Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: logs Clear Filter

When root meets immutable: OpenBSD chflags vs. log tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

When Root Meets Immutable: OpenBSD Chflags vs. Log Tampering

Why ISO 27001 Demands Immutable Logs (Without Actually Saying So) # ISO 27001 is like that careful lawyer who never says exactly what they mean – it tells you what needs to be achieved, not how to do it. When it comes to logging, this is particularly telling: Control A.12.4.2 simply states that “logging information and logging facilities shall be protected against tampering and unauthorized access.” Period. How? That’s your problem to solve. But anyone who’s ever had to investigate a security

Topics: log logs root secure var

Show HN: Timep – a next-gen profiler and flamegraph-generator for bash code

timep timep is an efficient and state-of-the-art trap-based time profiler for bash code. timep generates a per-command execution time profile for the bash code being profiled. As it generates this profile, timep logs command runtimes+metadata hierarchically based on both function and subshell nesting depth, mapping and recreating the complete full call-stack tree for the bash code being profiled. BUILTIN FLAMEGRAPH GENERATOR: One standout feature of timep is that, in addition to the time profi

Judge Rules That Newspaper Is Allowed to Search Through Users' ChatGPT Logs

Amid its long-running copyright infringement lawsuit against OpenAI, the paper of record will soon have access to all of OpenAI's user archives — including the stuff that was deleted. As Ars Technica reports, the federal judge presiding over the lawsuit by the New York Times against OpenAI has granted the newspaper and its co-plaintiffs, the New York Daily News and the Center for Investigative Reporting, access to the AI company's logs to see exactly how much copyright was infringed. In its pr

Judge Says Requiring ChatGPT to Save Chat Logs Is Not a ‘Mass Surveillance Program’

OpenAI and some of its users have objected to a court order that requires the company to indefinitely maintain all of ChatGPT’s chat logs as part of an ongoing copyright lawsuit, claiming that holding onto such records amounts to a “nationwide mass surveillance program.” The court was not moved. Judge Ona Wang, who initially issued the order to retain all data from the popular chatbot, rejected multiple requests to overturn the decision—though OpenAI has vowed to continue to fight the order, acc

A huge trove of leaked Black Basta chat logs expose the ransomware gang’s key members and victims

A trove of chat logs allegedly belonging to the Black Basta ransomware group has leaked online, exposing key members of the prolific Russia-linked gang. The chat logs, which include over 200,000 messages spanning from September 18, 2023, to September 28, 2024, were shared with threat intelligence company Prodaft by a leaker. The cybersecurity firm says the leak comes amid “internal conflict” within the Black Basta group after some members allegedly failed to provide its victims with functional

Obscura VPN – Privacy that's more than a promise

Unlike VPNs with a “no-logs” policy, Obscura is provably private by design. Even “no-logs” VPNs see both your identity and your internet activity, meaning you have to blindly trust their pinky-promise for privacy. This is exactly why some privacy-conscious folks will tell you not to use a VPN at all. Obscura is different – we never see your decrypted internet packets. It’s simply impossible for us to log your internet activity, even if we were compelled to, or if our servers were compromised.