Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: opens Clear Filter

OpenSSH Post-Quantum Cryptography

OpenSSH Post-Quantum Cryptography OpenSSH supports a number of cryptographic key agreement algorithms considered to be safe against attacks from quantum computers. We recommend that all SSH connections use these algorithms. OpenSSH has offered post-quantum key agreement (KexAlgorithms) by default since release 9.0 (2022), initially via the sntrup761x25519-sha512 algorithm. More recently, in OpenSSH 9.9, we have added a second post-quantum key agreement mlkem768x25519-sha256 and it was made the

OpenStore’s demise marks endgame for once-booming e-commerce aggregator market

When venture capitalist Keith Rabois got into e-commerce, he couldn't stop buying brands. Now, everything must go. OpenStore, co-founded by Rabois in 2021, is shutting down nearly all of the 40-plus Shopify stores it acquired, and it's in the process of liquidating any remaining inventory by offering steep discounts to move merchandise. Earlier this week, the company announced it plans to focus solely on growing Jack Archer, the menswear brand it bought for $837,000 in 2022. The website addres

This handy Linux tool snitches on sneaky apps - here's why and how it's helpful

Jack Wallen / Elyse Betters Picaro / ZDNET OpenSnitch is a Linux port of the popular MacOS app Little Snitch. This app is essentially an application firewall that tracks network requests from apps, so you can create rules to block or allow those requests. Why is that important? Also: 7 things every Linux beginner should know before downloading their first distro Say, for example, that you've installed a Linux app that shouldn't require internet access (those do still exist). You're using tha

This Linux app alerts you when an app tries to connect to the internet - and why that matters

Jack Wallen / Elyse Betters Picaro / ZDNET OpenSnitch is a Linux port of the popular MacOS app Little Snitch. This app is essentially an application firewall that tracks network requests from apps, so you can create rules to block or allow those requests. Why is that important? Also: 7 things every Linux beginner should know before downloading their first distro Say, for example, that you've installed a Linux app that shouldn't require internet access (those do still exist). You're using tha

In the long run, GPL code becomes irrelevant (2015)

I wrote this in response to a comment thread on hackernews Defending GCC considered futile. There's been a megathread in the last week about whether Emacs should support LLVM, with Richard Stallman and now Eric Raymond joining the frey. Personally, I use a BSD license for all my code and contribute to BSD/Apache licensed software whenever I can. I do it because I think opensource will eventually eat the world anyway, and I think when it does a BSD/Apache implementation of any given piece of sof

PerfektBlue Bluetooth flaws impact Mercedes, Volkswagen, Skoda cars

Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda. OpenSynergy confirmed the flaws last year in June and released patches to customers in September 2024 but many automakers have yet to push the corrective firmware updates. At least one major OEM learned only recent