<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~files/feed-premium.xsl"?>
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:feedpress="https://feed.press/xmlns" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" version="2.0">
  <channel>
    <feedpress:locale>en</feedpress:locale>
    <atom:link rel="hub" href="https://feedpress.superfeedr.com/"/>
    <image>
      <link>https://feedpress.me/techsnapvid</link>
      <title><![CDATA[TechSNAP Video]]></title>
      <url>https://static.feedpress.com/logo/techsnapvid-5f5bfc33d5982.png</url>
    </image>
    <itunes:category text="Technology">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <media:category scheme="http://www.itunes.com/dtds/podcast-1.0.dtd">Technology/Tech News</media:category>
    <media:rating>nonadult</media:rating>
    <media:description type="plain">TechSNAP our weekly Systems, Network, and Administration Podcast. </media:description>
    <media:credit role="author">Jupiter Broadcasting</media:credit>
    <media:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </media:keywords>
    <media:copyright>Jupiter Broadcasting</media:copyright>
    <copyright>Jupiter Broadcasting</copyright>
    <dc:creator>Jupiter Broadcasting</dc:creator>
    <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
    <itunes:explicit>false</itunes:explicit>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:owner>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
      <itunes:name>Jupiter Broadcasting</itunes:name>
    </itunes:owner>
    <itunes:summary>TechSNAP our weekly Systems, Network, and Administration Podcast. Every week TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.</itunes:summary>
    <itunes:subtitle>TechSNAP our weekly Systems, Network, and Administration Podcast. </itunes:subtitle>
    <googleplay:email>chris@jupiterbroadcasting.com</googleplay:email>
    <googleplay:description>TechSNAP our weekly Systems, Network, and Administration Podcast. Every week TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.</googleplay:description>
    <googleplay:explicit>no</googleplay:explicit>
    <googleplay:author>Jupiter Broadcasting</googleplay:author>
    <atom:link rel="self" href="https://feedpress.me/techsnapvid"/>
    <title>TechSNAP Video</title>
    <link>http://www.jupiterbroadcasting.com/</link>
    <language>en</language>
    <generator>FeedPress (https://feed.press)</generator>
    <description>TechSNAP our weekly Systems, Network, and Administration Podcast. </description>
    <item>
      <title>All Good Things | TechSNAP 430</title>
      <itunes:title>All Good Things | TechSNAP 430</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5992</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5992</guid>
      <id>1</id>
      <pubDate>Fri, 29 May 2020 00:20:00 +0200</pubDate>
      <description>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</description>
      <content:encoded><![CDATA[<p>It&#39;s a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</p>

<p><p>Plus our favorite features from Fedora 32, and why Wes loves DNF.</p><p>Links:</p><ul><li><a href="https://fedoramagazine.org/whats-new-fedora-32-workstation/" title="What's new in Fedora 32 Workstation" rel="nofollow">What's new in Fedora 32 Workstation</a>
</li><li><a href="https://fedoraproject.org/wiki/Releases/32/ChangeSet" title="Fedora 32 ChangeSet" rel="nofollow">Fedora 32 ChangeSet</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/05/linux-distro-review-fedora-workstation-32/" title="Linux distro review: Fedora Workstation 32" rel="nofollow">Linux distro review: Fedora Workstation 32</a>
</li><li><a href="https://techsnap.systems/428" title="TechSNAP 428: RAID Reality Check" rel="nofollow">TechSNAP 428: RAID Reality Check</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/05/zfs-versus-raid-eight-ironwolf-disks-two-filesystems-one-winner/" title="ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner" rel="nofollow">ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner</a>
</li><li><a href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/" title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow">Understanding RAID: How performance scales from one disk to eight</a>
</li><li><a href="https://2.5admins.com/" title="Find Jim on 2.5 Admins" rel="nofollow">Find Jim on 2.5 Admins</a></li><li><a href="https://linuxunplugged.com/" title="Find Wes on LINUX Unplugged" rel="nofollow">Find Wes on LINUX Unplugged</a></li><li><a href="https://www.youtube.com/watch?v=n7La9Z-XrCE" title="TechSNAP 1: First episode of TechSNAP (in 2011!)" rel="nofollow">TechSNAP 1: First episode of TechSNAP (in 2011!)</a>
</li><li><a href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/" title="TechSNAP 300: End of the Allan and Chris era (2017)" rel="nofollow">TechSNAP 300: End of the Allan and Chris era (2017)</a>
</li><li><a href="https://www.jupiterbroadcasting.com/106086/the-next-generation-techsnap-301/" title="TechSNAP 301: Enter Dan and Wes " rel="nofollow">TechSNAP 301: Enter Dan and Wes </a>
</li><li><a href="https://www.jupiterbroadcasting.com/120317/a-farewell-to-dan-techsnap-347/" title="TechSNAP 347: A Farewell to Dan" rel="nofollow">TechSNAP 347: A Farewell to Dan</a>
</li><li><a href="https://www.jupiterbroadcasting.com/120687/server-neglect-techsnap-348/" title="TechSNAP 348: Chris is back!" rel="nofollow">TechSNAP 348: Chris is back!</a>
</li><li><a href="https://www.jupiterbroadcasting.com/128101/the-future-of-http-techsnap-389/" title="TechSNAP 389: Jim's first time as a guest" rel="nofollow">TechSNAP 389: Jim's first time as a guest</a>
</li><li><a href="https://techsnap.systems/390" title="TechSNAP 390: Jim's second guest appearance" rel="nofollow">TechSNAP 390: Jim's second guest appearance</a>
</li><li><a href="https://www.jupiterbroadcasting.com/128656/back-to-our-roots-techsnap-393/" title="TechSNAP 393: Chris says goodbye" rel="nofollow">TechSNAP 393: Chris says goodbye</a>
</li><li><a href="https://www.jupiterbroadcasting.com/128941/the-acme-era-techsnap-395/" title="TechSNAP 395: Jim joins the show" rel="nofollow">TechSNAP 395: Jim joins the show</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13584060/techsnap-0430.mp4" length="726629602" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.
Plus our favorite features from Fedora 32, and why Wes loves DNF.Links:What's new in Fedora 32…</itunes:subtitle>
      <itunes:summary>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</itunes:summary>
    </item>
    <item>
      <title>Curious About Caddy | TechSNAP 429</title>
      <itunes:title>Curious About Caddy | TechSNAP 429</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5937</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5937</guid>
      <id>2</id>
      <pubDate>Fri, 15 May 2020 00:20:00 +0200</pubDate>
      <description>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</description>
      <content:encoded><![CDATA[<p><p>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel&#39;s Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</p><p>Links:</p><ul><li><a href="https://arstechnica.com/gadgets/2020/05/caddy-offers-tls-https-and-more-in-one-dependency-free-go-web-server/" title="Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server" rel="nofollow">Caddy offers TLS, HTTPS, and more in one dependency-free Go Web server</a>
</li><li><a href="https://caddyserver.com/v2" title="Caddy 2" rel="nofollow">Caddy 2</a>
</li><li><a href="https://github.com/caddyserver/caddy/wiki/v2:-Improvements" title="Caddy v2 Improvements [slightly out of date]" rel="nofollow">Caddy v2 Improvements [slightly out of date]</a></li><li><a href="https://github.com/caddyserver/caddy/issues/2786" title="Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy" rel="nofollow">Proposal: Permanently change all proprietary licensing to open source · Issue #2786 · caddyserver/caddy</a>
</li><li><a href="https://github.com/caddyserver/caddy/pull/1866" title="Revert "Implement Caddy-Sponsors HTTP response header" by lol768 · Pull Request #1866 · caddyserver/caddy" rel="nofollow">Revert "Implement Caddy-Sponsors HTTP response header" by lol768 · Pull Request #1866 · caddyserver/caddy</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/05/intels-comet-lake-desktop-cpus-are-here/" title="Intel’s 10th generation desktop CPUs have arrived—still on 14nm" rel="nofollow">Intel’s 10th generation desktop CPUs have arrived—still on 14nm</a>
</li><li><a href="https://www.pcgamer.com/intel-comet-lake-release-date-specs-performance/" title="Intel Comet Lake 10th Gen CPU release date, specs, price, and performance" rel="nofollow">Intel Comet Lake 10th Gen CPU release date, specs, price, and performance</a>
</li><li><a href="https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-desktop-brief.html" title="10th Gen Intel® Core™ Desktop Processors" rel="nofollow">10th Gen Intel® Core™ Desktop Processors</a>
</li><li><a href="https://arstechnica.com/tech-policy/2020/05/millions-of-gps-devices-at-risk-from-fcc-approved-5g-network-military-says/" title="US military is furious at FCC over 5G plan that could interfere with GPS" rel="nofollow">US military is furious at FCC over 5G plan that could interfere with GPS</a>
</li><li><a href="https://www.cnet.com/news/the-pentagons-fight-to-kill-ligados-5g-network/" title="The Pentagon's fight to kill Ligado's 5G network" rel="nofollow">The Pentagon's fight to kill Ligado's 5G network</a>
</li><li><a href="https://www.fcc.gov/document/fcc-approves-ligado-l-band-application-facilitate-5g-iot" title="FCC Approves Ligado L-Band Application to Facilitate 5G & IoT" rel="nofollow">FCC Approves Ligado L-Band Application to Facilitate 5G &amp; IoT</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13539657/techsnap-0429.mp4" length="430208352" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.Links:Caddy…</itunes:subtitle>
      <itunes:summary>Jim and Wes take the latest release of the Caddy web server for a spin, investigate Intel's Comet Lake desktop CPUs, and explore the fight over 5G between the US Military and the FCC.</itunes:summary>
    </item>
    <item>
      <title>RAID Reality Check | TechSNAP 428</title>
      <itunes:title>RAID Reality Check | TechSNAP 428</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5863</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5863</guid>
      <id>3</id>
      <pubDate>Fri, 01 May 2020 00:21:00 +0200</pubDate>
      <description>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</description>
      <content:encoded><![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p><p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus" title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a>
</li><li><a href="https://www.phoronix.com/scan.php?page=article&item=amd-epyc-7f52&num=1" title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a>
</li><li><a href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/" title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow">Understanding RAID: How performance scales from one disk to eight</a>
</li><li><a href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/" title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a>
</li><li><a href="https://isbgpsafeyet.com/" title="Is BGP safe yet?" rel="nofollow">Is BGP safe yet?</a>
</li><li><a href="https://blog.cloudflare.com/rpki/" title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow">RPKI - The required cryptographic upgrade to BGP routing</a>
</li><li><a href="https://trstringer.com/systemd-timer-vs-cronjob/" title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a>
</li><li><a href="https://wiki.archlinux.org/index.php/Systemd/Timers" title="systemd/Timers - ArchWiki" rel="nofollow">systemd/Timers - ArchWiki</a>
</li><li><a href="https://www.freedesktop.org/software/systemd/man/systemd.time.html" title="systemd.time (Time format docs)" rel="nofollow">systemd.time (Time format docs)</a>
</li><li><a href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html" title="systemd.timer (Unit docs)" rel="nofollow">systemd.timer (Unit docs)</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13499616/techsnap-0428.mp4" length="503328868" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We dive deep into the world of RAID, and discuss how to choose the right topology to optimize performance and resilience.
Plus Cloudflare steps up its campaign to secure BGP, and why you might want…</itunes:subtitle>
      <itunes:summary>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</itunes:summary>
    </item>
    <item>
      <title>Gigahertz Games | TechSNAP 427</title>
      <itunes:title>Gigahertz Games | TechSNAP 427</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5788</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5788</guid>
      <id>4</id>
      <pubDate>Fri, 17 Apr 2020 00:20:00 +0200</pubDate>
      <description>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</description>
      <content:encoded><![CDATA[<p>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</p>

<p><p>Plus Intel&#39;s surprisingly overclockable laptop CPU, why you shouldn&#39;t freak out about 5G, and the incredible creativity of the Demoscene.</p><p>Links:</p><ul><li><a href="https://arstechnica.com/gadgets/2020/04/asus-rog-zephyrus-g14-ryzen-7nm-mobile-is-here-and-its-awesome/" title="Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome" rel="nofollow">Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome</a></li><li><a href="https://arstechnica.com/gadgets/2020/04/linux-on-laptops-asus-zephyrus-g14-with-ryzen-9-4900hs/" title="Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS" rel="nofollow">Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS</a></li><li><a href="https://arstechnica.com/gadgets/2020/04/intels-10th-generation-h-series-laptop-cpus-break-5-ghz/" title="Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica" rel="nofollow">Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica</a></li><li><a href="https://arstechnica.com/gadgets/2020/04/fcc-will-vote-on-rules-for-1-2ghz-of-new-wi-fi-6e-spectrum-on-april-23/" title="Wi-Fi 6E becomes official—the FCC will vote on rules this month" rel="nofollow">Wi-Fi 6E becomes official—the FCC will vote on rules this month</a></li><li><a href="https://arstechnica.com/science/2020/04/in-the-uk-pandemic-panic-has-people-burning-cell-phone-towers/" title="Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers" rel="nofollow">Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers</a></li><li><a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-freebsd-12-1-release/" title="Not-actually Linux distro review: FreeBSD 12.1-RELEASE" rel="nofollow">Not-actually Linux distro review: FreeBSD 12.1-RELEASE</a></li><li><a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" title="Not actually Linux distro review deux: GhostBSD" rel="nofollow">Not actually Linux distro review deux: GhostBSD</a></li><li><a href="https://en.wikipedia.org/wiki/MOD_(file_format)" title="MOD (file format) - Wikipedia" rel="nofollow">MOD (file format) - Wikipedia</a></li><li><a href="https://www.youtube.com/watch?v=UspabZp09_Q" title="AT&T.MOD (YouTube)" rel="nofollow">AT&amp;T.MOD (YouTube)</a></li><li><a href="https://www.youtube.com/watch?v=RDDkGZWkEn0" title="DJ Moses Rising—Ice Cream Trance (YouTube)" rel="nofollow">DJ Moses Rising—Ice Cream Trance (YouTube)</a></li><li><a href="https://www.youtube.com/watch?v=Y3n3c_8Nn2Y" title="Farbrausch—The Product (64K Intro, 2000)" rel="nofollow">Farbrausch—The Product (64K Intro, 2000)</a></li><li><a href="https://www.youtube.com/watch?v=gNOJhEX9YT0" title="Farbrausch—Poem to a Horse (64K Intro, 2002)" rel="nofollow">Farbrausch—Poem to a Horse (64K Intro, 2002)</a></li><li><a href="http://demoscene-the-art-of-coding.net/2020/04/15/breakthrough-finland-accepts-demoscene-on-their-national-list-of-intangible-cultural-heritage-of-humanity/" title="Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity" rel="nofollow">Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13457075/techsnap-0427.mp4" length="717232298" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.
Plus Intel's surprisingly overclockable laptop CPU, why you shouldn't…</itunes:subtitle>
      <itunes:summary>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</itunes:summary>
    </item>
    <item>
      <title>Storage Stories | TechSNAP 426</title>
      <itunes:title>Storage Stories | TechSNAP 426</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5708</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5708</guid>
      <id>5</id>
      <pubDate>Fri, 03 Apr 2020 00:21:00 +0200</pubDate>
      <description>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.</description>
      <content:encoded><![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p><p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/" title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a href="https://www.phoronix.com/scan.php?page=article&item=linux-56-features&num=1" title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a href="https://lwn.net/Articles/793585/" title="fs: New zonefs file system" rel="nofollow">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/" title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/" title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a href="https://www.zonedstorage.io/introduction/linux-support/" title="Linux Kernel Support - ZonedStorage.io" rel="nofollow">Linux Kernel Support - ZonedStorage.io</a></li><li><a href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html" title="dm-zoned" rel="nofollow">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a href="https://zonedstorage.io/linux/dm/#dm-zoned" title="Device Mapper - ZonedStorage.io" rel="nofollow">Device Mapper - ZonedStorage.io</a></li><li><a href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives" title=" What are PMR and SMR hard disk drives?" rel="nofollow"> What are PMR and SMR hard disk drives?</a></li><li><a href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing" title="Beware of SMR drives in PMR clothing" rel="nofollow">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/" title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/" title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=New-exFAT-For-Linux-5.7" title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/" title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch" title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13417765/techsnap-0426.mp4" length="438503243" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic…</itunes:subtitle>
      <itunes:summary>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.</itunes:summary>
    </item>
    <item>
      <title>Ryzen Gets Real | TechSNAP 425</title>
      <itunes:title>Ryzen Gets Real | TechSNAP 425</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5622</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5622</guid>
      <id>6</id>
      <pubDate>Fri, 20 Mar 2020 00:20:00 +0100</pubDate>
      <description>We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.</description>
      <content:encoded><![CDATA[<p>We take a look at AMD&#39;s upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04&#39;s approach to ZFS on root. </p>

<p><p>Plus Let&#39;s Encrypt&#39;s certificate validation mix-up, Intel&#39;s questionable new power supply design, and more.</p><p>Links:</p><ul><li><a href="https://arstechnica.com/information-technology/2020/03/lets-encrypt-holds-off-on-revocation-of-certificates/" title="Let's Encrypt changes course on certificate revocation" rel="nofollow">Let's Encrypt changes course on certificate revocation</a>
</li><li><a href="https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864" title="Revoking certain certificates on March 4" rel="nofollow">Revoking certain certificates on March 4</a>
</li><li><a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1619179#c7" title="Let's Encrypt: Incomplete revocation for CAA rechecking bug" rel="nofollow">Let's Encrypt: Incomplete revocation for CAA rechecking bug</a></li><li><a href="https://github.com/letsencrypt/boulder/pull/4690/files#diff-2285b0268539881fde96d9928ecef358R1412" title="Pass authzModel by value, not reference" rel="nofollow">Pass authzModel by value, not reference</a>
</li><li><a href="https://jasonofflorida.com/the-complete-guide-to-caa-records/" title="The Complete Guide to CAA Records" rel="nofollow">The Complete Guide to CAA Records</a></li><li><a href="https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization" title="DNS Certification Authority Authorization" rel="nofollow">DNS Certification Authority Authorization</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/03/amds-7nm-ryzen-4000-laptop-processors-are-finally-here/" title="AMD's 7nm Ryzen 4000 laptop processors are finally here" rel="nofollow">AMD's 7nm Ryzen 4000 laptop processors are finally here</a>
</li><li><a href="https://www.pcworld.com/article/3518831/how-intels-changing-the-future-of-power-supplies-with-its-atx12vo-spec.html" title="How Intel is changing the future of power supplies with its ATX12VO spec" rel="nofollow">How Intel is changing the future of power supplies with its ATX12VO spec</a>
</li><li><a href="https://www.intel.com/content/dam/www/public/us/en/documents/guides/single-rail-power-supply-platform-atx12vo-design-guide.pdf" title="Single Rail Power Supply ATX12VO Design Guide" rel="nofollow">Single Rail Power Supply ATX12VO Design Guide</a></li><li><a href="https://www.ixsystems.com/blog/freenas-truenas-unification/" title="FreeNAS and TrueNAS are Unifying" rel="nofollow">FreeNAS and TrueNAS are Unifying</a></li><li><a href="https://www.youtube.com/watch?v=0gK2g8g0btI" title="FreeNAS and TrueNAS are Unifying [Video Announcement]" rel="nofollow">FreeNAS and TrueNAS are Unifying [Video Announcement]</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/03/ubuntu-20-04s-zsys-adds-zfs-snapshots-to-package-management/" title="Ubuntu 20.04's zsys adds ZFS snapshots to package management" rel="nofollow">Ubuntu 20.04's zsys adds ZFS snapshots to package management</a>
</li><li><a href="https://github.com/ubuntu/zsys" title="ubuntu/zsys: zsys daemon and client for zfs systems" rel="nofollow">ubuntu/zsys: zsys daemon and client for zfs systems</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13372492/techsnap-0425.mp4" length="459020696" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root. 
Plus Let's Encrypt's certificate validation mix-up,…</itunes:subtitle>
      <itunes:summary>We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.</itunes:summary>
    </item>
    <item>
      <title>AMD Inside | TechSNAP 424</title>
      <itunes:title>AMD Inside | TechSNAP 424</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5523</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5523</guid>
      <id>7</id>
      <pubDate>Fri, 06 Mar 2020 00:20:00 +0100</pubDate>
      <description>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.</description>
      <content:encoded><![CDATA[<p>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.  </p>

<p><p>Plus Mozilla&#39;s rollout of DNS over HTTPS has begun, a big milestone for Let&#39;s Encrypt, and more.</p><p>Links:</p><ul><li><a href="https://blog.mozilla.org/blog/2020/02/25/firefox-continues-push-to-bring-dns-over-https-by-default-for-us-users/" title="Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog" rel="nofollow">Firefox continues push to bring DNS over HTTPS by default for US users - The Mozilla Blog</a>
</li><li><a href="https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/" title="The Facts: Mozilla’s DNS over HTTPs (DoH)" rel="nofollow">The Facts: Mozilla’s DNS over HTTPs (DoH)</a>
</li><li><a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" title="Security/DOH-resolver-policy - MozillaWiki" rel="nofollow">Security/DOH-resolver-policy - MozillaWiki</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/02/lets-encrypt-issued-its-billionth-certificate-today/" title="HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica" rel="nofollow">HTTPS for all: Let’s Encrypt reaches one billion certificates issued | Ars Technica</a>
</li><li><a href="https://letsencrypt.org/2020/02/27/one-billion-certs.html" title="Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates" rel="nofollow">Let’s Encrypt Has Issued a Billion Certificates - Let’s Encrypt - Free SSL/TLS Certificates</a>
</li><li><a href="https://blog.acolyer.org/2020/02/12/lets-encrypt-an-automated-certificate-authority-to-encrypt-the-entire-web/" title="Let’s Encrypt: A History - The Morning Paper" rel="nofollow">Let’s Encrypt: A History - The Morning Paper</a>
</li><li><a href="https://www.theregister.co.uk/2020/02/20/apple_shorter_cert_lifetime/" title="Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register" rel="nofollow">Apple drops a bomb on long-life HTTPS certificates: Safari to snub new security certs valid for more than 13 months • The Register</a>
</li><li><a href="https://scotthelme.co.uk/ballot-sc22-reduce-certificate-lifetimes/" title="Ballot SC22: Reduce Certificate Lifetimes" rel="nofollow">Ballot SC22: Reduce Certificate Lifetimes</a></li><li><a href="https://www.laptopmag.com/news/googles-fear-of-microsoft-edge-is-revealing-its-bad-side" title="Google Chrome’s fear of Microsoft Edge is revealing its bad side" rel="nofollow">Google Chrome’s fear of Microsoft Edge is revealing its bad side</a>
</li><li><a href="https://www.windowscentral.com/microsoft-shares-roadmap-new-microsoft-edges-upcoming-features" title="Microsoft shares a roadmap for the new Microsoft Edge" rel="nofollow">Microsoft shares a roadmap for the new Microsoft Edge</a>
</li><li><a href="https://techcommunity.microsoft.com/t5/discussions/top-feedback-summary-for-march-4/m-p/1209808" title="Microsoft Edge: Top Feedback Summary for March 4" rel="nofollow">Microsoft Edge: Top Feedback Summary for March 4</a>
</li><li><a href="https://www.microsoftedgeinsider.com/en-us/download/" title="Download Microsoft Edge Insider Channels" rel="nofollow">Download Microsoft Edge Insider Channels</a>
</li><li><a href="https://arstechnica.com/information-technology/2020/02/flaw-in-billions-of-wi-fi-devices-left-communications-open-to-eavesdroppng/" title="Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica" rel="nofollow">Flaw in billions of Wi-Fi devices left communications open to eavesdropping | Ars Technica</a>
</li><li><a href="https://www.eset.com/int/kr00k/" title="kr00k: A serious vulnerability deep inside Wi-Fi encryption" rel="nofollow">kr00k: A serious vulnerability deep inside Wi-Fi encryption</a>
</li><li><a href="https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf" title="Kr00k Paper" rel="nofollow">Kr00k Paper</a>
</li><li><a href="https://blog.cloudflare.com/technical-details-of-why-cloudflare-chose-amd-epyc-for-gen-x-servers/" title="Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers" rel="nofollow">Technical Details of Why Cloudflare Chose AMD EPYC for Gen X Servers</a>
</li><li><a href="https://blog.cloudflare.com/an-epyc-trip-to-rome-amd-is-cloudflares-10th-generation-edge-server-cpu/" title="An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU" rel="nofollow">An EPYC trip to Rome: AMD is Cloudflare’s 10th-generation Edge server CPU</a>
</li><li><a href="https://blog.cloudflare.com/cloudflares-gen-x-servers-for-an-accelerated-future/" title="Cloudflare’s Gen X: Servers for an Accelerated Future" rel="nofollow">Cloudflare’s Gen X: Servers for an Accelerated Future</a>
</li><li><a href="https://blog.cloudflare.com/impact-of-cache-locality/" title="Impact of Cache Locality" rel="nofollow">Impact of Cache Locality</a>
</li><li><a href="https://blog.cloudflare.com/gen-x-performance-tuning/" title="Gen X Performance Tuning" rel="nofollow">Gen X Performance Tuning</a>
</li><li><a href="https://blog.cloudflare.com/securing-memory-at-epyc-scale/" title="Securing Memory at EPYC Scale" rel="nofollow">Securing Memory at EPYC Scale</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/02/intel-promises-full-memory-encryption-in-upcoming-cpus/" title="Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica" rel="nofollow">Intel promises Full Memory Encryption in upcoming CPUs | Ars Technica</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13323694/techsnap-0424.mp4" length="393006109" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why…</itunes:subtitle>
      <itunes:summary>Cloudflare recently embarked on an epic quest to choose a CPU for its next-generation server build, so we explore the importance of requests per watt, the benefits of full memory encryption, and why AMD won.</itunes:summary>
    </item>
    <item>
      <title>Hopeful for HAMR | TechSNAP 423</title>
      <itunes:title>Hopeful for HAMR | TechSNAP 423</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5440</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5440</guid>
      <id>8</id>
      <pubDate>Fri, 21 Feb 2020 18:10:00 +0100</pubDate>
      <description>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.</description>
      <content:encoded><![CDATA[<p>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. </p>

<p><p>Plus Jim&#39;s journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.</p><p>Links:</p><ul><li><a href="https://arstechnica.com/gadgets/2020/02/ubuntu-18-04-4-lts-released-wednesday-heres-whats-new/" title="Ubuntu 18.04.4 LTS: here's what's new" rel="nofollow">Ubuntu 18.04.4 LTS: here's what's new</a> &mdash; It's not as shiny and exciting as entirely new versions, of course, but it does pack in some worthwhile security and bugfix upgrades, as well as support for more and newer hardware.</li><li><a href="https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes/ChangeSummary/18.04.4" title="18.04.4 - Ubuntu Wiki" rel="nofollow">18.04.4 - Ubuntu Wiki</a></li><li><a href="https://mobaxterm.mobatek.net/" title="MobaXterm" rel="nofollow">MobaXterm</a> &mdash; Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more.</li><li><a href="https://arstechnica.com/gadgets/2020/02/linux-distro-review-intels-own-clear-linux-os/?comments=1" title="Linux distro review: Intel’s own Clear Linux OS" rel="nofollow">Linux distro review: Intel’s own Clear Linux OS</a> &mdash; There's not much question that Clear Linux is your best bet if you want to turn in the best possible benchmark numbers. The question not addressed here is, what's it like to run Clear Linux as a daily driver? We were curious, so we took it for a spin.</li><li><a href="https://clearlinux.org/" title="Clear Linux* Project" rel="nofollow">Clear Linux* Project</a> &mdash; Clear Linux OS is an open source, rolling release Linux distribution optimized for performance and security, from the Cloud to the Edge, designed for customization, and manageability.</li><li><a href="https://docs.01.org/clearlinux/latest/guides/clear/swupd.html" title="swupd — Documentation for Clear Linux* project" rel="nofollow">swupd — Documentation for Clear Linux* project</a></li><li><a href="https://github.com/clearlinux/clr-boot-manager" title="clr-boot-manager: Kernel & Boot Loader Management" rel="nofollow">clr-boot-manager: Kernel &amp; Boot Loader Management</a></li><li><a href="https://github.com/zfsonlinux/zfs/issues/9745" title="Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs" rel="nofollow">Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs</a></li><li><a href="https://arstechnica.com/gadgets/2020/02/zfs-on-linux-should-get-a-persistent-ssd-read-cache-feature-soon/" title="Persistent L2ARC might be coming to ZFS on Linux" rel="nofollow">Persistent L2ARC might be coming to ZFS on Linux</a> &mdash; The primary ARC is kept in system RAM, but an L2ARC device can be created from one or more fast disks. In a ZFS pool with one or more L2ARC devices, when blocks are evicted from the primary ARC in RAM, they are moved down to L2ARC rather than being thrown away entirely. In the past, this feature has been of limited value, both because indexing a large L2ARC occupies system RAM which could have been better used for primary ARC and because L2ARC was not persistent across reboots.</li><li><a href="https://github.com/zfsonlinux/zfs/pull/9582" title="Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs" rel="nofollow">Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs</a> &mdash; This feature implements a light-weight persistent L2ARC metadata structure that allows L2ARC contents to be recovered after a reboot. This significantly eases the impact a reboot has on read performance on systems with large caches.</li><li><a href="https://linuxunplugged.com/303" title="LINUX Unplugged 303: Stateless and Dateless" rel="nofollow">LINUX Unplugged 303: Stateless and Dateless</a> &mdash; We visit Intel to figure out what Clear Linux is all about and explain a few tricks that make it unique.</li><li><a href="https://linuxunplugged.com/articles/clear-linux-os-2019" title="LINUX Unplugged Blog: Clear Linux OS 2019" rel="nofollow">LINUX Unplugged Blog: Clear Linux OS 2019</a></li><li><a href="https://arstechnica.com/gadgets/2020/02/hamr-dont-hurt-em-laser-assisted-hard-drives-are-coming-in-2020/" title="HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020" rel="nofollow">HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020</a> &mdash; Although the 2012 "just around the corner" HAMR drives seem to have been mostly vapor, the technology is a reality now. Seagate has been trialing 16TB HAMR drives with select customers for more than a year and claims that the trials have proved that its HAMR drives are "plug and play replacements" for traditional CMR drives, requiring no special care and having no particular poor use cases compared to the drives we're all used to.</li><li><a href="https://blog.seagate.com/craftsman-ship/hamr-milestone-seagate-achieves-16tb-capacity-on-internal-hamr-test-units/" title="HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units" rel="nofollow">HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units</a></li><li><a href="https://blocksandfiles.com/2019/09/03/western-digital-18tb-and-20tb-mamr-disk-drives/" title="Western Digital debuts 18TB and 20TB near-MAMR disk drives" rel="nofollow">Western Digital debuts 18TB and 20TB near-MAMR disk drives</a></li><li><a href="https://techsnap.systems/341" title="Previously on TechSNAP 341: HAMR Time" rel="nofollow">Previously on TechSNAP 341: HAMR Time</a> &mdash; We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details &amp; some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology &amp; take a mini deep dive into the world of elliptic curve cryptography.</p>

<p></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13279266/techsnap-0423.mp4" length="411408220" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. 
Plus Jim's journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release…</itunes:subtitle>
      <itunes:summary>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.</itunes:summary>
    </item>
    <item>
      <title>Multipath Musings | TechSNAP 422</title>
      <itunes:title>Multipath Musings | TechSNAP 422</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5336</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5336</guid>
      <id>9</id>
      <pubDate>Fri, 07 Feb 2020 00:20:00 +0100</pubDate>
      <description>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.</description>
      <content:encoded><![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p><p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/" title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow">Oregon company makes top bid for Microsoft check - CNET</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/" title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a>
</li><li><a href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status" title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/" title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a>
</li><li><a href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/" title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a>
</li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=Ubuntu-20.04-Adds-WireGuard" title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a>
</li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=Linux-5.6-Starts-Multipath-TCP" title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a>
</li><li><a href="https://www.multipath-tcp.org/" title="MultiPath TCP - Linux Kernel implementation" rel="nofollow">MultiPath TCP - Linux Kernel implementation</a>
</li><li><a href="https://lwn.net/Articles/800501/" title="Upstreaming multipath TCP" rel="nofollow">Upstreaming multipath TCP</a>
</li><li><a href="https://www.youtube.com/watch?v=Y64n_R14GtI" title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow">LPC2019 - Multipath TCP Upstreaming - YouTube</a>
</li><li><a href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf" title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow">LPC2019 - Multipath TCP Upstreaming - Slides</a>
</li><li><a href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf" title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow">LPC2019 - Multipath TCP Upstreaming - Paper</a>
</li><li><a href="https://www.sajalkayan.com/post/fun-with-mptcp.html" title="Using MultiPath TCP to enhance home networks" rel="nofollow">Using MultiPath TCP to enhance home networks</a>
</li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=Linux-5.6-Crypto-AVX-Poly1305" title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a href="https://en.wikipedia.org/wiki/Poly1305" title="Poly1305" rel="nofollow">Poly1305</a></li><li><a href="https://cacheoutattack.com/" title="CacheOut" rel="nofollow">CacheOut</a>
</li><li><a href="https://cacheoutattack.com/CacheOut.pdf" title="CacheOut Paper" rel="nofollow">CacheOut Paper</a></li><li><a href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks" title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware" rel="nofollow">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a>
</li><li><a href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave" title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13230889/techsnap-0422.mp4" length="329154030" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. 
Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled…</itunes:subtitle>
      <itunes:summary>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.</itunes:summary>
    </item>
    <item>
      <title>Firewall Fun | TechSNAP 421</title>
      <itunes:title>Firewall Fun | TechSNAP 421</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5230</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5230</guid>
      <id>10</id>
      <pubDate>Fri, 24 Jan 2020 00:36:00 +0100</pubDate>
      <description>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family.</description>
      <content:encoded><![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p><p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a href="https://www.us-cert.gov/ncas/alerts/aa20-014a" title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow">Critical Vulnerabilities in Microsoft Windows Operating Systems</a>
</li><li><a href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6" title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a>
</li><li><a href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/" title="NSA discovers a serious flaw in Windows 10" rel="nofollow">NSA discovers a serious flaw in Windows 10</a>
</li><li><a href="https://blog.sean-wright.com/exploiting-cve-2020-0601/" title="Exploiting CVE-2020-0601" rel="nofollow">Exploiting CVE-2020-0601</a>
</li><li><a href="https://github.com/ollypwn/cve-2020-0601" title="CVE-2020-0601 POC" rel="nofollow">CVE-2020-0601 POC</a>
</li><li><a href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF" title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow">NSA Cybersecurity Advisory on CryptoAPI Flaw</a>
</li><li><a href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/" title="Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog" rel="nofollow">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a>
</li><li><a href="https://opnsense.org" title="OPNsense: a true open source security platform and more" rel="nofollow">OPNsense: a true open source security platform and more</a>
</li><li><a href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797" title="There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a>
</li><li><a href="https://www.hq.nasa.gov/alsj/quindar.html" title="Quindar Tones" rel="nofollow">Quindar Tones</a>
</li><li><a href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/" title="Cap'n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13187685/techsnap-0421.mp4" length="347132770" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. 
Plus a look back at Apollo-era audio that's still relevant today with the…</itunes:subtitle>
      <itunes:summary>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family.</itunes:summary>
    </item>
    <item>
      <title>Choose Your Own Compiler | TechSNAP 420</title>
      <itunes:title>Choose Your Own Compiler | TechSNAP 420</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5142</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5142</guid>
      <id>11</id>
      <pubDate>Fri, 10 Jan 2020 00:20:00 +0100</pubDate>
      <description>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</description>
      <content:encoded><![CDATA[<p>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</p>

<p><p>Plus Debian&#39;s continued init system debate, and our frustrations over 5G reporting.</p><p>Links:</p><ul><li><a href="https://www.wsj.com/articles/5g-underwhelms-in-its-first-big-test-11577788203" title="5G Underwhelms in Its First Big Test - WSJ" rel="nofollow">5G Underwhelms in Its First Big Test - WSJ</a></li><li><a href="https://www.rcrwireless.com/20190912/5g/how-south-korea-built-5g-and-what-its-learning" title="How South Korea built 5G, and what it's learning - RCR Wireless News" rel="nofollow">How South Korea built 5G, and what it's learning - RCR Wireless News</a></li><li><a href="https://www.channelnewsasia.com/news/cnainsider/what-south-korea-first-country-launch-5g-network-can-teach-us-12056726" title="After seven months, here’s what South Korea can teach us about 5G - CNA" rel="nofollow">After seven months, here’s what South Korea can teach us about 5G - CNA</a></li><li><a href="https://www.zdnet.com/article/south-korea-secures-4-million-5g-subscribers/" title="South Korea secures 4 million 5G subscribers | ZDNet" rel="nofollow">South Korea secures 4 million 5G subscribers | ZDNet</a></li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=Debian-Init-Diversity-Vote" title="Debian Developers Take To Voting Over Init System Diversity" rel="nofollow">Debian Developers Take To Voting Over Init System Diversity</a></li><li><a href="https://vote.debian.org/~secretary/gr_initsystems/results.txt" title="Debian GR Results" rel="nofollow">Debian GR Results</a></li><li><a href="https://www.debian.org/vote/2019/vote_002" title="General Resolution: Init systems and systemd" rel="nofollow">General Resolution: Init systems and systemd</a></li><li><a href="https://www.phoronix.com/scan.php?page=article&item=linux-55-clang&num=1" title="Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels" rel="nofollow">Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels</a></li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=Google-2019-Clang-Kernel" title="Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google" rel="nofollow">Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google</a></li><li><a href="https://lwn.net/Articles/734071/" title="Building the kernel with Clang - LWN" rel="nofollow">Building the kernel with Clang - LWN</a></li><li><a href="https://clangbuiltlinux.github.io" title="ClangBuiltLinux" rel="nofollow">ClangBuiltLinux</a></li><li><a href="https://archive.fosdem.org/2019/schedule/event/llvm_kernel/" title="Compiling the Linux kernel with LLVM tools (FOSDEM 2019)" rel="nofollow">Compiling the Linux kernel with LLVM tools (FOSDEM 2019)</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13142462/techsnap-0420.mp4" length="340787759" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.
Plus Debian's continued init system debate, and our…</itunes:subtitle>
      <itunes:summary>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</itunes:summary>
    </item>
    <item>
      <title>Nebulous Networking | TechSNAP 419</title>
      <itunes:title>Nebulous Networking | TechSNAP 419</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5082</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5082</guid>
      <id>12</id>
      <pubDate>Fri, 27 Dec 2019 00:20:00 +0100</pubDate>
      <description>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</description>
      <content:encoded><![CDATA[<p><p>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</p><p>Links:</p><ul><li><a href="https://slack.engineering/introducing-nebula-the-open-source-global-overlay-network-from-slack-884110a5579" title="Introducing Nebula, the open source global overlay network from Slack" rel="nofollow">Introducing Nebula, the open source global overlay network from Slack</a>
</li><li><a href="https://github.com/slackhq/nebula" title="nebula: A scalable overlay networking tool with a focus on performance, simplicity and security" rel="nofollow">nebula: A scalable overlay networking tool with a focus on performance, simplicity and security</a>
</li><li><a href="https://arstechnica.com/gadgets/2019/12/nebula-vpn-routes-between-hosts-privately-flexibly-and-efficiently/" title="Nebula VPN routes between hosts privately, flexibly, and efficiently" rel="nofollow">Nebula VPN routes between hosts privately, flexibly, and efficiently</a>
</li><li><a href="https://arstechnica.com/gadgets/2019/12/how-to-set-up-your-own-nebula-mesh-vpn-step-by-step/" title="How to set up your own Nebula mesh VPN, step by step" rel="nofollow">How to set up your own Nebula mesh VPN, step by step</a>
</li><li><a href="https://linuxunplugged.com/329" title="LINUX Unplugged 329: Flat Network Truthers" rel="nofollow">LINUX Unplugged 329: Flat Network Truthers</a>
</li><li><a href="https://arstechnica.com/gadgets/2019/12/so-you-want-to-build-a-neural-network-the-cloud-can-help-with-that/" title="Cloudy with a chance of neurons: The tools that make neural networks work" rel="nofollow">Cloudy with a chance of neurons: The tools that make neural networks work</a>
</li><li><a href="https://colab.research.google.com/notebooks/welcome.ipynb" title="Welcome To Colaboratory" rel="nofollow">Welcome To Colaboratory</a>
</li><li><a href="https://colab.research.google.com/github/jantic/DeOldify/blob/master/ImageColorizerColab.ipynb" title="ImageColorizer Notebook" rel="nofollow">ImageColorizer Notebook</a>
</li><li><a href="https://github.com/jantic/DeOldify" title="DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)" rel="nofollow">DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13101496/techsnap-0419.mp4" length="469180142" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can…</itunes:subtitle>
      <itunes:summary>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</itunes:summary>
    </item>
    <item>
      <title>5G Fundamentals | TechSNAP 418</title>
      <itunes:title>5G Fundamentals | TechSNAP 418</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-5008</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-5008</guid>
      <id>13</id>
      <pubDate>Fri, 13 Dec 2019 00:20:00 +0100</pubDate>
      <description>As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.</description>
      <content:encoded><![CDATA[<p>As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.</p>

<p><p>Plus the surprising performance of eero&#39;s mesh Wi-Fi, some great news for WireGuard, and an update on the Librem 5.</p><p>Sponsored By:</p><ul><li><a href="https://learn.linuxacademy.com/jupiter" rel="nofollow">Linux Academy</a>: <a href="https://learn.linuxacademy.com/jupiter" rel="nofollow">Give yourself a year of opportunity and save $150. Get a full year of Hands-On Cloud Training. Limited time Black Friday Offer.</a></li></ul><p>Links:</p><ul><li><a href="https://learn.linuxacademy.com/jupiter" title="Linux Academy Black Friday Sale" rel="nofollow">Linux Academy Black Friday Sale</a> &mdash; Give yourself a year of opportunity and save $150. Get a full year of Hands-On Cloud Training. Limited time Black Friday Offer.</li><li><a href="https://www.theverge.com/2019/12/2/20991566/tmobile-nationwide-5g-600mhz-launch-samsung-oneplus" title="T-Mobile launches 600MHz 5G across the US, but no one can use it yet" rel="nofollow">T-Mobile launches 600MHz 5G across the US, but no one can use it yet</a></li><li><a href="https://www.theverge.com/2019/3/22/18277484/att-fake-5g-e-network-lte-study" title="Study confirms AT&T’s fake 5G E network is no faster than Verizon, T-Mobile or Sprint 4G" rel="nofollow">Study confirms AT&amp;T’s fake 5G E network is no faster than Verizon, T-Mobile or Sprint 4G</a></li><li><a href="https://arstechnica.com/information-technology/2019/12/5g-wont-change-everything-or-at-least-probably-not-your-things/" title="5G on the horizon: Here’s what it is and what’s coming" rel="nofollow">5G on the horizon: Here’s what it is and what’s coming</a></li><li><a href="https://arstechnica.com/information-technology/2019/12/5g-as-a-home-broadband-replacement-isnt-a-slam-dunk-yet-but-it-might-be-soon/" title="Can 5G replace everybody’s home broadband?" rel="nofollow">Can 5G replace everybody’s home broadband?</a></li><li><a href="https://arstechnica.com/gadgets/2019/12/qualcomms-new-snapdragon-865-is-a-step-backwards-for-smartphone-design/" title="The Snapdragon 865 will make phones worse in 2020, thanks to mandatory 5G" rel="nofollow">The Snapdragon 865 will make phones worse in 2020, thanks to mandatory 5G</a></li><li><a href="https://arstechnica.com/gadgets/2019/12/librem-5-backers-receiving-their-linux-phones/" title="Librem 5 backers have begun receiving their Linux phones" rel="nofollow">Librem 5 backers have begun receiving their Linux phones</a></li><li><a href="https://arstechnica.com/gadgets/2019/12/amazons-inexpensive-eero-mesh-wi-fi-kit-is-shockingly-good/" title="Amazon’s inexpensive Eero mesh Wi-Fi kit is shockingly good" rel="nofollow">Amazon’s inexpensive Eero mesh Wi-Fi kit is shockingly good</a></li><li><a href="https://arstechnica.com/gadgets/2019/12/wireguard-vpn-is-a-step-closer-to-mainstream-adoption/" title="WireGuard VPN is a step closer to mainstream adoption" rel="nofollow">WireGuard VPN is a step closer to mainstream adoption</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13063315/techsnap-0418.mp4" length="487097422" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.
Plus the surprising performance of eero's mesh Wi-Fi, some great…</itunes:subtitle>
      <itunes:summary>As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.</itunes:summary>
    </item>
    <item>
      <title>Machine Learning Magic | TechSNAP 417</title>
      <itunes:title>Machine Learning Magic | TechSNAP 417</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4892</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4892</guid>
      <id>14</id>
      <pubDate>Fri, 29 Nov 2019 00:25:00 +0100</pubDate>
      <description>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</description>
      <content:encoded><![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p><p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Sponsored By:</p><ul><li><a href="https://learn.linuxacademy.com/jupiter" rel="nofollow">Linux Academy</a>: <a href="https://learn.linuxacademy.com/jupiter" rel="nofollow">Give yourself a year of opportunity and save $150. Get a full year of Hands-On Cloud Training. Limited time Black Friday Offer.</a></li></ul><p>Links:</p><ul><li><a href="https://learn.linuxacademy.com/jupiter" title="Linux Academy Black Friday Sale" rel="nofollow">Linux Academy Black Friday Sale</a> &mdash; Give yourself a year of opportunity and save $150. Get a full year of Hands-On Cloud Training. Limited time Black Friday Offer.</li><li><a href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/" title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a>
</li><li><a href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/" title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a>
</li><li><a href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf" title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow">Self-encrypting deception: weaknesses in the encryption of solid state drives</a>
</li><li><a href="https://kb.iu.edu/d/aiut" title="Securely erase a solid-state drive" rel="nofollow">Securely erase a solid-state drive</a>
</li><li><a href="https://www.thomas-krenn.com/en/wiki/SSD_Secure_Erase" title="https://www.thomas-krenn.com/en/wiki/SSD_Secure_Erase" rel="nofollow">https://www.thomas-krenn.com/en/wiki/SSD<em>Secure</em>Erase</a>
</li><li><a href="https://grok.lsu.edu/Article.aspx?articleid=16716" title="https://grok.lsu.edu/Article.aspx?articleid=16716" rel="nofollow">https://grok.lsu.edu/Article.aspx?articleid=16716</a>
</li><li><a href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing" title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow">Solid state drive/Memory cell clearing - ArchWiki</a>
</li><li><a href="https://arxiv.org/abs/1911.05289" title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a>
</li><li><a href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/" title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a>
</li><li><a href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf" title="How to recognize AI snake oil" rel="nofollow">How to recognize AI snake oil</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/13012152/techsnap-0417.mp4" length="385911556" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
Plus so-so SSD security, and a new wireless protocol that works best where the…</itunes:subtitle>
      <itunes:summary>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</itunes:summary>
    </item>
    <item>
      <title>I.T. Phone Home | TechSNAP 416</title>
      <itunes:title>I.T. Phone Home | TechSNAP 416</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4802</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4802</guid>
      <id>15</id>
      <pubDate>Fri, 15 Nov 2019 00:20:00 +0100</pubDate>
      <description>Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.</description>
      <content:encoded><![CDATA[<p><p>Ubiquiti&#39;s troublesome new telemetry, Jim&#39;s take on the modern Microsoft, and why Project Silica just might be the future of long term storage.</p><p>Links:</p><ul><li><a href="https://www.theregister.co.uk/2019/11/07/ubiquiti_networks_phone_home/" title="Sure, we made your Wi-Fi routers phone home with telemetry, says Ubiquiti. What of it?" rel="nofollow">Sure, we made your Wi-Fi routers phone home with telemetry, says Ubiquiti. What of it?</a> &mdash; Ubiquiti Networks is fending off customer complaints after emitting a firmware update that caused its UniFi wireless routers to quietly phone HQ with telemetry.</li><li><a href="https://community.ui.com/questions/UI-official-urgent-please-answer/14259289-e4c3-4c5e-aaa0-02a5baa6cbbe?page=11" title="UI official: urgent, please answer | Ubiquiti Community" rel="nofollow">UI official: urgent, please answer | Ubiquiti Community</a>
</li><li><a href="https://community.ui.com/questions/Update-UniFi-Phone-Home-Performance-Data-Collection/f84a71c9-0b81-4d69-a3b3-45640aba1c8b" title="Update: UniFi Phone Home/Performance Data Collection | Ubiquiti Community" rel="nofollow">Update: UniFi Phone Home/Performance Data Collection | Ubiquiti Community</a>
</li><li><a href="https://community.ui.com/questions/UI-official-urgent-please-answer/14259289-e4c3-4c5e-aaa0-02a5baa6cbbe#answer/2eca7d3f-5824-43ae-bd1d-fe6a18af1c79" title="Possible example data" rel="nofollow">Possible example data</a>
</li><li><a href="https://community.ui.com/releases/UAP-USW-Firmware-4-0-69-10871/245e428c-d111-4b9d-a550-ec0cc86ef646" title="Latest firmware with changes" rel="nofollow">Latest firmware with changes</a>
</li><li><a href="https://arstechnica.com/gadgets/2019/11/microsofts-project-silica-offers-robust-thousand-year-storage/" title="Microsoft’s Project Silica offers robust thousand-year storage | Ars Technica" rel="nofollow">Microsoft’s Project Silica offers robust thousand-year storage | Ars Technica</a> &mdash; Silica aims to replace both tape and optical archival discs as the media of choice for large-scale, (very) long duration cold storage.</li><li><a href="https://www.microsoft.com/en-us/research/uploads/prod/2018/07/hotstorage18-paper-anderson.pdf" title="Project Silica" rel="nofollow">Project Silica</a>
</li><li><a href="https://cacm.acm.org/magazines/2019/4/235573-the-future-of-data-storage/fulltext?mobile=false" title="The Future of Data Storage" rel="nofollow">The Future of Data Storage</a>
</li><li><a href="https://news.microsoft.com/ignite2019/" title="Microsoft Ignite 2019" rel="nofollow">Microsoft Ignite 2019</a>
</li><li><a href="https://arstechnica.com/gadgets/2019/11/microsoft-edge-is-coming-to-linux-but-will-anybody-use-it/" title="Microsoft Edge is coming to Linux. But will anybody use it? | Ars Technica" rel="nofollow">Microsoft Edge is coming to Linux. But will anybody use it? | Ars Technica</a> &mdash; At Microsoft Ignite a slide announced that Microsoft's project to rebase its perennially unloved Edge browser on Google's open source project Chromium is well underway. Sharper-eyed attendees also noticed a promise for future Linux support.</li><li><a href="https://medium.com/@wtfmitchel/has-microsoft-changed-431db9d1d153" title="Has Microsoft Changed?" rel="nofollow">Has Microsoft Changed?</a>
</li><li><a href="http://sawers.com/blog/this-isnt-your-fathers-microsoft/" title="This isn’t your father’s Microsoft" rel="nofollow">This isn’t your father’s Microsoft</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12976204/techsnap-0416.mp4" length="385863492" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.Links:Sure, we made your Wi-Fi routers phone home with…</itunes:subtitle>
      <itunes:summary>Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.</itunes:summary>
    </item>
    <item>
      <title>It's All About IOPS | TechSNAP 415</title>
      <itunes:title>It's All About IOPS | TechSNAP 415</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4716</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4716</guid>
      <id>16</id>
      <pubDate>Fri, 01 Nov 2019 00:25:00 +0100</pubDate>
      <description>We share our simple approach to disk benchmarking and explain why you should always test your pain points.</description>
      <content:encoded><![CDATA[<p>We share our simple approach to disk benchmarking and explain why you should always test your pain points.</p>

<p><p>Plus the basics of solid state disks and how to evaluate which model is right for you.</p><p>Links:</p><ul><li><a href="https://en.wikipedia.org/wiki/History_of_hard_disk_drives" title="History of hard disk drives" rel="nofollow">History of hard disk drives</a> &mdash; Wikipedia</li><li><a href="https://www.tomshardware.com/reviews/ssd-buying-guide,5602.html" title="How to Buy the Right SSD: A Guide for 2019 " rel="nofollow">How to Buy the Right SSD: A Guide for 2019 </a> &mdash; Tom's Hardware</li><li><a href="https://www.semiconductorstore.com/blog/2014/The-Development-and-History-of-Solid-State-Drives-SSDs/854/" title="The Development and History of Solid State Drives (SSDs)" rel="nofollow">The Development and History of Solid State Drives (SSDs)</a></li><li><a href="https://louwrentius.com/understanding-iops-latency-and-storage-performance.html" title="Understanding IOPS, latency and storage performance" rel="nofollow">Understanding IOPS, latency and storage performance</a></li><li><a href="https://jrs-s.net/2015/11/23/fio-cheat-sheet/" title="FIO cheat sheet" rel="nofollow">FIO cheat sheet</a> &mdash; Jim's Blog</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12943890/techsnap-0415.mp4" length="481074822" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We share our simple approach to disk benchmarking and explain why you should always test your pain points.
Plus the basics of solid state disks and how to evaluate which model is right for…</itunes:subtitle>
      <itunes:summary>We share our simple approach to disk benchmarking and explain why you should always test your pain points.</itunes:summary>
    </item>
    <item>
      <title>Rooting for ZFS | TechSNAP 414</title>
      <itunes:title>Rooting for ZFS | TechSNAP 414</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4627</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4627</guid>
      <id>17</id>
      <pubDate>Fri, 18 Oct 2019 04:35:00 +0200</pubDate>
      <description>We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root. </description>
      <content:encoded><![CDATA[<p>We dive into Ubuntu 19.10&#39;s experimental ZFS installer and share our tips for making the most of ZFS on root. </p>

<p>Plus why you may want to skip Nest Wifi, and our latest explorations of long range wireless protocols.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12907631/techsnap-0414.mp4" length="588239828" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root. 
Plus why you may want to skip Nest Wifi, and our latest explorations of long range …</itunes:subtitle>
      <itunes:summary>We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root. </itunes:summary>
    </item>
    <item>
      <title>The Coffee Shop Problem | TechSNAP 413</title>
      <itunes:title>The Coffee Shop Problem | TechSNAP 413</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4539</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4539</guid>
      <id>18</id>
      <pubDate>Fri, 04 Oct 2019 00:40:00 +0200</pubDate>
      <description>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</description>
      <content:encoded><![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p><p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/" title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a>
</li><li><a href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html" title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/" title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/" title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a href="https://blog.cloudflare.com/announcing-warp-plus/" title="WARP is here" rel="nofollow">WARP is here</a>
</li><li><a href="https://blog.cloudflare.com/warp-technical-challenges/" title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow">The Technical Challenges of Building Cloudflare WARP</a></li><li><a href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/" title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a href="https://blog.cloudflare.com/http3-the-past-present-and-future/" title="HTTP/3: the past, the present, and the future" rel="nofollow">HTTP/3: the past, the present, and the future</a>
</li><li><a href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/" title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a href="https://github.com/quicwg/base-drafts/wiki/Implementations" title="QUIC Implementations" rel="nofollow">QUIC Implementations</a></li><li><a href="https://www.startpage.com/en/" title="Startpage.com - The world's most private search engine" rel="nofollow">Startpage.com - The world's most private search engine</a></li><li><a href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/" title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a>
</li><li><a href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278" title="Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise" rel="nofollow">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a>
</li><li><a href="https://www.scottaaronson.com/blog/?p=4317" title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/" title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a>
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12872758/techsnap-0413.mp4" length="449207219" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
Plus when to use WARP, the secrets of Startpage, and the…</itunes:subtitle>
      <itunes:summary>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</itunes:summary>
    </item>
    <item>
      <title>Too Good To Be True | TechSNAP 412</title>
      <itunes:title>Too Good To Be True | TechSNAP 412</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4458</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4458</guid>
      <id>19</id>
      <pubDate>Fri, 20 Sep 2019 00:20:00 +0200</pubDate>
      <description>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</description>
      <content:encoded><![CDATA[<p>It&#39;s TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</p>

<p><p>Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.</p><p>Links:</p><ul><li><a href="https://arstechnica.com/gadgets/2019/09/rf-chirp-tech-long-distance-incredible-penetration-low-bandwidth/" title="RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica" rel="nofollow">RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica</a> &mdash; Recently, I took the company's technology for a spin with a pair of hand-held demo communicators about the size of a kid's walkie-talkie. They don't do much—just light up with a signal strength reading on both devices, whenever a transmit button on either is pressed—but that's enough to get a good indication of whether the tech will work to solve a given problem.</li><li><a href="https://www.anandtech.com/show/14875/wifi-6-is-officially-here-certification-program-begins" title="Wi-Fi 6 Is Officially Here: Certification Program Begins" rel="nofollow">Wi-Fi 6 Is Officially Here: Certification Program Begins</a> &mdash; Finally, along with the launch of the certification program itself, the Wi-Fi Alliance has already certified its first dozen devices. </li><li><a href="https://arstechnica.com/gadgets/2019/09/say-hello-to-802-11ax-wi-fi-6-device-certification-begins-today/" title="Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica" rel="nofollow">Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica</a> &mdash; Today, the Wi-Fi Alliance launched its Wi-Fi Certified 6 program, which means that the standard has been completely finalized, and device manufacturers and OEMs can begin the process of having the organization certify their products to carry the Wi-Fi 6 branding.
</li><li><a href="https://www.theverge.com/2019/9/14/20865699/pixel-4-xl-leaked-photos-camera-specs" title="Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge" rel="nofollow">Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge</a></li><li><a href="https://arstechnica.com/gadgets/2019/09/iphone-11-iphone-11-pro-and-iphone-11-pro-max-hands-on-with-apples-new-phones/" title="iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica" rel="nofollow">iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica</a></li><li><a href="https://arstechnica.com/gadgets/2019/09/some-chromebooks-mistakenly-declared-themselves-end-of-life-last-week/" title="Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica" rel="nofollow">Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica</a> &mdash; A lot of Chromebook and Chromebox users don't realize this, but all ChromeOS devices have an expiration date. Google's original policy was for devices to be supported for five years, but the company has recently extended that time to 6.5 years.</p>

<p></li><li><a href="https://linuxunplugged.com/318" title="LINUX Unplugged 318: Manjaro Levels Up" rel="nofollow">LINUX Unplugged 318: Manjaro Levels Up</a></li><li><a href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/" title="Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica" rel="nofollow">Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica</a></li><li><a href="https://lahirumadushankablog.wordpress.com/2017/10/01/gentle-intro-to-quantum-key-distribution-qkd/" title="Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka" rel="nofollow">Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka</a></li><li><a href="https://www.bloomberg.com/news/articles/2019-01-14/the-super-secure-quantum-cable-hiding-in-the-holland-tunnel" title="The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg" rel="nofollow">The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg</a> &mdash;  Banks and governments are testing quantum key distribution technology to guard their closest secrets.</li><li><a href="https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/" title="Quantum Key Distribution - QKD" rel="nofollow">Quantum Key Distribution - QKD</a> &mdash; This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature.</li><li><a href="https://techsnap.systems/403" title="TechSNAP 403: Keeping Systems Simple" rel="nofollow">TechSNAP 403: Keeping Systems Simple</a></li><li><a href="https://linuxheadlines.show/" title="Linux Headlines" rel="nofollow">Linux Headlines</a> &mdash; Linux and open source headlines every weekday, in under 3 minutes.</p>

<p></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12839759/techsnap-0412.mp4" length="483810899" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.
Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key…</itunes:subtitle>
      <itunes:summary>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</itunes:summary>
    </item>
    <item>
      <title>Mobile Security Mistakes | TechSNAP 411</title>
      <itunes:title>Mobile Security Mistakes | TechSNAP 411</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4360</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4360</guid>
      <id>20</id>
      <pubDate>Fri, 06 Sep 2019 00:20:00 +0200</pubDate>
      <description>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</description>
      <content:encoded><![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p><p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says" title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html" title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html" title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html" title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html" title="Project Zero: JSC Exploits" rel="nofollow">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html" title="Project Zero: Implant Teardown" rel="nofollow">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf" title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb" title="Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/" title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/" title="Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=Linux-5.4-Improve-EPYC-Balance" title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&start=40" title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12798840/techsnap-0411.mp4" length="419845805" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
Plus what to expect from USB4 and an upcoming Linux…</itunes:subtitle>
      <itunes:summary>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</itunes:summary>
    </item>
    <item>
      <title>Epyc Encryption | TechSNAP 410</title>
      <itunes:title>Epyc Encryption | TechSNAP 410</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4297</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4297</guid>
      <id>21</id>
      <pubDate>Fri, 23 Aug 2019 00:10:00 +0200</pubDate>
      <description>It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.</description>
      <content:encoded><![CDATA[<p>It&#39;s CPU release season and we get excited about AMD&#39;s new line of server chips. Plus our take on AMD&#39;s approach to memory encryption, and our struggle to make sense of Intel&#39;s Comet Lake line.</p>

<p><p>Also, a few Windows worms you should know about, the end of the road for EV certs, and an embarrassing new Bluetooth attack.</p><p>Links:</p><ul><li><a href="https://arstechnica.com/gadgets/2019/08/a-detailed-look-at-amds-new-epyc-rome-7nm-server-cpus/" title="A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica" rel="nofollow">A detailed look at AMD’s new Epyc “Rome” 7nm server CPUs | Ars Technica</a> &mdash; The short version of the story is, Epyc "Rome" is to the server what Ryzen 3000 was to the desktop—bringing significantly improved IPC, more cores, and better thermal efficiency than either its current-generation Intel equivalents or its first-generation Epyc predecessors.</li><li><a href="https://www.anandtech.com/show/14694/amd-rome-epyc-2nd-gen" title="AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked" rel="nofollow">AMD Rome Second Generation EPYC Review: 2x 64-core Benchmarked</a> &mdash; Ever since the Opteron days, AMD's market share has been rounded to zero percent, and with its first generation of EPYC processors using its new Zen microarchitecture, that number skipped up a small handful of points, but everyone has been waiting with bated breath for the second swing at the ball. AMD's Rome platform solves the concerns that first gen Naples had, plus this CPU family is designed to do many things: a new CPU microarchitecture on 7nm, offer up to 64 cores, offer 128 lanes of PCIe 4.0, offer 8 memory channels, and offer a unified memory architecture based on chiplets. </li><li><a href="https://www.phoronix.com/scan.php?page=article&item=epyc-rome-mitigations&num=1" title="AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix" rel="nofollow">AMD EPYC Rome Still Conquering Cascadelake Even Without Mitigations - Phoronix</a> &mdash; Out of curiosity, I've run some unmitigated benchmarks for the various relevant CPU speculative execution vulnerabilities on both the Intel Xeon Platinum 8280 Cascadelake and AMD EPYC 7742 Rome processors for seeing how the performance differs.</li><li><a href="https://arstechnica.com/gadgets/2019/08/intels-line-of-notebook-cpus-gets-more-confusing-with-14nm-comet-lake/" title="Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica" rel="nofollow">Intel’s line of notebook CPUs gets more confusing with 14nm Comet Lake | Ars Technica</a> &mdash; Going by Intel's numbers, Comet Lake looks like a competent upgrade to its predecessor Whiskey Lake. The interesting question—and one largely left unanswered by Intel—is why the company has decided to launch a new line of 14nm notebook CPUs less than a month after launching Ice Lake, its first 10nm notebook CPUs.</li><li><a href="https://arstechnica.com/information-technology/2019/08/a-look-at-the-windows-10-exploit-google-zero-disclosed-this-week/" title="A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica" rel="nofollow">A look at the Windows 10 exploit Google Zero disclosed this week | Ars Technica</a> &mdash; On Tuesday, Tavis Ormandy of Google's Project Zero released an exploit kit called ctftool, which uses and abuses Microsoft's Text Services Framework in ways that can effectively get anyone root—er, system that is—on any unpatched Windows 10 system they're able to log in to</li><li><a href="https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182/" title="Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center" rel="nofollow">Patch new wormable vulnerabilities in Remote Desktop Services (CVE-2019-1181/1182) – Microsoft Security Response Center</a> &mdash; Today Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction.</p>

<p></li><li><a href="https://knobattack.com/" title="KNOB Attack" rel="nofollow">KNOB Attack</a> &mdash; TL;DR: The specification of Bluetooth includes an encryption key negotiation protocol that allows to negotiate encryption keys with 1 Byte of entropy without protecting the integrity of the negotiation process. A remote attacker can manipulate the entropy negotiation to let any standard compliant Bluetooth device negotiate encryption keys with 1 byte of entropy and then brute force the low entropy keys in real time.
</li><li><a href="https://www.troyhunt.com/extended-validation-certificates-are-really-really-dead/" title="Troy Hunt: Extended Validation Certificates are (Really, Really) Dead" rel="nofollow">Troy Hunt: Extended Validation Certificates are (Really, Really) Dead</a> &mdash; With both browsers auto-updating for most people, we're about 10 weeks out from no more EV and the vast majority of web users no longer seeing something they didn't even know was there to begin with! Oh sure, you can still drill down into the certificate and see the entity name, but who's really going to do that? You and I, perhaps, but we're not exactly in the meat of the browser demographics.</li><li><a href="https://www.zdnet.com/article/google-wants-to-reduce-lifespan-for-https-certificates-to-one-year/" title="Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet" rel="nofollow">Google wants to reduce lifespan for HTTPS certificates to one year | ZDNet</a> &mdash; Scott Helme argues that the security benefits of shorter SSL certificate lifespans have nothing to do with phishing or malware sites, but instead with the SSL certificate revocation process. Helme claims that this process is broken and that bad SSL certificates continue to live on for years after being mississued and revoked.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12762056/techsnap-0410.mp4" length="704291234" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake…</itunes:subtitle>
      <itunes:summary>It's CPU release season and we get excited about AMD's new line of server chips. Plus our take on AMD's approach to memory encryption, and our struggle to make sense of Intel's Comet Lake line.</itunes:summary>
    </item>
    <item>
      <title>Privacy Perspectives | TechSNAP 409</title>
      <itunes:title>Privacy Perspectives | TechSNAP 409</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4223</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4223</guid>
      <id>22</id>
      <pubDate>Fri, 09 Aug 2019 00:20:00 +0200</pubDate>
      <description>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</description>
      <content:encoded><![CDATA[<p>We examine why it&#39;s so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</p>

<p>Plus Apple&#39;s blaring bluetooth beacons and Facebook&#39;s worrying plans for WhatsApp.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12730301/techsnap-0409.mp4" length="556928640" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.
Plus Apple's blaring bluetooth beacons and…</itunes:subtitle>
      <itunes:summary>We examine why it's so difficult to protect your privacy online and discuss browser fingerprinting, when to use a VPN, and the limits of private browsing.</itunes:summary>
    </item>
    <item>
      <title>Apollo's ARC | TechSNAP 408</title>
      <itunes:title>Apollo's ARC | TechSNAP 408</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4164</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4164</guid>
      <id>23</id>
      <pubDate>Fri, 26 Jul 2019 00:25:00 +0200</pubDate>
      <description>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.</description>
      <content:encoded><![CDATA[<p>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. </p>

<p><p>Plus an update on ZoL SIMD acceleration, your feedback, and an interesting new neuromorphic system from Intel.</p><p>Links:</p><ul><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=ZFS-On-Linux-Restoring-SIMD" title="ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+" rel="nofollow">ZFS On Linux Has Figured Out A Way To Restore SIMD Support On Linux 5.0+</a> &mdash; Those running ZFS On Linux (ZoL) on post-5.0 (and pre-5.0 supported LTS releases) have seen big performance hits to the ZFS encryption performance in particular. That came due to upstream breaking an interface used by ZFS On Linux and admittedly not caring about ZoL due to it being an out-of-tree user. But now several kernel releases later, a workaround has been devised. </li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=ZFS-On-Linux-5.0-Problem" title="ZFS On Linux Runs Into A Snag With Linux 5.0" rel="nofollow">ZFS On Linux Runs Into A Snag With Linux 5.0</a></li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=NixOS-Linux-5.0-ZFS-FPU-Drop" title="NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+" rel="nofollow">NixOS Takes Action After 1.2GB/s ZFS Encryption Speed Drops To 200MB/s With Linux 5.0+</a> &mdash;  A NixOS developer reports that the functions no longer exported by Linux 5.0+ and previously used by ZoL for AVX/AES-NI support end up dropping the ZFS data-set encryption performance to 200MB/s where as pre-5.0 kernels ran around 1.2GB/s</li><li><a href="https://github.com/zfsonlinux/zfs/commit/e5db31349484e5e859c7a942eb15b98d68ce5b4d" title="Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313" rel="nofollow">Linux 5.0 compat: SIMD compatibility · zfsonlinux/zfs@e5db313</a> &mdash; Restore the SIMD optimization for 4.19.38 LTS, 4.14.120 LTS,
and 5.0 and newer kernels.  This is accomplished by leveraging
the fact that by definition dedicated kernel threads never need
to concern themselves with saving and restoring the user FPU state.
Therefore, they may use the FPU as long as we can guarantee user
tasks always restore their FPU state before context switching back
to user space.</li><li><a href="https://github.com/zfsonlinux/zfs/issues/8793" title="no SIMD acceleration · Issue #8793 · zfsonlinux/zfs" rel="nofollow">no SIMD acceleration · Issue #8793 · zfsonlinux/zfs</a> &mdash; 4.14.x, 4.19.x, 5.x all have no SIMD acceleration, it is like a turtle. very slow.</p>

<p></li><li><a href="https://utcc.utoronto.ca/~cks/space/blog/linux/ZFSOnLinuxARCShrinkage" title="Chris's Wiki :: ZFS on Linux still has annoying issues with ARC size" rel="nofollow">Chris's Wiki :: ZFS on Linux still has annoying issues with ARC size</a> &mdash; One of the frustrating things about operating ZFS on Linux is that the ARC size is critical but ZFS's auto-tuning of it is opaque and apparently prone to malfunctions, where your ARC will mysteriously shrink drastically and then stick there.
</li><li><a href="http://www.righto.com/2019/07/software-woven-into-wire-core-rope-and.html" title="Software woven into wire, Core rope and the Apollo Guidance Computer" rel="nofollow">Software woven into wire, Core rope and the Apollo Guidance Computer</a> &mdash; One of the first computers to use integrated circuits, the Apollo Guidance Computer was lightweight enough and small enough to fly in space. An unusual feature that contributed to its small size was core rope memory, a technique of physically weaving software into high-density storage.</li><li><a href="https://github.com/virtualagc/virtualagc" title="Virtual Apollo Guidance Computer (AGC) software" rel="nofollow">Virtual Apollo Guidance Computer (AGC) software</a> &mdash; Since you are looking at this README file, you are in the "master" branch of the repository, which contains source-code transcriptions of the original Project Apollo software for the Apollo Guidance Computer (AGC) and Abort Guidance System (AGS), as well as our software for emulating the AGC, AGS, and some of their peripheral devices (such as the display-keyboard unit, or DSKY).</li><li><a href="https://www.theatlantic.com/science/archive/2019/07/underappreciated-power-apollo-computer/594121/" title="The Underappreciated Power of the Apollo Computer - The Atlantic" rel="nofollow">The Underappreciated Power of the Apollo Computer - The Atlantic</a> &mdash; Without the computers on board the Apollo spacecraft, there would have been no moon landing, no triumphant first step, no high-water mark for human space travel. A pilot could never have navigated the way to the moon, as if a spaceship were simply a more powerful airplane. The calculations required to make in-flight adjustments and the complexity of the thrust controls outstripped human capacities.</li><li><a href="https://arstechnica.com/science/2019/07/brains-scale-better-than-cpus-so-intel-is-building-brains/" title="Brains scale better than CPUs. So Intel is building brains | Ars Technica" rel="nofollow">Brains scale better than CPUs. So Intel is building brains | Ars Technica</a> &mdash; Neuromorphic engineering—building machines that mimic the function of organic brains in hardware as well as software—is becoming more and more prominent. The field has progressed rapidly, from conceptual beginnings in the late 1980s to experimental field programmable neural arrays in 2006, early memristor-powered device proposals in 2012, IBM's TrueNorth NPU in 2014, and Intel's Loihi neuromorphic processor in 2017. Yesterday, Intel broke a little more new ground with the debut of a larger-scale neuromorphic system, Pohoiki Beach, which integrates 64 of its Loihi chips.
</li><li><a href="https://www.youtube.com/watch?v=6CCJFQ_bP0E" title="Dancing Demon - YouTube" rel="nofollow">Dancing Demon - YouTube</a> &mdash; Written in 1979 by Leo Christopherson for the Radio Shack TRS-80 Model I computer. This is the best game ever for at that time.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12693374/techsnap-0408.mp4" length="186943623" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC. 
Plus an update on ZoL SIMD acceleration, your feedback,…</itunes:subtitle>
      <itunes:summary>We take a look at the amazing abilities of the Apollo Guidance Computer and Jim breaks down everything you need to know about the ZFS ARC.</itunes:summary>
    </item>
    <item>
      <title>Problematic Privileges | TechSNAP 407b</title>
      <itunes:title>Problematic Privileges | TechSNAP 407b</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4141</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4141</guid>
      <id>24</id>
      <pubDate>Mon, 22 Jul 2019 03:05:00 +0200</pubDate>
      <description>Wes takes a quick look at a container escape proof-of-concept and reviews Docker security best practices.</description>
      <content:encoded><![CDATA[<p><p>Wes takes a quick look at a container escape proof-of-concept and reviews Docker security best practices.</p><p>Links:</p><ul><li><a href="https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/" title="Understanding Docker container escapes | Trail of Bits Blog" rel="nofollow">Understanding Docker container escapes | Trail of Bits Blog</a> — Linux cgroups are one of the mechanisms by which Docker isolates containers. The PoC abuses the functionality of the notify<em>on</em>release.</li><li><a href="https://twitter.com/_fel1x/status/1151487053370187776" title="Felix Wilhelm on Twitter" rel="nofollow">Felix Wilhelm on Twitter</a> — Quick and dirty way to get out of a privileged k8s pod or docker container by using cgroups release_agent feature.
</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12651723/techsnap-0407.mp4" length="228649941" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Wes takes a quick look at a container escape proof-of-concept and reviews Docker security best practices.Links:Understanding Docker container escapes | Trail of Bits Blog — Linux cgroups are one of t…</itunes:subtitle>
      <itunes:summary>Wes takes a quick look at a container escape proof-of-concept and reviews Docker security best practices.</itunes:summary>
    </item>
    <item>
      <title>Old School Outages | TechSNAP 407</title>
      <itunes:title>Old School Outages | TechSNAP 407</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4082</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4082</guid>
      <id>25</id>
      <pubDate>Wed, 10 Jul 2019 22:10:00 +0200</pubDate>
      <description>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</description>
      <content:encoded><![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12651723/techsnap-0407.mp4" length="228649941" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.
Plus we turn our eye to hardware and get excited about the latest…</itunes:subtitle>
      <itunes:summary>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</itunes:summary>
    </item>
    <item>
      <title>SACK Attack | TechSNAP 406</title>
      <itunes:title>SACK Attack | TechSNAP 406</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-4006</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-4006</guid>
      <id>26</id>
      <pubDate>Sun, 23 Jun 2019 18:23:00 +0200</pubDate>
      <description>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.</description>
      <content:encoded><![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p><p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md" title="SACK Panic Security Bulletin" rel="nofollow">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic" title="Ubuntu SACK Panic Guidance" rel="nofollow">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a href="https://access.redhat.com/security/vulnerabilities/tcpsack" title="Red Hat SACK Panic Advisory" rel="nofollow">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   </p>

<p></li><li><a href="https://tools.ietf.org/html/rfc2018" title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a href="https://insecure.org/sploits/ping-o-death.html" title="Ping of Death" rel="nofollow">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/" title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/" title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.</p>

<p></li><li><a href="https://rambleed.com/" title="RAMBleed" rel="nofollow">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/" title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a href="https://twitter.com/allanjude/status/1138651704558346245" title="Allan Jude on Twitter" rel="nofollow">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a href="https://github.com/zfsonlinux/zfs/releases" title="ZFS on Linux Releases" rel="nofollow">ZFS on Linux Releases</a></li><li><a href="https://jobs.lever.co/linuxacademy/" title="Linux Academy is hiring! " rel="nofollow">Linux Academy is hiring! </a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/12165957/techsnap-0406.mp4" length="231309182" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.
Plus Firefox zero days targeting Coinbase, the latest update on…</itunes:subtitle>
      <itunes:summary>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.</itunes:summary>
    </item>
    <item>
      <title>Update Uncertainty | TechSNAP 405</title>
      <itunes:title>Update Uncertainty | TechSNAP 405</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3958</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3958</guid>
      <id>27</id>
      <pubDate>Tue, 11 Jun 2019 20:20:00 +0200</pubDate>
      <description>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</description>
      <content:encoded><![CDATA[<p>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</p>

<p>Plus the importance of automatic updates, and Jim&#39;s new backup box. </p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11785488/techsnap-0405.mp4" length="164413214" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.
Plus the importance of automatic updates, and Jim's new backup…</itunes:subtitle>
      <itunes:summary>We explore the risky world of exposed RDP, from the brute force GoldBrute botnet to the dangerously worm-able BlueKeep vulnerability.</itunes:summary>
    </item>
    <item>
      <title>Prefork Pitfalls | TechSNAP 404</title>
      <itunes:title>Prefork Pitfalls | TechSNAP 404</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3879</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3879</guid>
      <id>28</id>
      <pubDate>Sat, 25 May 2019 18:20:00 +0200</pubDate>
      <description>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</description>
      <content:encoded><![CDATA[<p>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</p>

<p><p>Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX. </p><p>Links:</p><ul><li><a href="https://jrs-s.net/2019/05/25/installing-wordpress-on-apache-the-modern-way/" title="Jim's Blog: Installing WordPress on Apache the modern way" rel="nofollow">Jim's Blog: Installing WordPress on Apache the modern way</a> &mdash; It’s been bugging me for a while that there are no correct guides to be found about using modern Apache 2.4 or above with the Event or Worker MPMs. We’re going to go ahead and correct that lapse today, by walking through a brand-new WordPress install on a new Ubuntu 18.04 VM.
</li><li><a href="https://httpd.apache.org/docs/2.4/misc/perf-tuning.html" title="Apache Performance Tuning" rel="nofollow">Apache Performance Tuning</a> &mdash; Apache 2.x is a general-purpose webserver, designed to provide a balance of flexibility, portability, and performance. Although it has not been designed specifically to set benchmark records, Apache 2.x is capable of high performance in many real-world situations.</li><li><a href="https://www.linode.com/docs/web-servers/apache-tips-and-tricks/tuning-your-apache-server/" title="Tuning Your Apache Server" rel="nofollow">Tuning Your Apache Server</a></li><li><a href="https://httpd.apache.org/docs/2.4/mod/worker.html" title="worker - Apache HTTP Server Version 2.4" rel="nofollow">worker - Apache HTTP Server Version 2.4</a> &mdash; This Multi-Processing Module (MPM) implements a hybrid multi-process multi-threaded server. By using threads to serve requests, it is able to serve a large number of requests with fewer system resources than a process-based server.</li><li><a href="https://httpd.apache.org/docs/2.4/mod/event.html" title="event - Apache HTTP Server Version 2.4" rel="nofollow">event - Apache HTTP Server Version 2.4</a> &mdash; The event Multi-Processing Module (MPM) is designed to allow more requests to be served simultaneously by passing off some processing work to the listeners threads, freeing up the worker threads to serve new requests.</p>

<p></li><li><a href="https://php-fpm.org/" title="PHP-FPM" rel="nofollow">PHP-FPM</a> &mdash; PHP-FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features useful for sites of any size, especially busier sites.
</li><li><a href="https://help.dreamhost.com/hc/en-us/articles/217298967-FastCGI-overview" title="FastCGI overview" rel="nofollow">FastCGI overview</a> &mdash; FastCGI is a way to have CGI scripts execute time-consuming code (like opening a database) only once, rather than every time the script is loaded. In technical terms, FastCGI is a language independent, scalable, open extension to CGI that provides high performance without the limitations of server specific APIs.</p>

<p></li><li><a href="https://www.alexa.com/topsites" title="Alexa Top 500 Global Sites" rel="nofollow">Alexa Top 500 Global Sites</a></li><li><a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/" title="What Is a CDN? How Does a CDN work?" rel="nofollow">What Is a CDN? How Does a CDN work?</a> &mdash; A content delivery network (CDN) refers to a geographically distributed group of servers which work together to provide fast delivery of Internet content. </li><li><a href="https://wordpress.org/plugins/w3-total-cache/" title="W3 Total Cache – WordPress plugin" rel="nofollow">W3 Total Cache – WordPress plugin</a> &mdash; W3 Total Cache improves the SEO and user experience of your site by increasing website performance, reducing load times via features like content delivery network (CDN) integration and the latest best practices.</p>

<p></li><li><a href="https://github.com/krakjoe/apcu" title="krakjoe/apcu: APCu - APC User Cache" rel="nofollow">krakjoe/apcu: APCu - APC User Cache</a> &mdash; APCu is an in-memory key-value store for PHP. Keys are of type string and values can be any PHP variables.</p>

<p></li><li><a href="https://www.php.net/manual/en/book.apcu.php" title="PHP: APCu - Manual" rel="nofollow">PHP: APCu - Manual</a></li><li><a href="https://varnish-cache.org/intro/" title="Introduction to Varnish — Varnish HTTP Cache" rel="nofollow">Introduction to Varnish — Varnish HTTP Cache</a> &mdash; Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache is really, really fast. It typically speeds up delivery with a factor of 300 - 1000x, depending on your architectur</li><li><a href="https://httpd.apache.org/docs/2.4/programs/ab.html" title="ab - Apache HTTP server benchmarking tool" rel="nofollow">ab - Apache HTTP server benchmarking tool</a> &mdash; ab is a tool for benchmarking your Apache Hypertext Transfer Protocol (HTTP) server. It is designed to give you an impression of how your current Apache installation performs. This especially shows you how many requests per second your Apache installation is capable of serving.</li><li><a href="https://gist.github.com/denji/8333630" title="HTTP(S) Benchmark Tools " rel="nofollow">HTTP(S) Benchmark Tools </a>
</li><li><a href="https://github.com/jimsalterjrs/network-testing" title="jimsalterjrs/network-testing" rel="nofollow">jimsalterjrs/network-testing</a> &mdash; This is a small collection of GPLv3-licensed tools to assist an intrepid researcher in testing the performance of networks, wired or wireless.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11397660/techsnap-0404.mp4" length="178751670" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.
Plus the right way to setup PHP, the trouble with benchmarking,…</itunes:subtitle>
      <itunes:summary>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</itunes:summary>
    </item>
    <item>
      <title>Keeping Systems Simple | TechSNAP 403</title>
      <itunes:title>Keeping Systems Simple | TechSNAP 403</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3769</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3769</guid>
      <id>29</id>
      <pubDate>Fri, 10 May 2019 21:10:00 +0200</pubDate>
      <description>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</description>
      <content:encoded><![CDATA[<p><p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a href="https://techsnap.systems/390" title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=WireGuard-V9-Maybe-Linux-5.2" title="WireGuard Sent Out Again For Review" rel="nofollow">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a href="https://securitybaron.com/news/cloudflare-warp-vpn/" title="CloudFlare announces Warp VPN" rel="nofollow">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=CloudFlare-BoringTun-WireGuard" title="CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a href="https://github.com/cloudflare/boringtun" title="cloudflare/boringtun" rel="nofollow">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.</p>

<p></li><li><a href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/" title="VPN protocol WireGuard now has an official macOS app" rel="nofollow">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html" title="WireGuard Windows Pre-Alpha" rel="nofollow">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a href="https://www.wintun.net/" title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a href="https://gravitational.com/blog/announcing_wormhole/" title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a href="https://github.com/gravitational/wormhole#getting-started" title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a href="https://www.phoronix.com/scan.php?page=news_item&px=NetworkManager-1.16-Released" title="NetworkManager 1.16" rel="nofollow">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a href="https://portal.cloud/app/subspace" title="Portal Cloud - Subspace" rel="nofollow">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.</p>

<p></li><li><a href="https://github.com/subspacecloud/subspace" title="subspacecloud/subspace" rel="nofollow">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a href="https://github.com/jimsalterjrs/wg-admin" title="jimsalterjrs/wg-admin" rel="nofollow">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-" title="5 big misconceptions about virtual LANs" rel="nofollow">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery" title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b" title="High Availability: Concepts and Theory" rel="nofollow">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html" title="RPO and RTO: Understanding the Differences" rel="nofollow">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a href="https://github.com/JupiterBroadcasting/Talks" title="JupiterBroadcasting/Talks" rel="nofollow">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a href="https://www.meetup.com/jupiterbroadcasting/events/260707829/" title="Command Line Threat Hunting" rel="nofollow">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/" title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11346817/techsnap-0403.mp4" length="210239488" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.Links:TechSNAP Episode 390: What’s Up with Wir…</itunes:subtitle>
      <itunes:summary>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</itunes:summary>
    </item>
    <item>
      <title>Snapshot Sanity | TechSNAP 402</title>
      <itunes:title>Snapshot Sanity | TechSNAP 402</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3712</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3712</guid>
      <id>30</id>
      <pubDate>Thu, 25 Apr 2019 16:55:00 +0200</pubDate>
      <description>We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.</description>
      <content:encoded><![CDATA[<p>We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.</p>

<p><p>Plus some handy tools to manage your snapshots, rsync war stories, and more!</p><p>Links:</p><ul><li><a href="https://github.com/jimsalterjrs/sanoid" title="sanoid: Policy-driven snapshot management and replication tools." rel="nofollow">sanoid: Policy-driven snapshot management and replication tools.</a> &mdash; Sanoid is a policy-driven snapshot management tool for ZFS filesystems. When combined with the Linux KVM hypervisor, you can use it to make your systems functionally immortal.</p>

<p></li><li><a href="https://github.com/jimsalterjrs/sanoid#syncoid" title="Syncoid" rel="nofollow">Syncoid</a> &mdash; Sanoid also includes a replication tool, syncoid, which facilitates the asynchronous incremental replication of ZFS filesystems. </li><li><a href="https://en.wikipedia.org/wiki/Copy-on-write" title="Copy-on-write - Wikipedia" rel="nofollow">Copy-on-write - Wikipedia</a></li><li><a href="https://www.cpp.edu/~gkuri/classes/ece426/ZFS.pdf" title="ZFS Paper" rel="nofollow">ZFS Paper</a></li><li><a href="https://mac-optimization.bestreviews.net/the-magic-behind-apfs-copy-on-write/" title="The Magic Behind APFS: Copy-On-Write" rel="nofollow">The Magic Behind APFS: Copy-On-Write</a> &mdash; The brand-new Apple File System (APFS) that landed with macOS High Sierra brings a handful of important new features that rely on a technique called copy-on-write (CoW).</li><li><a href="https://www.freebsd.org/doc/handbook/zfs.html" title="Chapter 19. The Z File System (ZFS)" rel="nofollow">Chapter 19. The Z File System (ZFS)</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11296374/techsnap-0402.mp4" length="168365825" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.
Plus some handy tools to manage your snapshots, rsync war stories, and…</itunes:subtitle>
      <itunes:summary>We continue our take on ZFS as Jim and Wes dive in to snapshots, replication, and the magic on copy on write.</itunes:summary>
    </item>
    <item>
      <title>Everyday ZFS | TechSNAP 401</title>
      <itunes:title>Everyday ZFS | TechSNAP 401</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3650</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3650</guid>
      <id>31</id>
      <pubDate>Thu, 11 Apr 2019 22:35:00 +0200</pubDate>
      <description>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</description>
      <content:encoded><![CDATA[<p>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</p>

<p><p>Plus when not to use ZFS, the surprising way your disks are lying to you, and more!</p><p>Links:</p><ul><li><a title="ZFS - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/ZFS">ZFS - Ubuntu Wiki</a> &mdash; ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.</li><li><a title="Performance tuning - OpenZFS" rel="nofollow" href="http://open-zfs.org/wiki/Performance_tuning#Alignment_shift">Performance tuning - OpenZFS</a> &mdash; Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11250319/techsnap-0401.mp4" length="250443274" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.
Plus when not to use ZFS, the surprising way your disks are lying to…</itunes:subtitle>
      <itunes:summary>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</itunes:summary>
    </item>
    <item>
      <title>Supply Chain Attacks | TechSNAP 400</title>
      <itunes:title>Supply Chain Attacks | TechSNAP 400</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3440</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3440</guid>
      <id>32</id>
      <pubDate>Thu, 28 Mar 2019 20:25:00 +0100</pubDate>
      <description>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</description>
      <content:encoded><![CDATA[<p>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</p>

<p><p>Plus an update from the linux vendor firmware service, your feedback, and more!</p><p>Links:</p><ul><li><a title="Joren Verspeurt on Twitter" rel="nofollow" href="https://twitter.com/JorenYuuji/status/1109040022341275648">Joren Verspeurt on Twitter</a> &mdash; The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.</li><li><a title="Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers" rel="nofollow" href="https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers">Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers</a> &mdash; The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.</li><li><a title="Malicious updates for ASUS laptops" rel="nofollow" href="https://www.kaspersky.com/blog/shadow-hammer-teaser/26149/">Malicious updates for ASUS laptops</a> &mdash; A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.</li><li><a title="Asus Live Update Patch Now Availabile" rel="nofollow" href="https://www.theregister.co.uk/2019/03/26/asus_live_update_patch/">Asus Live Update Patch Now Availabile</a> &mdash; Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.</li><li><a title="ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups" rel="nofollow" href="https://www.asus.com/News/hqfgVUyZ6uyAyJe1">ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups</a> &mdash; ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.</li><li><a title="The Messy Truth About Infiltrating Computer Supply Chains" rel="nofollow" href="https://theintercept.com/2019/01/24/computer-supply-chain-attacks/">The Messy Truth About Infiltrating Computer Supply Chains</a> &mdash; The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”</li><li><a title="Inside the Unnerving CCleaner Supply Chain Attack" rel="nofollow" href="https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/">Inside the Unnerving CCleaner Supply Chain Attack</a> &mdash; Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.</li><li><a title="ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/2017_shadowpad-how-attackers-hide-backdoor-in-software-used-by-hundreds-of-large-companies-around-the-world">ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World</a> &mdash; ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. </li><li><a title="Gaming industry still in the scope of attackers in Asia" rel="nofollow" href="https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/">Gaming industry still in the scope of attackers in Asia</a> &mdash; Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.</li><li><a title="Microsoft Security Intelligence Report Volume 24 is now available" rel="nofollow" href="https://www.microsoft.com/security/blog/2019/02/28/microsoft-security-intelligence-report-volume-24-is-now-available/">Microsoft Security Intelligence Report Volume 24 is now available</a> &mdash; Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.</li><li><a title="Microsoft Security Intelligence Report Volume 24" rel="nofollow" href="https://clouddamcdnprodep.azureedge.net/gdc/gdcVAOQd7/original">Microsoft Security Intelligence Report Volume 24</a></li><li><a title="Supply Chain Attacks Spiked 78 Percent in 2018" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2019/02/supply-chain-attacks-spiked-78-percent-2018-cyber-researchers-found/154996/">Supply Chain Attacks Spiked 78 Percent in 2018</a></li><li><a title="Supply Chain Security: A Talk by Bunnie Huang" rel="nofollow" href="https://www.bunniestudios.com/blog/?p=5519">Supply Chain Security: A Talk by Bunnie Huang</a> &mdash; I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.</li><li><a title="Attack inception: Compromised supply chain within a supply chain poses new risk" rel="nofollow" href="https://www.microsoft.com/security/blog/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/">Attack inception: Compromised supply chain within a supply chain poses new risk</a> &mdash; The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.</li><li><a title="Supply Chain Attacks and Secure Software Updates" rel="nofollow" href="https://paragonie.com/blog/2017/09/supply-chain-attacks-and-secure-software-updates">Supply Chain Attacks and Secure Software Updates</a> &mdash; In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.</li><li><a title="Bad USB, Very Bad USB" rel="nofollow" href="https://lmgsecurity.com/bad-usb-very-bad-usb/">Bad USB, Very Bad USB</a> &mdash; The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.</li><li><a title="Reflections on Trusting Trust by Ken Thompson" rel="nofollow" href="https://dl.acm.org/citation.cfm?id=358210">Reflections on Trusting Trust by Ken Thompson</a></li><li><a title="LVFS Project Announcement - The Linux Foundation" rel="nofollow" href="https://www.linuxfoundation.org/blog/2019/03/lvfs-project-announcement/">LVFS Project Announcement - The Linux Foundation</a> &mdash; The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.</li><li><a title="LVFS: Vendor Status" rel="nofollow" href="https://fwupd.org/vendorlist">LVFS: Vendor Status</a></li><li><a title="Two new supply-chain attacks come to light in less than a week" rel="nofollow" href="https://arstechnica.com/information-technology/2018/10/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week/">Two new supply-chain attacks come to light in less than a week</a> &mdash; Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.</li><li><a title="Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months" rel="nofollow" href="https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/">Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11198187/techsnap-0400.mp4" length="206388047" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.
Plus an update from the linux vendor firmware service, your feedback, and…</itunes:subtitle>
      <itunes:summary>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</itunes:summary>
    </item>
    <item>
      <title>Ethics in AI | TechSNAP 399</title>
      <itunes:title>Ethics in AI | TechSNAP 399</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3388</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3388</guid>
      <id>33</id>
      <pubDate>Fri, 15 Mar 2019 19:36:00 +0100</pubDate>
      <description>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</description>
      <content:encoded><![CDATA[<p><p>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</p><p>Links:</p><ul><li><a title="Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants" rel="nofollow" href="https://www.technologyreview.com/s/610634/microsofts-neo-nazi-sexbot-was-a-great-lesson-for-makers-of-ai-assistants/">Microsoft’s neo-Nazi sexbot was a great lesson for makers of AI assistants</a> &mdash; What started out as an entertaining social experiment—get regular people to talk to a chatbot so it could learn while they, hopefully, had fun—became a nightmare for Tay’s creators. Users soon figured out how to make Tay say awful things. Microsoft took the chatbot offline after less than a day.</li><li><a title="Microsoft&#39;s Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse" rel="nofollow" href="https://qz.com/1340990/microsofts-politically-correct-chat-bot-is-even-worse-than-its-racist-one/">Microsoft&#39;s Zo chatbot is a politically correct version of her sister Tay—except she’s much, much worse</a> &mdash; A few months after Tay’s disastrous debut, Microsoft quietly released Zo, a second English-language chatbot available on Messenger, Kik, Skype, Twitter, and Groupme.</li><li><a title="How to make a racist AI without really trying | ConceptNet blog" rel="nofollow" href="http://blog.conceptnet.io/posts/2017/how-to-make-a-racist-ai-without-really-trying/">How to make a racist AI without really trying | ConceptNet blog</a> &mdash; Some people expect that fighting algorithmic racism is going to come with some sort of trade-off. There’s no trade-off here. You can have data that’s better and less racist. You can have data that’s better because it’s less racist. There was never anything “accurate” about the overt racism that word2vec and GloVe learned.</li><li><a title="Microsoft warned investors that biased or flawed AI could hurt the company’s image" rel="nofollow" href="https://qz.com/1542377/microsoft-warned-investors-that-biased-or-flawed-ai-could-hurt-the-companys-image/">Microsoft warned investors that biased or flawed AI could hurt the company’s image</a> &mdash; Notably, this addition comes after a research paper by MIT Media Lab graduate researcher Joy Buolamwini showed in February 2018 that Microsoft’s facial recognition algorithm’s was less accurate for women and people of color. In response, Microsoft updated its facial recognition models, and wrote a blog post about how it was addressing bias in its software.</li><li><a title="AI bias: It is the responsibility of humans to ensure fairness" rel="nofollow" href="https://www.information-age.com/ai-bias-123479217/">AI bias: It is the responsibility of humans to ensure fairness</a> &mdash; Amazon recently pulled the plug on its experimental AI-powered recruitment engine when it was discovered that the machine learning technology behind it was exhibiting bias against female applicants.</li><li><a title="California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias" rel="nofollow" href="https://www.newsweek.com/california-police-artificial-intelligence-predictive-policing-predpol-santa-1358508">California Police Using AI Program That Tells Them Where to Patrol, Critics Say It May Just Reinforce Racial Bias</a> &mdash; “The potential for bias to creep into the deployment of the tools is enormous. Simply put, the devil is in the data,” Vincent Southerland, executive director of the Center on Race, Inequality, and the Law at NYU School of Law, wrote for the American Civil Liberties Union last year.</p>

<p></li><li><a title="A.I. Could Worsen Health Disparities" rel="nofollow" href="https://www.nytimes.com/2019/01/31/opinion/ai-bias-healthcare.html">A.I. Could Worsen Health Disparities</a> &mdash; A recent study found that some facial recognition programs incorrectly classify less than 1 percent of light-skinned men but more than one-third of dark-skinned women. What happens when we rely on such algorithms to diagnose melanoma on light versus dark skin?</li><li><a title="Responsible AI Practices" rel="nofollow" href="https://ai.google/education/responsible-ai-practices">Responsible AI Practices</a> &mdash; These questions are far from solved, and in fact are active areas of research and development. Google is committed to making progress in the responsible development of AI and to sharing knowledge, research, tools, datasets, and other resources with the larger community. Below we share some of our current work and recommended practices.</li><li><a title="The Ars Technica System Guide, Winter 2019: The one about the servers" rel="nofollow" href="https://arstechnica.com/gadgets/2019/03/the-ars-technica-system-guide-winter-2019-the-one-about-the-servers/">The Ars Technica System Guide, Winter 2019: The one about the servers</a> &mdash; The Winter 2019 Ars System Guide has returned to its roots: showing readers three real-world system builds we like at this precise moment in time. Instead of general performance desktops, this time around we're going to focus specifically on building some servers.</li><li><a title="Introduction to Python Development at Linux Academy" rel="nofollow" href="https://linuxacademy.com/devops/training/course/name/intro-to-python-development?utm_source=social&amp;utm_medium=twitter&amp;utm_campaign=2019_aprilcourselaunch">Introduction to Python Development at Linux Academy</a> &mdash; This course is designed to teach you how to program using Python. We'll cover the building blocks of the language, programming design fundamentals, how to use the standard library, third-party packages, and how to create Python projects. In the end, you should have a grasp of how to program.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11158744/techsnap-0399.mp4" length="245747955" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious…</itunes:subtitle>
      <itunes:summary>Machine learning promises to change many industries, but with these changes come dangerous new risks. Join Jim and Wes as they explore some of the surprising ways bias can creep in and the serious consequences of ignoring these problems.</itunes:summary>
    </item>
    <item>
      <title>Proper Password Procedures | TechSNAP 398</title>
      <itunes:title>Proper Password Procedures | TechSNAP 398</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3328</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3328</guid>
      <id>34</id>
      <pubDate>Thu, 28 Feb 2019 18:08:00 +0100</pubDate>
      <description>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</description>
      <content:encoded><![CDATA[<p>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</p>

<p><p>Plus the benefits of passphrases, and what you can do to keep your local providers on the up and up.</p><p>Links:</p><ul><li><a title="Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/02/plain-wrong-millions-of-utility-customers-passwords-stored-in-plain-text/">Plain wrong: Millions of utility customers’ passwords stored in plain text | Ars Technica</a> &mdash; In September of 2018, an anonymous independent security researcher (who we'll call X) noticed that their power company's website was offering to email—not reset!—lost account passwords to forgetful users. Startled, X fed the online form the utility account number and the last four phone number digits it was asking for. Sure enough, a few minutes later the account password, in plain text, was sitting in X's inbox.</li><li><a title="The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |" rel="nofollow" href="https://inspiredelearning.com/blog/the-linkedin-hack-understanding-why-it-was-so-easy-to-crack-the-passwords-2/">The LinkedIn Hack: Understanding Why It Was So Easy to Crack the Passwords |</a> &mdash; LinkedIn stated that after the initial 2012 breach, they added enhanced protection, most likely adding the “salt” functionality to their passwords. However, if you have not changed your password since 2012, you do not have the added protection of a salted password hash. You may be asking yourself–what on earth are hashing and salting and how does this all work?</li><li><a title="How Developers got Password Security so Wrong" rel="nofollow" href="https://blog.cloudflare.com/how-developers-got-password-security-so-wrong/">How Developers got Password Security so Wrong</a> &mdash; As time has gone on; developers have continued to store passwords insecurely, and users have continued to set them weakly. Despite this, no viable alternative has been created for password security.</li><li><a title="Adding Salt to Hashing: A Better Way to Store Passwords" rel="nofollow" href="https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/">Adding Salt to Hashing: A Better Way to Store Passwords</a> &mdash; A salt is added to the hashing process to force their uniqueness, increase their complexity without increasing user requirements, and to mitigate password attacks like rainbow tables.</p>

<p></li><li><a title="Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study" rel="nofollow" href="https://arxiv.org/abs/1708.08759">Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study</a> &mdash; We were interested in exploring two particular aspects: Firstly, do developers get things wrong because they do not think about security and thus do not include security features (but could if they wanted to)? Or do they write insecure code because the complexity of the task is too great for them? Secondly, a common suggestion to increase security is to offer secure defaults.</li><li><a title="OWASP Password Storage Cheatsheet" rel="nofollow" href="https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Password_Storage_Cheat_Sheet.md">OWASP Password Storage Cheatsheet</a> &mdash; This article provides guidance on properly storing passwords, secret question responses, and similar credential information.</li><li><a title="Secure Salted Password Hashing - How to do it Properly" rel="nofollow" href="https://crackstation.net/hashing-security.htm">Secure Salted Password Hashing - How to do it Properly</a> &mdash; If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.</li><li><a title="Plain Text Offenders" rel="nofollow" href="http://plaintextoffenders.com/">Plain Text Offenders</a> &mdash; We’re tired of websites abusing our trust and storing our passwords in plain text, exposing us to danger. Here we put websites we believe to be practicing this to shame.</li><li><a title="Cybersecurity 101: Why you need to use a password manager | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/12/25/cybersecurity-101-guide-password-manager/">Cybersecurity 101: Why you need to use a password manager | TechCrunch</a> &mdash; Think of a password manager like a book of your passwords, locked by a master key that only you know.</li><li><a title="On the Security of Password Managers - Schneier on Security" rel="nofollow" href="https://www.schneier.com/blog/archives/2019/02/on_the_security_1.html">On the Security of Password Managers - Schneier on Security</a> &mdash; There's new research on the security of password managers, specifically 1Password, Dashlane, KeePass, and Lastpass. This work specifically looks at password leakage on the host computer. That is, does the password manager accidentally leave plaintext copies of the password lying around memory?</li><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; It's the 20th anniversary of LinuxFest Northwest! Come join your favorite Jupiter Broadcasting hosts at the Pacific Northwest's premier Linux event.</li><li><a title="SCALE 17x" rel="nofollow" href="https://www.socallinuxexpo.org/scale/17x">SCALE 17x</a> &mdash; The 17th annual Southern California Linux Expo – will take place on March. 7-10, 2019, at the Pasadena Convention Center. SCaLE 17x expects to host 150 exhibitors this year, along with nearly 130 sessions, tutorials and special events.</li><li><a title="Jupiter Broadcasting Meetups" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/">Jupiter Broadcasting Meetups</a> &mdash; The best place to find out when Jupiter Broadcasting has a meetup near you! Also stay tuned for upcoming virtual study groups.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11112173/techsnap-0398.mp4" length="199198281" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.
Plus the benefits of passphrases, and what…</itunes:subtitle>
      <itunes:summary>We reveal the shady password practices that are all too common at many utility providers, and hash out why salts are essential to proper password storage.</itunes:summary>
    </item>
    <item>
      <title>Quality Tools | TechSNAP 397</title>
      <itunes:title>Quality Tools | TechSNAP 397</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3266</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3266</guid>
      <id>35</id>
      <pubDate>Thu, 14 Feb 2019 21:15:00 +0100</pubDate>
      <description>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS.</description>
      <content:encoded><![CDATA[<p>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. </p>

<p><p>Plus the importance of sane defaults and why netdata belongs on every system.</p><p>Links:</p><ul><li><a title="Why you want QoS - Netdata Documentation" rel="nofollow" href="https://docs.netdata.cloud/collectors/tc.plugin/#why-you-want-qos">Why you want QoS - Netdata Documentation</a> &mdash; One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11072764/techsnap-0397.mp4" length="257999201" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. 
Plus the importance of sane defaults and…</itunes:subtitle>
      <itunes:summary>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS.</itunes:summary>
    </item>
    <item>
      <title>Floating Point Problems | TechSNAP 396</title>
      <itunes:title>Floating Point Problems | TechSNAP 396</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3211</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3211</guid>
      <id>36</id>
      <pubDate>Thu, 31 Jan 2019 20:50:00 +0100</pubDate>
      <description>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</description>
      <content:encoded><![CDATA[<p>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</p>

<p><p>Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.</p><p>Special Guest: Richard Yao.</p><p>Links:</p><ul><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; Join a bunch of JB hosts and community celebrating the 20th anniversary! </li><li><a title="Choose Linux" rel="nofollow" href="https://chooselinux.show/">Choose Linux</a> &mdash; The show that captures the excitement of discovering Linux.</li><li><a title="Linux 5.0: _kernel_fpu{begin,end} no longer exported" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8259">Linux 5.0: <em>kernel</em>fpu{begin,end} no longer exported</a> &mdash; The latest kernels removed the old compatibility headers.</li><li><a title="ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Workaround">ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support</a> &mdash; So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.</li><li><a title="Re: x86/fpu: Don&#39;t export __kernel_fpu_{begin,end}()" rel="nofollow" href="https://marc.info/?l=linux-kernel&amp;m=154714516832389">Re: x86/fpu: Don&#39;t export __kernel<em>fpu</em>{begin,end}()</a> &mdash; My tolerance for ZFS is pretty non-existant.  Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?</li><li><a title="The future of ZFS in FreeBSD" rel="nofollow" href="https://lists.freebsd.org/pipermail/freebsd-current/2018-December/072422.html">The future of ZFS in FreeBSD</a> &mdash; This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.</li><li><a title="Dephix: Kickoff to The Future" rel="nofollow" href="https://www.delphix.com/blog/kickoff-future-eko-2018">Dephix: Kickoff to The Future</a> &mdash; OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.</li><li><a title="The future of ZFS on Linux [zfs-discuss] " rel="nofollow" href="http://list.zfsonlinux.org/pipermail/zfs-discuss/2019-January/033300.html">The future of ZFS on Linux [zfs-discuss] </a> &mdash; 
Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. </p>

<p>Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.</li><li><a title="LINUX Unplugged Episode 284: Free as in Get Out" rel="nofollow" href="https://linuxunplugged.com/284">LINUX Unplugged Episode 284: Free as in Get Out</a></li><li><a title="BSD Now 279: Future of ZFS" rel="nofollow" href="https://www.bsdnow.tv/episodes/2019_01_02-future_of_zfs">BSD Now 279: Future of ZFS</a></li><li><a title="BSD Now 157: ZFS, The “Universal” File-system" rel="nofollow" href="https://www.bsdnow.tv/episodes/2016_08_31-the_universal_filesystem">BSD Now 157: ZFS, The “Universal” File-system</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11033585/techsnap-0396.mp4" length="173948789" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things…</itunes:subtitle>
      <itunes:summary>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</itunes:summary>
    </item>
    <item>
      <title>The ACME Era | TechSNAP 395</title>
      <itunes:title>The ACME Era | TechSNAP 395</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3164</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3164</guid>
      <id>37</id>
      <pubDate>Sun, 20 Jan 2019 20:50:00 +0100</pubDate>
      <description>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</description>
      <content:encoded><![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p><p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let&#39;s Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let&#39;s Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let&#39;s Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let&#39;s Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/11000440/techsnap-0395.mp4" length="92663402" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.
The history, the clients, and the from-the-field details you'll want to know.Links: Let’s Encrypt and CertBot – JRS…</itunes:subtitle>
      <itunes:summary>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</itunes:summary>
    </item>
    <item>
      <title>All About Azure | TechSNAP 394</title>
      <itunes:title>All About Azure | TechSNAP 394</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3127</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3127</guid>
      <id>38</id>
      <pubDate>Thu, 10 Jan 2019 04:00:00 +0100</pubDate>
      <description>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths. Special Guest: Chad M. Crowell.</description>
      <content:encoded><![CDATA[<p><p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft&#39;s Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/cp/modules/view/id/263"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10974750/techsnap-0394.mp4" length="70147297" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.Special Guest: Chad M. Crowell.Links:Under the sea,…</itunes:subtitle>
      <itunes:summary>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths. Special Guest: Chad M. Crowell.</itunes:summary>
    </item>
    <item>
      <title>Back to our /roots | TechSNAP 393</title>
      <itunes:title>Back to our /roots | TechSNAP 393</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3088</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3088</guid>
      <id>39</id>
      <pubDate>Thu, 03 Jan 2019 04:05:00 +0100</pubDate>
      <description>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</description>
      <content:encoded><![CDATA[<p><p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10952619/techsnap-0393.mp4" length="60837624" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.Links:Jim Salter &amp;mdash; Jim Salter (@jrssnet) is an author, public sp…</itunes:subtitle>
      <itunes:summary>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</itunes:summary>
    </item>
    <item>
      <title>Keeping up with Kubernetes | TechSNAP 392</title>
      <itunes:title>Keeping up with Kubernetes | TechSNAP 392</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-3023</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-3023</guid>
      <id>40</id>
      <pubDate>Wed, 12 Dec 2018 19:05:00 +0100</pubDate>
      <description>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong.</description>
      <content:encoded><![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p><p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10900643/techsnap-0392.mp4" length="74348896" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
Plus the biggest stories out of Kubecon, and serverless gets s…</itunes:subtitle>
      <itunes:summary>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong.</itunes:summary>
    </item>
    <item>
      <title>Firecracker Fundamentals | TechSNAP 391</title>
      <itunes:title>Firecracker Fundamentals | TechSNAP 391</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2965</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2965</guid>
      <id>41</id>
      <pubDate>Thu, 29 Nov 2018 14:05:00 +0100</pubDate>
      <description>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</description>
      <content:encoded><![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p><p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.</p>

<p></li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10854709/techsnap-0391.mp4" length="59074303" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.
Plus some good news for OpenBGP and t…</itunes:subtitle>
      <itunes:summary>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</itunes:summary>
    </item>
    <item>
      <title>What’s Up with WireGuard | TechSNAP 390</title>
      <itunes:title>What’s Up with WireGuard | TechSNAP 390</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2918</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2918</guid>
      <id>42</id>
      <pubDate>Thu, 22 Nov 2018 10:50:00 +0100</pubDate>
      <description>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t. Special Guest: Jim Salter.</description>
      <content:encoded><![CDATA[<p><p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10816829/techsnap-0390.mp4" length="96140375" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.Special Guest: Jim Sal…</itunes:subtitle>
      <itunes:summary>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t. Special Guest: Jim Salter.</itunes:summary>
    </item>
    <item>
      <title>The Future of HTTP | TechSNAP 389</title>
      <itunes:title>The Future of HTTP | TechSNAP 389</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2895</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2895</guid>
      <id>43</id>
      <pubDate>Thu, 15 Nov 2018 15:05:00 +0100</pubDate>
      <description>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</description>
      <content:encoded><![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</p>

<p><p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> — Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been 'hijacking the vital internet backbone of western countries'" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> — The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> — Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10781607/techsnap-0389.mp4" length="121645866" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.
Plus the latest router botnet, why you should never go full UPnP, and the benefits of building…</itunes:subtitle>
      <itunes:summary>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</itunes:summary>
    </item>
    <item>
      <title>The One About eBPF | TechSNAP 388</title>
      <itunes:title>The One About eBPF | TechSNAP 388</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2753</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2753</guid>
      <id>44</id>
      <pubDate>Thu, 25 Oct 2018 15:30:00 +0200</pubDate>
      <description>We explain what eBPF is, how it works, and its proud BSD production legacy.  eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and pow</description>
      <content:encoded><![CDATA[<p>We explain what eBPF is, how it works, and its proud BSD production legacy.</p>

<p>eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10655740/techsnap-0388.mp4" length="98575767" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We explain what eBPF is, how it works, and its proud BSD production legacy.
eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, h…</itunes:subtitle>
      <itunes:summary>We explain what eBPF is, how it works, and its proud BSD production legacy.  eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and pow</itunes:summary>
    </item>
    <item>
      <title>Private Cloud Building Blocks | TechSNAP 387</title>
      <itunes:title>Private Cloud Building Blocks | TechSNAP 387</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2697</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2697</guid>
      <id>45</id>
      <pubDate>Thu, 11 Oct 2018 18:19:00 +0200</pubDate>
      <description>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</description>
      <content:encoded><![CDATA[<p>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</p>

<p>Plus a few warm up stories, a war story, and more.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10543683/techsnap-0387.mp4" length="90314733" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original…</itunes:subtitle>
      <itunes:summary>We bring in Amy Marrich to break down the building blocks of OpenStack. There are nearly an overwhelming number of ways to manage your infrastructure, and we learn about one of the original tools.</itunes:summary>
    </item>
    <item>
      <title>What Makes Google Cloud Different | TechSNAP 386</title>
      <itunes:title>What Makes Google Cloud Different | TechSNAP 386</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2667</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2667</guid>
      <id>46</id>
      <pubDate>Thu, 04 Oct 2018 17:01:00 +0200</pubDate>
      <description>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </description>
      <content:encoded><![CDATA[<p>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </p>

<p>Plus how Google hopes Roughtime will solve one of the web’s biggest problems, some great emails, and more!</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10484955/techsnap-0386.mp4" length="94941333" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. 
Plus how Google hopes Roughtime will solve one of the web’s …</itunes:subtitle>
      <itunes:summary>We bring on our Google Cloud expert and explore the fundamentals, demystify some of the magic, and ask what makes Google Cloud different. </itunes:summary>
    </item>
    <item>
      <title>3 Things to Know About Kubernetes | TechSNAP 385</title>
      <itunes:title>3 Things to Know About Kubernetes | TechSNAP 385</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2637</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2637</guid>
      <id>47</id>
      <pubDate>Thu, 27 Sep 2018 16:47:00 +0200</pubDate>
      <description>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</description>
      <content:encoded><![CDATA[<p>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</p>

<p>Plus the privacy improvements that could be coming to HTTPS, and a new SSH auditing tool hits the open source scene. </p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10425673/techsnap-0385.mp4" length="61592365" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.
Plus the p…</itunes:subtitle>
      <itunes:summary>Kubernetes expert Will Boyd joins us to explain the top 3 things to know about Kubernetes, when it’s the right tool for the job, and building highly available production grade clusters.</itunes:summary>
    </item>
    <item>
      <title>Interplanetary Peers | TechSNAP 384</title>
      <itunes:title>Interplanetary Peers | TechSNAP 384</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2605</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2605</guid>
      <id>48</id>
      <pubDate>Fri, 21 Sep 2018 07:36:00 +0200</pubDate>
      <description>Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.  Plus, Magecart strikes again, Alpine has package problems, and why you shouldn't trust Wester</description>
      <content:encoded><![CDATA[<p>Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.</p>

<p>Plus, Magecart strikes again, Alpine has package problems, and why you shouldn't trust Western Digital's MyCloud.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10371041/techsnap-0384.mp4" length="98825343" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.
Plus, Magecart strikes again, Alpine…</itunes:subtitle>
      <itunes:summary>Jon the Nice Guy joins Wes to discuss all things IPFS. We'll explore what it does, how it works, and why it might be the best hope for a decentralized internet.  Plus, Magecart strikes again, Alpine has package problems, and why you shouldn't trust Wester</itunes:summary>
    </item>
    <item>
      <title>The Power of Shame | TechSNAP 383</title>
      <itunes:title>The Power of Shame | TechSNAP 383</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2564</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2564</guid>
      <id>49</id>
      <pubDate>Fri, 14 Sep 2018 07:47:00 +0200</pubDate>
      <description>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.  Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some grea</description>
      <content:encoded><![CDATA[<p>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.</p>

<p>Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some great picks.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10313351/techsnap-0383.mp4" length="133736299" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.
Plus, how Mozilla is protecting…</itunes:subtitle>
      <itunes:summary>TechSNAP progenitor and special guest Allan Jude joins us to talk mobile security, hand out some SSH tips and tricks, and discuss why security shaming works so well.  Plus, how Mozilla is protecting their GitHub repos, a check-in on Equifax, and some grea</itunes:summary>
    </item>
    <item>
      <title>Domestic Disappointments | TechSNAP 382</title>
      <itunes:title>Domestic Disappointments | TechSNAP 382</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2526</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2526</guid>
      <id>50</id>
      <pubDate>Fri, 07 Sep 2018 07:10:00 +0200</pubDate>
      <description>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.  Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from </description>
      <content:encoded><![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10255920/techsnap-0382.mp4" length="117247755" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.
Plus the latest vulnerabilities i…</itunes:subtitle>
      <itunes:summary>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.  Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from </itunes:summary>
    </item>
    <item>
      <title>Here Comes Cloud DNS | TechSNAP 381</title>
      <itunes:title>Here Comes Cloud DNS | TechSNAP 381</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2486</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2486</guid>
      <id>51</id>
      <pubDate>Thu, 30 Aug 2018 08:51:00 +0200</pubDate>
      <description>To make DNS more secure we must move it to the cloud...at least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.  Plus new active attacks against Apac</description>
      <content:encoded><![CDATA[<p>To make DNS more secure we must move it to the cloud...at least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.</p>

<p>Plus new active attacks against Apache Struts and a Windows 10 zero-day exposed on Twitter.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10189171/techsnap-0380.mp4" length="87180854" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>To make DNS more secure we must move it to the cloud...at least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has ove…</itunes:subtitle>
      <itunes:summary>To make DNS more secure we must move it to the cloud...at least that’s what Mozilla and Google suggest. We breakdown DNS-over-HTTPS, why it requires a “cloud” component, and the advantages it has over traditional DNS.  Plus new active attacks against Apac</itunes:summary>
    </item>
    <item>
      <title>Terminal Fault | TechSNAP 380</title>
      <itunes:title>Terminal Fault | TechSNAP 380</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2438</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2438</guid>
      <id>52</id>
      <pubDate>Thu, 16 Aug 2018 18:16:00 +0200</pubDate>
      <description>Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers. </description>
      <content:encoded><![CDATA[<p>Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers. </p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/10051490/techsnap-0380.mp4" length="87180854" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers. 
</itunes:subtitle>
      <itunes:summary>Microsoft’s making radical changes to Windows 10, and a new type of speculative execution attack on Intel’s processors is targeting cloud providers. </itunes:summary>
    </item>
    <item>
      <title>SegmentSmack is Whack | TechSNAP 379</title>
      <itunes:title>SegmentSmack is Whack | TechSNAP 379</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2408</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2408</guid>
      <id>53</id>
      <pubDate>Fri, 10 Aug 2018 16:39:00 +0200</pubDate>
      <description>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </description>
      <content:encoded><![CDATA[<p>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers.</p>

<p>It’s a busy TechSNAP week.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9997532/techsnap-0379.mp4" length="78072814" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers.
It’s a busy TechSNAP week.
</itunes:subtitle>
      <itunes:summary>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </itunes:summary>
    </item>
    <item>
      <title>Two-Factor Fraud | TechSNAP 378</title>
      <itunes:title>Two-Factor Fraud | TechSNAP 378</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2362</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2362</guid>
      <id>54</id>
      <pubDate>Thu, 02 Aug 2018 18:41:00 +0200</pubDate>
      <description>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</description>
      <content:encoded><![CDATA[<p>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</p>

<p>Plus a Spectre attack over the network, BGP issues take out Telegram, and more!</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9918424/techsnap-0378.mp4" length="85003083" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.
Plus a Spectre attack…</itunes:subtitle>
      <itunes:summary>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</itunes:summary>
    </item>
    <item>
      <title>Linux Under Pressure | TechSNAP 377</title>
      <itunes:title>Linux Under Pressure | TechSNAP 377</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2348</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2348</guid>
      <id>55</id>
      <pubDate>Wed, 01 Aug 2018 12:49:00 +0200</pubDate>
      <description>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</description>
      <content:encoded><![CDATA[<p>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</p>

<p>Plus the death of a TLD, the return of SamSam, and more!</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9906122/techsnap-0377.mp4" length="77033259" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.
Plus the death of…</itunes:subtitle>
      <itunes:summary>Some new tools will give you better insights into your system under extreme load, and we flash back to the days of AOL and discuss the new way social hackers are spreading malware.</itunes:summary>
    </item>
    <item>
      <title>Google Don’t Front | TechSNAP 376</title>
      <itunes:title>Google Don’t Front | TechSNAP 376</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2321</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2321</guid>
      <id>56</id>
      <pubDate>Thu, 26 Jul 2018 21:07:00 +0200</pubDate>
      <description>We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.</description>
      <content:encoded><![CDATA[<p>Google and Amazon recently shutdown Domain Fronting. Their abrupt change has created a building backlash. </p>

<p>We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.</p>

<p>Plus how road navigation systems can be spoofed with $223  in hardware, and another bad Bluetooth bug.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9868421/techsnap-0376.mp4" length="92160611" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Google and Amazon recently shutdown Domain Fronting. Their abrupt change has created a building backlash. 
We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and w…</itunes:subtitle>
      <itunes:summary>We’ll explain what Domain Fronting is, how activists can use it to avoid censorship, and why large organizations are compelled to disable it.</itunes:summary>
    </item>
    <item>
      <title>Surprise Root Access | TechSNAP 375</title>
      <itunes:title>Surprise Root Access | TechSNAP 375</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2294</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2294</guid>
      <id>57</id>
      <pubDate>Thu, 19 Jul 2018 20:50:00 +0200</pubDate>
      <description>Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</description>
      <content:encoded><![CDATA[<p>Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</p>

<p>Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more "undocumented" root passwords.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9802745/techsnap-0375.mp4" length="97479823" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.
Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds…</itunes:subtitle>
      <itunes:summary>Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</itunes:summary>
    </item>
    <item>
      <title>Quantum Resistant Encryption | TechSNAP 374</title>
      <itunes:title>Quantum Resistant Encryption | TechSNAP 374</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2265</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2265</guid>
      <id>58</id>
      <pubDate>Fri, 13 Jul 2018 07:24:00 +0200</pubDate>
      <description>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</description>
      <content:encoded><![CDATA[<p>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</p>

<p>Plus how bad defaults led to the theft of military Drone docs, new attacks against LTE networks, more!</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9741146/techsnap-0374.mp4" length="128583282" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.
Plus how bad defaults led to the theft of military …</itunes:subtitle>
      <itunes:summary>Good progress is being made on post-quantum resilient computing. We’ll explain how they’re achieving it, the risks facing traditional cryptography.</itunes:summary>
    </item>
    <item>
      <title>FreeBSD Already Does That | TechSNAP 373</title>
      <itunes:title>FreeBSD Already Does That | TechSNAP 373</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2206</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2206</guid>
      <id>59</id>
      <pubDate>Thu, 05 Jul 2018 07:57:00 +0200</pubDate>
      <description>Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.</description>
      <content:encoded><![CDATA[<p>Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.</p>

<p>Joined by Jed and Jeff they have a wide ranging organic conversation. </p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9655832/techsnap-0373.mp4" length="172842149" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.
Joined by Jed and Jeff they have a wide ranging organic conversation. 
</itunes:subtitle>
      <itunes:summary>Allan Jude and Wes sit-down for a special live edition of the TechSNAP program.</itunes:summary>
    </item>
    <item>
      <title>Logs and Metrics and Traces, Oh My! | TechSNAP 372</title>
      <itunes:title>Logs and Metrics and Traces, Oh My! | TechSNAP 372</itunes:title>
      <itunes:episode>372</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2111</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2111</guid>
      <id>60</id>
      <pubDate>Thu, 14 Jun 2018 17:25:00 +0200</pubDate>
      <description>Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.</description>
      <content:encoded><![CDATA[<p>Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.</p>

<p>Plus the Lazy State FPU bug that cropped up this week, backdoored Docker images, your questions, and more!</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9456273/techsnap-0372.mp4" length="97988843" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.
Plus the Lazy State FPU bug that cropped up this week,…</itunes:subtitle>
      <itunes:summary>Netflix has learned the hard way how to utilize all the logs, we cover their lessons in their journey to build a fully observable system.</itunes:summary>
    </item>
    <item>
      <title>They Never Learn | TechSNAP 271</title>
      <itunes:title>They Never Learn | TechSNAP 271</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2079</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2079</guid>
      <id>61</id>
      <pubDate>Fri, 08 Jun 2018 09:30:00 +0200</pubDate>
      <description>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.  Plus the mass exploit of Drupalgeddon2 continues, we br</description>
      <content:encoded><![CDATA[<p>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.</p>

<p>Plus the mass exploit of Drupalgeddon2 continues, we break down why, a batch of questions, and more.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9397782/techsnap-0371.mp4" length="119738331" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first…</itunes:subtitle>
      <itunes:summary>Microsoft puts a data center under the ocean, and they might be onto something. The Zip Slip vulnerability sneaks into your software, and VPNFilter turns out to be more complicated than first known.  Plus the mass exploit of Drupalgeddon2 continues, we br</itunes:summary>
    </item>
    <item>
      <title>Hidden in Plain Sight | TechSNAP 370</title>
      <itunes:title>Hidden in Plain Sight | TechSNAP 370</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-2034</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-2034</guid>
      <id>62</id>
      <pubDate>Fri, 01 Jun 2018 15:23:00 +0200</pubDate>
      <description>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.  Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should k</description>
      <content:encoded><![CDATA[<p>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.  Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should k</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9333232/techsnap-0370.mp4" length="134356897" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication. Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is…</itunes:subtitle>
      <itunes:summary>We explain how the much hyped VPNFilter malware actually works, and its rather surprising sophistication.  Plus a clear break down of the recent Kubernetes news, how a 40 year old tel-co protocol is being abused today, and a Git vulnerability you should k</itunes:summary>
    </item>
    <item>
      <title>Another Pass at Bypass | TechSNAP 369</title>
      <itunes:title>Another Pass at Bypass | TechSNAP 369</itunes:title>
      <itunes:episode>369</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1981</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1981</guid>
      <id>63</id>
      <pubDate>Wed, 23 May 2018 14:31:00 +0200</pubDate>
      <description>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </description>
      <content:encoded><![CDATA[<p>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </p>

<p>Plus this week’s security news has a bit of a theme, and we share some great war stories sent into the show.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9246145/techsnap-0369.mp4" length="120310241" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. 
Plus this week’s security news has a bit of a theme, and we share some great war stories sent in…</itunes:subtitle>
      <itunes:summary>We’ll explain how Speculative Store Bypass works, and the new mitigation techniques that are inbound. </itunes:summary>
    </item>
    <item>
      <title>EFail Explained | TechSNAP 368</title>
      <itunes:title>EFail Explained | TechSNAP 368</itunes:title>
      <itunes:episode>368</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1937</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1937</guid>
      <id>64</id>
      <pubDate>Wed, 16 May 2018 17:08:00 +0200</pubDate>
      <description>The EFail hype train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</description>
      <content:encoded><![CDATA[<p>The EFail hype train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</p>

<p>Plus things  to consider when deciding on-premises vs a cloud deployment, and the all business gadget from 1971 that kicked off the consumer electronics revolution. </p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9164383/techsnap-0368.mp4" length="97455730" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>The EFail hype train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.
Plus things to consider when dec…</itunes:subtitle>
      <itunes:summary>The EFail hype train has hit hypersonic speed, we’ll tap the breaks and explain who disclosed it, what it is, what it’s not, our recommendations, and early reactions.</itunes:summary>
    </item>
    <item>
      <title>FreeNAS Uber Build | TechSNAP 367</title>
      <itunes:title>FreeNAS Uber Build | TechSNAP 367</itunes:title>
      <itunes:episode>367</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1907</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1907</guid>
      <id>65</id>
      <pubDate>Thu, 10 May 2018 18:46:00 +0200</pubDate>
      <description>Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.</description>
      <content:encoded><![CDATA[<p>Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9107940/techsnap-0367.mp4" length="101475298" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.
</itunes:subtitle>
      <itunes:summary>Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.</itunes:summary>
    </item>
    <item>
      <title>Catching up with Allan | TechSNAP 366</title>
      <itunes:title>Catching up with Allan | TechSNAP 366</itunes:title>
      <itunes:episode>366</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1864</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1864</guid>
      <id>66</id>
      <pubDate>Wed, 02 May 2018 19:29:00 +0200</pubDate>
      <description>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</description>
      <content:encoded><![CDATA[<p>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</p>

<p>Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/9039734/techsnap-0366.mp4" length="131620291" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.
Plus the vulnerabilities found in Volkswagen cars, and the…</itunes:subtitle>
      <itunes:summary>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</itunes:summary>
    </item>
    <item>
      <title>The Unfixable Exploit | TechSNAP 365</title>
      <itunes:title>The Unfixable Exploit | TechSNAP 365</itunes:title>
      <itunes:episode>365</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1821</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1821</guid>
      <id>67</id>
      <pubDate>Wed, 25 Apr 2018 09:55:25 +0200</pubDate>
      <description>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.</description>
      <content:encoded><![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8968417/techsnap-0365.mp4" length="103092843" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.
</itunes:subtitle>
      <itunes:summary>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.</itunes:summary>
    </item>
    <item>
      <title>The Case for Monitoring | TechSNAP 364</title>
      <itunes:title>The Case for Monitoring | TechSNAP 364</itunes:title>
      <itunes:episode>364</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1784</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1784</guid>
      <id>68</id>
      <pubDate>Wed, 18 Apr 2018 13:12:00 +0200</pubDate>
      <description>We cover the all the bases this week in our TechSNAP introduction to server monitoring.</description>
      <content:encoded><![CDATA[<p>We cover the all the bases this week in our TechSNAP introduction to server monitoring.</p>

<p>Why you should monitor, what you should monitor, the basics of Nagios, the biggest drawbacks of Nagios, it’s alternatives, and our lessons learned from the trenches. </p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8898320/techsnap-0364.mp4" length="105178909" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We cover the all the bases this week in our TechSNAP introduction to server monitoring.
Why you should monitor, what you should monitor, the basics of Nagios, the biggest drawbacks of Nagios, it’s a…</itunes:subtitle>
      <itunes:summary>We cover the all the bases this week in our TechSNAP introduction to server monitoring.</itunes:summary>
    </item>
    <item>
      <title>Tips from the Top  | TechSNAP 363</title>
      <itunes:title>Tips from the Top  | TechSNAP 363</itunes:title>
      <itunes:episode>363</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1744</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1744</guid>
      <id>69</id>
      <pubDate>Thu, 12 Apr 2018 14:11:00 +0200</pubDate>
      <description>Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.</description>
      <content:encoded><![CDATA[<p>Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.</p>

<p>Plus a tricky use of zero-width characters to catch a leaker, a breakdown of the new BranchScope attack, and a full post-mortem of the recent Travis CI outage.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8839405/techsnap-0363.mp4" length="119938088" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.
Plus a tricky use of zero-width characters to catch a leaker, a breakdown o…</itunes:subtitle>
      <itunes:summary>Getting started or getting ahead in IT is a moving target, so we’ve crowd sourced some of the best tips and advice to help.</itunes:summary>
    </item>
    <item>
      <title>Rebuilding it Better | TechSNAP 362</title>
      <itunes:title>Rebuilding it Better | TechSNAP 362</itunes:title>
      <itunes:episode>362</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1700</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1700</guid>
      <id>70</id>
      <pubDate>Wed, 04 Apr 2018 10:57:00 +0200</pubDate>
      <description>It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. </description>
      <content:encoded><![CDATA[<p>It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. </p>

<p>Plus a recent spat of data leaks suggest a common theme, Microsoft’s self inflicted Total Meltdown flaw, and playing around with DNS Rebinding attacks for fun.</p>

<h4><a href="https://www.wired.com/story/under-armour-myfitnesspal-hack-password-hashing/">The Under Armour Hack Was Even Worse Than It Had To Be </a></h4>

<blockquote>
  <p>Under Armour Inc (UAA.N) (UA.N) said on Thursday that data from some 150 million MyFitnessPal diet and fitness app accounts was compromised in February, in one of the biggest hacks in history, sending shares of the athletic apparel maker down 3 percent in after-hours trade.</p>
</blockquote>

<h4><a href="https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/">Panerabread.com Leaks Millions of Customer Records  </a></h4>

<blockquote>
  <p>The data available in plain text from Panera’s site appeared to include records for any customer who has signed up for an account to order food online via panerabread.com.</p>
</blockquote>

<ul>
<li><a href="https://medium.com/@djhoulihan/no-panera-bread-doesnt-take-security-seriously-bf078027f815">No, Panera Bread Doesn’t Take Security Seriously  </a></li>
</ul>

<blockquote>
  <p>tl;dr: In August 2017, I reported a vulnerability to Panera Bread that allowed the full name, home address, email address, food/dietary preferences, username, phone number, birthday and last four digits of a saved credit card to be accessed in bulk for any user that had ever signed up for an account. This includes my own personal data! Despite an explicit acknowledgement of the issue and a promise to fix it, Panera Bread sat on the vulnerability and, as far as I can tell, did nothing about it for eight months. When Brian Krebs publicly broke the news, other news outlets emphasized the usual “We take your security very seriously, security is a top priority for us” prepared statement from Panera Bread. Worse still, the vulnerability was not fixed at all — which means the company either misrepresented its actual security posture to the media to save face or was not competent enough to determine this fact for themselves. This post establishes a canonical timeline so subsequent reporting doesn’t get confused.</p>
</blockquote>

<h4><a href="http://blog.frizk.net/2018/03/total-meltdown.html">Total Meltdown?</a></h4>

<blockquote>
  <p>Meet the Windows 7 Meltdown patch from January. It stopped Meltdown but opened up a vulnerability way worse ... It allowed any process to read the complete memory contents at gigabytes per second, oh - it was possible to write to arbitrary memory as well.</p>
</blockquote>

<h3><a href="https://www.terraform.io/">Terraform</a></h3>

<blockquote>
  <p>HashiCorp Terraform enables you to safely and predictably create, change, and improve infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.</p>
</blockquote>

<ul>
<li><a href="https://blog.agilebits.com/2018/01/25/terraforming-1password/">Terraforming 1Password </a></li>
</ul>

<blockquote>
  <p>Compared to the JSON or YAML files used by CloudFormation, Terraform HCL is both a more powerful and a more readable language. Here is a small example of a snippet that defines a subnet for the application servers. As you can see, the Terraform code is a quarter of the size, more readable, and easier to understand.</p>
</blockquote>

<h3>Feedback</h3>

<ul>
<li><a href="https://github.com/brannondorsey/whonow">Whonow: A malicious DNS server for executing DNS Rebinding attacks on the fly </a></li>
</ul>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8757755/techsnap-0362.mp4" length="77030755" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. 
Plus a recent spat of data leaks suggest a common theme, Microsoft’s s…</itunes:subtitle>
      <itunes:summary>It’s a TechSNAP introduction to Terraform, a tool for building, changing, and versioning infrastructure safely and efficiently. </itunes:summary>
    </item>
    <item>
      <title>It’s All in the Logs | TechSNAP 361</title>
      <itunes:title>It’s All in the Logs | TechSNAP 361</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1659</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1659</guid>
      <id>71</id>
      <pubDate>Thu, 29 Mar 2018 09:16:00 +0200</pubDate>
      <description>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</description>
      <content:encoded><![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p>

<h4>Links:</h4>

<h4><a href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Uh Oh! Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes via Disk Utility.app </a></h4>

<blockquote>
  <p>It may not be noticeable at first (apart from the highlighting I’ve added of course), but the text “frogger13” is the password I used on a newly created APFS formatted FileVault Encrypted USB drive with the volume name “SEKRET”. (The new class images have a WarGames theme, hence the shout-outs to classic video games!)</p>
</blockquote>

<h4><a href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys </a></h4>

<blockquote>
  <p>Giovanni Collazo said a quick query on the Shodan search engine returned almost 2,300 Internet-exposed servers running etcd, a type of database that computing clusters and other types of networks use to store and distribute passwords and configuration settings needed by various servers and applications. etcd comes with a programming interface that responds to simple queries that by default return administrative login credentials without first requiring authentication. The passwords, encryption keys, and other forms of credentials are used to access MySQL and PostgreSQL databases, content management systems, and other types of production servers.</p>
</blockquote>

<h4><a href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack </a></h4>

<blockquote>
  <p>FBI called in as some city services are interrupted, employees told to turn off PCs.</p>
</blockquote>

<h4><a href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times </a></h4>

<blockquote>
  <p>The malware was sneaked onto the Google Play store disguised as seven different apps -- six QR readers and one 'smart compass' -- and bypassed security checks by hiding its true intent with a combination of clever coding and delaying its initial burst of malicious activity.</p>
</blockquote>

<h3><a href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery  </a></h3>

<blockquote>
  <p>We will discover in this article how a recent incident response to a customer was handled and how we discovered an otherwise publicly unknown vulnerability that was never reported by the manufacturer which left thousands of users unprotected from this security flaw.</p>
</blockquote>

<h3>Feedback</h3>

<ul>
<li><p><a href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></p></li>
<li><p><a href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></p></li>
</ul>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8700638/techsnap-0361.mp4" length="111040236" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
Plus we go from a hacked c…</itunes:subtitle>
      <itunes:summary>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</itunes:summary>
    </item>
    <item>
      <title>AMD Flaws Explained | TechSNAP 360</title>
      <itunes:title>AMD Flaws Explained | TechSNAP 360</itunes:title>
      <itunes:episode>360</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <link>https://feedpress.me/techsnapvid#entry-1621</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1621</guid>
      <id>72</id>
      <pubDate>Thu, 22 Mar 2018 00:00:00 +0100</pubDate>
      <description>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</description>
      <content:encoded><![CDATA[<p>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</p>

<p>Plus another DNS Rebinding attack is in the wild and stealing Ethereum, Microsoft opens up a new bug bounty program, Expedia gets hacked, and we perform a TechSNAP checkup.</p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8635883/techsnap-0360.mp4" length="98119195" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We cut through the noise and explain in clear terms what’s really been discovered. The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and w…</itunes:subtitle>
      <itunes:summary>We cut through the noise and explain in clear terms what’s really been discovered.  The botched disclosure of flaws in AMD products has overshadowed the technical details of the vulnerabilities, and we aim to fix that..</itunes:summary>
    </item>
    <item>
      <title>Netflix’s Dark Capacity | TechSNAP 359</title>
      <itunes:title>Netflix’s Dark Capacity</itunes:title>
      <itunes:episode>359</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5aab512350ed5.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1582</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1582</guid>
      <id>73</id>
      <pubDate>Thu, 15 Mar 2018 16:57:00 +0100</pubDate>
      <description>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </description>
      <content:encoded><![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p>

<p><img src="https://static.feedpress.it/picture/5aab512350ed5.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8569810/techsnap-0359.mp4" length="286239172" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 i…</itunes:subtitle>
      <itunes:summary>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </itunes:summary>
    </item>
    <item>
      <title>A Future Without Servers | TechSNAP 358</title>
      <itunes:title>A Future Without Servers</itunes:title>
      <itunes:episode>358</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a98426ec7e3d.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1548</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1548</guid>
      <id>74</id>
      <pubDate>Thu, 01 Mar 2018 10:08:00 +0100</pubDate>
      <description>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits &amp; the drawbacks?  Plus new research with ideas to improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s &amp; more!</description>
      <content:encoded><![CDATA[<p>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits &amp; the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. </p>

<p>Plus new research with ideas to dramatically improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s &amp; much more!</p>

<p><img src="https://static.feedpress.it/picture/5a98426ec7e3d.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8427032/techsnap-0358.mp4" length="327844182" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits &amp;amp; the drawbacks? It’s a TechSNAP introduction to Serverless Architecture. 
Plus new research …</itunes:subtitle>
      <itunes:summary>The term serverless gets thrown around a lot, but what does it really mean? What are the benefits &amp; the drawbacks?  Plus new research with ideas to improve private web browsing, the growing problem of tracking security vulnerabilities with CVE’s &amp; more!</itunes:summary>
    </item>
    <item>
      <title>The Return of Spectre | TechSNAP 357</title>
      <itunes:title>The Return of Spectre</itunes:title>
      <itunes:episode>357</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a8f45e928974.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1528</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1528</guid>
      <id>75</id>
      <pubDate>Thu, 22 Feb 2018 14:35:00 +0100</pubDate>
      <description>New variants, bad patches, busted microcode &amp; devastated performance. It’s a TechSNAP Meltdown &amp; Spectre check up.  Plus Tesla gets hit by Monero Cryptojacking &amp; a dating site that matches people based on their bad passwords…. So we gave it a go!</description>
      <content:encoded><![CDATA[<p>New variants, bad patches, busted microcode &amp; devastated performance. It’s a TechSNAP Meltdown &amp; Spectre check up.</p>

<p>Plus Tesla gets hit by Monero Cryptojacking &amp; a dating site that matches people based on their bad passwords…. So we gave it a go!</p>

<p><img src="https://static.feedpress.it/picture/5a8f45e928974.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8359472/techsnap-0357.mp4" length="286821910" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>New variants, bad patches, busted microcode &amp;amp; devastated performance. It’s a TechSNAP Meltdown &amp;amp; Spectre check up.
Plus Tesla gets hit by Monero Cryptojacking &amp;amp; a dating site …</itunes:subtitle>
      <itunes:summary>New variants, bad patches, busted microcode &amp; devastated performance. It’s a TechSNAP Meltdown &amp; Spectre check up.  Plus Tesla gets hit by Monero Cryptojacking &amp; a dating site that matches people based on their bad passwords…. So we gave it a go!</itunes:summary>
    </item>
    <item>
      <title>The Concern with Containers | TechSNAP 356</title>
      <itunes:title>The Concern with Containers</itunes:title>
      <itunes:episode>356</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a865eea21fef.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1508</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1508</guid>
      <id>76</id>
      <pubDate>Thu, 15 Feb 2018 20:32:00 +0100</pubDate>
      <description>The problems containers can’t solve, nasty security flaws in Skype and Telegram &amp; Cisco discovers they have a bigger issue on their hands then first realized.   Plus the latest jaw-dropping techniques to extract data from air-gapped systems.</description>
      <content:encoded><![CDATA[<p>The problems containers can’t solve, nasty security flaws in Skype and Telegram &amp; Cisco discovers they have a bigger issue on their hands then first realized. </p>

<p>Plus the latest jaw-dropping techniques to extract data from air-gapped systems.</p>

<p><img src="https://static.feedpress.it/picture/5a865eea21fef.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8287817/techsnap-0356.mp4" length="375877808" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>The problems containers can’t solve, nasty security flaws in Skype and Telegram &amp;amp; Cisco discovers they have a bigger issue on their hands then first realized. 
Plus the latest jaw-dropping t…</itunes:subtitle>
      <itunes:summary>The problems containers can’t solve, nasty security flaws in Skype and Telegram &amp; Cisco discovers they have a bigger issue on their hands then first realized.   Plus the latest jaw-dropping techniques to extract data from air-gapped systems.</itunes:summary>
    </item>
    <item>
      <title>Operation FreeNAS Rescue | TechSNAP 355</title>
      <itunes:title>Operation FreeNAS Rescue</itunes:title>
      <itunes:episode>355</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a7cce23baec4.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1487</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1487</guid>
      <id>77</id>
      <pubDate>Thu, 08 Feb 2018 14:23:00 +0100</pubDate>
      <description>We save our FreeNAS Mini from the edge &amp; perform an emergency migration to much larger hardware.  Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB &amp; your questions.</description>
      <content:encoded><![CDATA[<p>We save our FreeNAS Mini from the edge &amp; perform an emergency migration to much larger hardware.</p>

<p>Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB &amp; your questions.</p>

<p><img src="https://static.feedpress.it/picture/5a7cce23baec4.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8213932/techsnap-0355.mp4" length="397860724" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We save our FreeNAS Mini from the edge &amp;amp; perform an emergency migration to much larger hardware.
Plus 12 tips for secure authentication, the future of network security where there is no LAN,…</itunes:subtitle>
      <itunes:summary>We save our FreeNAS Mini from the edge &amp; perform an emergency migration to much larger hardware.  Plus 12 tips for secure authentication, the future of network security where there is no LAN, a botnet exploiting Android ADB &amp; your questions.</itunes:summary>
    </item>
    <item>
      <title>Here Come the Script Kiddies | TechSNAP 354</title>
      <itunes:title>Here Come the Script Kiddies</itunes:title>
      <itunes:episode>354</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a73f8ce8d69c.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1472</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1472</guid>
      <id>78</id>
      <pubDate>Thu, 01 Feb 2018 21:34:00 +0100</pubDate>
      <description>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon &amp; other places vulnerable. Plus injecting arbitrary waveforms into Alexa and Google Assistant, bulletproof WordPress &amp; more!</description>
      <content:encoded><![CDATA[<p>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon &amp; other places vulnerable to this automated attack. We’ll tell you all about it &amp; what these 400 lines of Python known as AutoSploit really do.</p>

<p>Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof &amp; how to detect and prevent excessive port scan attacks.</p>

<p><img src="https://static.feedpress.it/picture/5a73f8ce8d69c.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8140785/techsnap-0354.mp4" length="528334140" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon &amp;amp; other places vulnerable to this automated attack. We’ll tell you …</itunes:subtitle>
      <itunes:summary>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon &amp; other places vulnerable. Plus injecting arbitrary waveforms into Alexa and Google Assistant, bulletproof WordPress &amp; more!</itunes:summary>
    </item>
    <item>
      <title>Too Many Containers | TechSNAP 353</title>
      <itunes:title>Too Many Containers</itunes:title>
      <itunes:episode>353</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a6a93521e66a.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1457</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1457</guid>
      <id>79</id>
      <pubDate>Thu, 25 Jan 2018 18:31:00 +0100</pubDate>
      <description>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it &amp; where it came from. Also who shouldn’t be using Kubernetes, the problems you can run into when scaling it, how to store files in others DNS resolver cache &amp; more!</description>
      <content:encoded><![CDATA[<p>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it &amp; where it came from. Also who shouldn’t be using Kubernetes &amp; the problems you can run into when scaling it.</p>

<p>Plus how you can store files in others DNS resolver cache, Project Zero finds a new BitTorrent client flaw &amp; more!</p>

<p><img src="https://static.feedpress.it/picture/5a6a93521e66a.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8080440/techsnap-0353.mp4" length="439358184" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it &amp;amp; where it came from. Also who shouldn’t be using Kubernetes &amp;amp; the problems you can run into …</itunes:subtitle>
      <itunes:summary>We introduce you to Kubernetes, what problems it solves, why everyone is talking about it &amp; where it came from. Also who shouldn’t be using Kubernetes, the problems you can run into when scaling it, how to store files in others DNS resolver cache &amp; more!</itunes:summary>
    </item>
    <item>
      <title>Stop Using apt-get | TechSNAP 352</title>
      <itunes:title>Stop Using apt-get</itunes:title>
      <itunes:episode>352</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a66d65d27d06.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1450</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1450</guid>
      <id>80</id>
      <pubDate>Mon, 22 Jan 2018 22:28:00 +0100</pubDate>
      <description>And start using configuration management! Embrace reproducibility of systems &amp; streamlined management with TechSNAP’s introduction to Configuration Management.  Plus the news of the week that could impact your systems, your feedback &amp; more!</description>
      <content:encoded><![CDATA[<p>And start using configuration management! Embrace reproducibility of systems &amp; streamlined management with TechSNAP’s introduction to Configuration Management.</p>

<p>Plus the news of the week that could impact your systems, your feedback &amp; more!</p>

<p><img src="https://static.feedpress.it/picture/5a66d65d27d06.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8071448/techsnap-0352.mp4" length="369801290" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>And start using configuration management! Embrace reproducibility of systems &amp;amp; streamlined management with TechSNAP’s introduction to Configuration Management.
Plus the news of the week that …</itunes:subtitle>
      <itunes:summary>And start using configuration management! Embrace reproducibility of systems &amp; streamlined management with TechSNAP’s introduction to Configuration Management.  Plus the news of the week that could impact your systems, your feedback &amp; more!</itunes:summary>
    </item>
    <item>
      <title>Performance Meltdown | TechSNAP 351</title>
      <itunes:title>Performance Meltdown</itunes:title>
      <itunes:episode>351</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a583204aaebb.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1424</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1424</guid>
      <id>81</id>
      <pubDate>Thu, 11 Jan 2018 19:55:00 +0100</pubDate>
      <description>The types of workloads that will see the largest performance impacts from Meltdown. Plus a concise breakdown of Meltdown, Spectre &amp; side-channel attacks &amp; more!</description>
      <content:encoded><![CDATA[<p>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself &amp; the outlook for 2018.</p>

<p>Plus a concise breakdown of Meltdown, Spectre &amp; side-channel attacks like only TechSNAP can. </p>

<p>Then we run through the timeline of events &amp; the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions &amp; more!</p>

<p><img src="https://static.feedpress.it/picture/5a583204aaebb.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/8025856/techsnap-0351.mp4" length="425624310" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself &amp;amp; the outlook for 2018.
Plus a concise breakdown of Meltdown, Spectre &amp;amp;…</itunes:subtitle>
      <itunes:summary>The types of workloads that will see the largest performance impacts from Meltdown. Plus a concise breakdown of Meltdown, Spectre &amp; side-channel attacks &amp; more!</itunes:summary>
    </item>
    <item>
      <title>Trials of TLS | TechSNAP 350</title>
      <itunes:title>Trials of TLS</itunes:title>
      <itunes:episode>350</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a467985b5a43.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1397</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1397</guid>
      <id>82</id>
      <pubDate>Fri, 29 Dec 2017 09:20:00 +0100</pubDate>
      <description>The trials and tribulations of the long journey to TLS 1.3 &amp; the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories &amp; the data that was exposed.  Then we do a deep dive into some SMB fundamentals &amp; more!</description>
      <content:encoded><![CDATA[<p>The trials and tribulations of the long journey to TLS 1.3 &amp; the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories &amp; the data that was exposed.</p>

<p>Then we do a deep dive into some SMB fundamentals &amp; practical tips to stay on top of suspicious network traffic.</p>

<p><img src="https://static.feedpress.it/picture/5a467985b5a43.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/7883769/techsnap-0350.mp4" length="517458438" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>The trials and tribulations of the long journey to TLS 1.3 &amp;amp; the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories &amp;amp; the data that was exp…</itunes:subtitle>
      <itunes:summary>The trials and tribulations of the long journey to TLS 1.3 &amp; the “middleware” that’s keeping us from having nice things. Plus a pack of Leaky S3 bucket stories &amp; the data that was exposed.  Then we do a deep dive into some SMB fundamentals &amp; more!</itunes:summary>
    </item>
    <item>
      <title>All Natural Namespaces | TechSNAP 349</title>
      <itunes:title>All Natural Namespaces</itunes:title>
      <itunes:episode>349</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a3cbf754d8f4.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1382</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1382</guid>
      <id>83</id>
      <pubDate>Fri, 22 Dec 2017 00:11:00 +0100</pubDate>
      <description>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.  Plus what might be the world’s most important killswitch &amp; more!</description>
      <content:encoded><![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials &amp; the 19 year old attack that’s back.</p>

<p><img src="https://static.feedpress.it/picture/5a3cbf754d8f4.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/7808198/techsnap-0349.mp4" length="511613817" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
Plus what m…</itunes:subtitle>
      <itunes:summary>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.  Plus what might be the world’s most important killswitch &amp; more!</itunes:summary>
    </item>
    <item>
      <title>Server Neglect | TechSNAP 348</title>
      <itunes:title>Server Neglect</itunes:title>
      <itunes:episode>348</itunes:episode>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:image href="https://static.feedpress.com/picture/5a3cbed001f74.jpg"/>
      <link>https://feedpress.me/techsnapvid#entry-1383</link>
      <guid isPermalink="false">https://feedpress.me/techsnapvid#entry-1383</guid>
      <id>84</id>
      <pubDate>Fri, 22 Dec 2017 00:02:00 +0100</pubDate>
      <description>Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, the new version of FreeNAS packs a lot of features for a point release &amp; much more!</description>
      <content:encoded><![CDATA[<p>Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about &amp; the new version of FreeNAS packs a lot of features for a point release.</p>

<p>Plus an update on the show and what to expect &amp; we attempt something TechSNAP could never do as a video production, a live double FreeNAS upgrade!</p>

<p><img src="https://static.feedpress.it/picture/5a3cbed001f74.jpg" alt="Alt title" /></p>
]]></content:encoded>
      <enclosure url="https://feedpress.me/link/18459/7808056/techsnap-0348.mp4" length="488860795" type="video/mp4"/>
      <itunes:author>Jupiter Broadcasting</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:keywords>networking, security, sysadmin, cisco, vpn, news, cyber, opsec, ZFS, Linux, FreeBSD, storage, firewall </itunes:keywords>
      <dc:creator>Jupiter Broadcasting</dc:creator>
      <itunes:subtitle>Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about &amp;amp; the new version of…</itunes:subtitle>
      <itunes:summary>Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, the new version of FreeNAS packs a lot of features for a point release &amp; much more!</itunes:summary>
    </item>
    <itunes:image href="https://static.feedpress.com/logo/techsnapvid-5f5bfc33d5982.png"/>
  </channel>
</rss>
