddc6f1","after":"ab9f7238f7aae3f6ff5143a0d92361c192df3ec2","ref":"refs/heads/main","pushedAt":"2024-05-22T08:13:28.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"more linux Insecurity\n\nhttps://ciq.com/whitepaper/vendor-kernels-bugs-stability/","shortMessageHtmlLink":"more linux Insecurity"}},{"before":"94d2f09985bd8cdde1fca577e351ebb2afb5b622","after":"2152c523cbe79981b681b1a2b727cbdbdcddc6f1","ref":"refs/heads/main","pushedAt":"2024-05-14T16:52:54.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Leveraging DNS Tunneling for Tracking and Scanning\n\nhttps://unit42.paloaltonetworks.com/three-dns-tunneling-campaigns/","shortMessageHtmlLink":"Leveraging DNS Tunneling for Tracking and Scanning"}},{"before":"b8876bc3093132929e589901456ccf1aeb0056fd","after":"94d2f09985bd8cdde1fca577e351ebb2afb5b622","ref":"refs/heads/main","pushedAt":"2024-05-14T16:25:54.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"WiFi Vulnerability: The SSID Confusion Attack\n\nhttps://www.top10vpn.com/research/wifi-vulnerability-ssid/","shortMessageHtmlLink":"WiFi Vulnerability: The SSID Confusion Attack"}},{"before":"6d7cf0c1a6939a6a24f71888f5a24cc34038393e","after":"b8876bc3093132929e589901456ccf1aeb0056fd","ref":"refs/heads/main","pushedAt":"2024-05-09T19:45:25.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"HTTP1 vs HTTP2 vs HTTP3 - A Deep Dive\n\nhttps://blog.bytebytego.com/p/http1-vs-http2-vs-http3-a-deep-dive","shortMessageHtmlLink":"HTTP1 vs HTTP2 vs HTTP3 - A Deep Dive"}},{"before":"722bb6d39b835495c08c85fcd25da9b3dc569bb0","after":"6d7cf0c1a6939a6a24f71888f5a24cc34038393e","ref":"refs/heads/main","pushedAt":"2024-05-08T09:32:59.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"more VPN Insecurity\n\nhttps://www.leviathansecurity.com/blog/tunnelvision","shortMessageHtmlLink":"more VPN Insecurity"}},{"before":"ea99730247ddd81a0d191589375781177ab128cc","after":"722bb6d39b835495c08c85fcd25da9b3dc569bb0","ref":"refs/heads/main","pushedAt":"2024-05-01T19:12:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Docker Hub: a place for millions of malicious repositories \n\nhttps://jfrog.com/blog/attacks-on-docker-with-millions-of-malicious-repositories-spread-malware-and-phishing-scams/","shortMessageHtmlLink":"Docker Hub: a place for millions of malicious repositories"}},{"before":"caed21456fcaefc8102f989f6c537ea06fcf35ec","after":"ea99730247ddd81a0d191589375781177ab128cc","ref":"refs/heads/main","pushedAt":"2024-04-27T19:01:28.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Messenger Tox and (more) Telegram InSecurity\n\nhttps://words.filippo.io/dispatches/telegram-ecdh/\r\nhttps://blog.tox.chat/2023/03/redesign-of-toxs-cryptographic-handshake/\r\n\r\nthx @jermanuts\r\nhttps://github.com/beerisgood/Security-link-collection/issues/1#issuecomment-2080969666","shortMessageHtmlLink":"Messenger Tox and (more) Telegram InSecurity"}},{"before":"6281b8b76b3a0a1d9b24d0ea1e5bf0590064a92e","after":"caed21456fcaefc8102f989f6c537ea06fcf35ec","ref":"refs/heads/main","pushedAt":"2024-04-15T21:54:15.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"About Apple threat notifications and protecting against mercenary spyware\n\nhttps://support.apple.com/102174","shortMessageHtmlLink":"About Apple threat notifications and protecting against mercenary spy…"}},{"before":"2fb0a4e47dda65a89298f0ec7c35bd6c51feb218","after":"6281b8b76b3a0a1d9b24d0ea1e5bf0590064a92e","ref":"refs/heads/main","pushedAt":"2024-04-14T10:32:27.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Nextcloud E2EE broken\n\nhttps://eprint.iacr.org/2024/546.pdf","shortMessageHtmlLink":"Nextcloud E2EE broken"}},{"before":"04a7b7b0418b3d200ab367eeea7ebc139c9ca2fb","after":"2fb0a4e47dda65a89298f0ec7c35bd6c51feb218","ref":"refs/heads/main","pushedAt":"2024-04-14T10:29:13.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"more VPN Insecurity\n\nhttps://gergelykalman.com/why-you-shouldnt-use-a-commercial-vpn-amateur-hour-with-windscribe.html\r\nhttps://educatedguesswork.org/posts/public-wifi/\r\n\r\nthx @jermanuts for the public wifi link\r\nhttps://github.com/beerisgood/Security-link-collection/issues/1#issuecomment-2053619461","shortMessageHtmlLink":"more VPN Insecurity"}},{"before":"59cfd9528d3885eb9844545f8ac5e7438a2b8dd8","after":"04a7b7b0418b3d200ab367eeea7ebc139c9ca2fb","ref":"refs/heads/main","pushedAt":"2024-03-20T19:41:29.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"IoT Device Security Specification 1.0\n\nhttps://csa-iot.org/newsroom/the-connectivity-standards-alliance-product-security-working-group-launches-the-iot-device-security-specification-1-0/","shortMessageHtmlLink":"IoT Device Security Specification 1.0"}},{"before":"57a5f8625ce13f708c251c4142e812827f6a36a1","after":"59cfd9528d3885eb9844545f8ac5e7438a2b8dd8","ref":"refs/heads/main","pushedAt":"2024-03-08T21:55:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Breaking the DECT Standard Cipher with Lower Time Cost\n\nhttps://eprint.iacr.org/2024/404","shortMessageHtmlLink":"Breaking the DECT Standard Cipher with Lower Time Cost"}},{"before":"678b041c56d5e54cd360a04681eb9063c6d356a1","after":"57a5f8625ce13f708c251c4142e812827f6a36a1","ref":"refs/heads/main","pushedAt":"2024-03-02T14:22:29.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Apple and the Digital Markets Act\n\nhttps://developer.apple.com/security/complying-with-the-dma.pdf","shortMessageHtmlLink":"Apple and the Digital Markets Act"}},{"before":"cfc9f91a3fa601b0ca263bbe845779bb8dd39a49","after":"678b041c56d5e54cd360a04681eb9063c6d356a1","ref":"refs/heads/main","pushedAt":"2024-02-27T19:02:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Router security problems \n\nhttps://routersecurity.org/consumerrouters.php\r\n\r\nThx @jermanuts\r\nhttps://github.com/beerisgood/Security-link-collection/issues/1#issuecomment-1966865844","shortMessageHtmlLink":"Router security problems"}},{"before":"ce9784ab49bf082f1549e63b0eea1419c3c9e362","after":"cfc9f91a3fa601b0ca263bbe845779bb8dd39a49","ref":"refs/heads/main","pushedAt":"2024-02-24T18:58:46.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"better Avast link\n\nhttps://www.bleepingcomputer.com/news/security/ftc-to-ban-avast-from-selling-browsing-data-for-advertising-purposes/","shortMessageHtmlLink":"better Avast link"}},{"before":"2162744eca3f32ed283dfc126ba523f3ae381406","after":"ce9784ab49bf082f1549e63b0eea1419c3c9e362","ref":"refs/heads/main","pushedAt":"2024-02-24T18:51:40.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Avast sell your data\n\nhttps://www.vice.com/en/article/qjdkq7/avast-antivirus-sells-user-browsing-data-investigation","shortMessageHtmlLink":"Avast sell your data"}},{"before":"92ee65dc250dd87813f0303d40cebc2d6c3030a8","after":"2162744eca3f32ed283dfc126ba523f3ae381406","ref":"refs/heads/main","pushedAt":"2024-02-22T16:50:26.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"iMessage PQ3’s external security reviews\n\nhttps://security.apple.com/assets/files/Security_analysis_of_the_iMessage_PQ3_protocol_Stebila.pdf\r\nhttps://security.apple.com/assets/files/A_Formal_Analysis_of_the_iMessage_PQ3_Messaging_Protocol_Basin_et_al.pdf","shortMessageHtmlLink":"iMessage PQ3’s external security reviews"}},{"before":"758a7a40360a7d0eeb6854656e0f80f46d2902f8","after":"92ee65dc250dd87813f0303d40cebc2d6c3030a8","ref":"refs/heads/main","pushedAt":"2024-02-21T17:40:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"iMessage PQ3 post-quantum cryptographic protocol\n\nhttps://security.apple.com/blog/imessage-pq3/","shortMessageHtmlLink":"iMessage PQ3 post-quantum cryptographic protocol"}},{"before":"f5849d86de5a06d1847b12b0cae45a54fc806686","after":"758a7a40360a7d0eeb6854656e0f80f46d2902f8","ref":"refs/heads/main","pushedAt":"2024-02-11T17:16:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"more browser extension insecurity\n\nhttps://courses.csail.mit.edu/6.857/2016/files/24.pdf","shortMessageHtmlLink":"more browser extension insecurity"}},{"before":"37d01c867ad99f853c1062006037062899120d13","after":"f5849d86de5a06d1847b12b0cae45a54fc806686","ref":"refs/heads/main","pushedAt":"2024-01-24T20:01:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"fail2ban sucks\n\nhttps://j3s.sh/thought/fail2ban-sux.html\r\n\r\nthanks @jermanuts\r\nhttps://github.com/beerisgood/Security-link-collection/issues/1#issuecomment-1908777565","shortMessageHtmlLink":"fail2ban sucks"}},{"before":"de6ea3d3b926793f34ba4f8d4052b226ba30535a","after":"37d01c867ad99f853c1062006037062899120d13","ref":"refs/heads/main","pushedAt":"2024-01-24T19:58:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Matrix metadata issues\n\nhttps://blog.erethon.com/blog/2023/06/21/what-happens-when-a-matrix-server-disappears/\r\n\r\nthanks @jermanuts\r\nhttps://github.com/beerisgood/Security-link-collection/issues/1#issuecomment-1908777565","shortMessageHtmlLink":"Matrix metadata issues"}},{"before":"fe353a82dc3832984e25bf56b9d1b39d35875888","after":"de6ea3d3b926793f34ba4f8d4052b226ba30535a","ref":"refs/heads/main","pushedAt":"2024-01-05T22:58:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Messenger app Converso\n\nhttps://crnkovic.dev/testing-converso/\r\n\r\nthanks @jermanuts\r\nhttps://github.com/beerisgood/Security-link-collection/issues/1#issuecomment-1879225884","shortMessageHtmlLink":"Messenger app Converso"}},{"before":"01752ab6ab8b0ff40a98d1e4ee5413d9801aca5c","after":"fe353a82dc3832984e25bf56b9d1b39d35875888","ref":"refs/heads/main","pushedAt":"2024-01-05T22:44:20.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"beerisgood","name":null,"path":"/beerisgood","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9625159?s=80&v=4"},"commit":{"message":"Matrix concerns\n\nhttps://anarc.at/blog/2022-06-17-matrix-notes/\r\n\r\nthx @jermanuts\r\nhttps://github.com/beerisgood/Security-link-collection/issues/1#issuecomment-1879225884","shortMessageHtmlLink":"Matrix concerns"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wNy0yNFQxOToxNTo1MC4wMDAwMDBazwAAAASIS_WV","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wNy0yNFQxOToxNTo1MC4wMDAwMDBazwAAAASIS_WV","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wMS0wNVQyMjo0NDoyMC4wMDAwMDBazwAAAAPY8Zrc"}},"title":"Activity · beerisgood/Security-link-collection"}