“A group is a system object — much the same as a user — except that no one will ever log in to the system as a group. The power of groups is in how they, like users, can be “assigned” to files or directories, allowing any group members to share the group powers.”— David Clinton, hackernoon.com
“Weak logic, inconsistencies and alienation from the people are common features of authoritarianism. The relentless attempts of totalitarian regimes to prevent free thought and new ideas and the persistent assertion of their own rightness bring on them an intellectual stasis which they project on to…”— Aung San Suu Kyi, amazon.com
“Started in 2014, monero is very different. It encrypts the recipient’s address on its blockchain and generates fake addresses to obscure the real sender. It also obscures the amount of the transaction.”— Olga Kharif, bloomberg.com
“We may disclose your personal information to our subsidiaries, affiliated companies, agents, businesses, or service providers who process your personal information on our behalf in providing the Service to you.”— Meta Mask, metamask.io
“We built an AWS Lambda whose sole job is to manage these AppRoles in Vault when a resource is created, updated, or deleted with CloudFormation. Once a Docker container starts up, we set up an ENTRYPOINT script that uses the credentials set by the Lambda function to retrieve a Vault token and access…”— Natacha Springer, kickstarter.engineering
“Furthermore CircleCI customers frequently either include credentials in source code or as environment variables in CircleCI. Set these, and you are trusting that CircleCI won't get compromised, or at least, your application is at most as secure as CircleCI is.”— Kevin Burke, kev.inburke.com
“There is a primal reassurance in being touched, in knowing that someone else, someone close to you, wants to be touching you. There is a bone-deep security that goes with the brush of a human hand, a silent, reflex-level affirmation that someone is near, that someone cares.”— Jim Butcher, amazon.com
“Your vaults aren’t just hidden; they’re completely removed from your devices as long as Travel Mode is on. That includes every item and all your encryption keys. There are no traces left for anyone to find. So even if you’re asked to unlock 1Password by someone at the border, there’s no way for them…”— Rick Fillion, blog.agilebits.com
“We observed encryption keys, cookies, passwords, chunks of POST data and even HTTPS requests for other major cloudflare-hosted sites from other users.”— Tavis Ormandy, bugs.chromium.org
“Each CSP directive lets you indicate which origins are trusted by using a whitelist-based approach. User agents which support CSP will avoid fetching resources that don’t match your server’s CSP directives. This means our server can determine, at a granular level, which origins are allowed for which…”— Nicolás Bevacqua, ponyfoo.com
“What we have to discover is that there is no safety, that seeking is painful, and that when we imagine that we have found it, we don’t like it.”— Alan Watts, amazon.com
“The desire for security and the feeling of insecurity are the same thing. To hold your breath is to lose your breath. A society based on the quest for security is nothing but a breath-retention contest in which everyone is as taut as a drum and as purple as a beet.”— Alan Watts, amazon.com
“Fuck security. Give us the mess. Give us the big splash of life and color and failure. It’s beautiful.”— Adam Gnade, amazon.com
“Members of a shadowy hacker group that calls itself New World Hackers claimed responsibility for the attack via Twitter, though that claim could not be verified. They said they organized networks of connected devices to create a massive botnet that threw a monstrous 1.2 trillion bits of data every s…”— The Associated Press, cbc.ca
“Learn to come to terms with the fact that any issues other people have with you is none of your business.”— Gloria Atanmo, gumroad.com
“A capitalism shaped by the few and unaccountable to the many is a threat to all. Economies are more successful when we close the gap between rich and poor and growth is broadly based. A world in which 1% of humanity controls as much wealth as the other 99% will never be stable.”— Barack Obama, economist.com
“You'll have a good, secure life when being alive means more to you than security, love more than money, your freedom more than public or partisan opinion, when the mood of Beethoven's or Bach's music becomes the mood of your whole life, when your thinking is in harmony, and no longer in conflict, wi…”— Wilhelm Reich, amazon.com
“Jealousy is born out of our need to feel secure, worthy or safe in our relationship.”— Stanley Steel, amazon.com
“I’ve been doing a little bit of research into ways to misuse browser history and cache and came across a very simple technique for tracking users without the need for cookies.”— Josh Duck, joshduck.com
“And then one student said that happiness is what happens when you go to bed on the hottest night of the summer, a night so hot you can’t even wear a tee-shirt and you sleep on top of the sheets instead of under them, although try to sleep is probably more accurate. And then at some point late, late,…”— Paul Schmidtberger, amazon.com