You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Instantly share code, notes, and snippets.
🚀
Floating through space 🌌 🌎
Angad Behl
slashtechno
🚀
Floating through space 🌌 🌎
Just a high school student trying to live an interesting life. Currently contracting at @hackclub doing software development.
g.co, Google's official URL shortcut (update: or Google Workspace's domain verification, see bottom), is compromised. People are actively having their Google accounts stolen.
Someone just tried the most sophisticated phishing attack I've ever seen. I almost fell for it. My mind is a little blown.
Someone named "Chloe" called me from 650-203-0000 with Caller ID saying "Google". She sounded like a real engineer, the connection was super clear, and she had an American accent. Screenshot.
They said that they were from Google Workspace and someone had recently gained access to my account, which they had blocked. They asked me if I had recently logged in from Frankfurt, Germany and I said no.
I asked if they can confirm this is Google calling by emailing me from a Google email and they said sure and sent me this email and told me to look for a case number in it, which I saw in
Secure Encrypted Storage Setup with LUKS2, TPM2, FIDO2, and Btrfs
Secure Encrypted Storage Setup with LUKS2, TPM2, FIDO2, and Btrfs
Disclaimer: Use this guide at your own discretion. The author is not responsible for any data loss or security breaches that may occur. Always ensure you understand each step and its implications before proceeding.
This guide walks you through setting up a secure external drive, perfect for backing up sensitive data, securely handing over large data sets, or storing important files. It covers creating an encrypted drive that’s easy to unlock with trusted devices, such as a security key, while remaining highly secure if misplaced. Ideal for safeguarding personal data or business files, it offers practical recovery steps to ensure access even if you change devices.
By following this guide, you will have established a secure and user-friendly encrypted storage solution that leverages:
LUKS2 Encryption: Provides robust disk encryption.
TPM2 Integration: Enables automatic unlocking on trusted hardware.
Run in a git directory to print the most recent github commit link for that directory
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Notice: You can share this, however be cautious because it might be patched
⚠️Having this exploit something that few people know about reduces all our chances of getting in trouble⚠️
Vendor: Instructure Product: Canvas Versions affected: Unknown (No version indication on website) (Working as of Feb 6 2023) Attack type: Remote Severity: Low Impact: