Linux Is Now on Mars, Thanks to NASA's Perseverance Rover

Previous NASA Mars rovers mostly used an operating system from Wind River Systems. But this time, the space agency chose Linux for Perseverance's Ingenuity helicopter drone.

Exploring Rootless Docker

"With the release of Docker 20.10, the rootless containers feature has left experimental status. This is an important step for Docker security as it allows for the entire Docker installation to run with standard user prvivileges, no use of root required. Other container solutions like Podman have had this feature for a while but if your used to Docker’s approach it’s nice to see it being available."

Flatcar Container Linux is an immutable Linux distribution for containers. It is a friendly fork of CoreOS Container Linux and as such, compatible with it.

It seems AWS is experiencing some outages that are affecting SaaS like Notion and Slack.

Solo is a hardware security key for two-factor authentication or passwordless login. It's fully open source, hardware and software, and it protects against account takeover, phishing and other online attacks.

This might explain some of the uptick in my Fail2Ban alerts

Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways | ZDNet

The username and password (zyfwp/PrOw!aN_fXp) were visible in one of the Zyxel firmware binaries.

~Open Source Security Tool of the Day~

Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment. The tool is intended for use by incident responders, and focuses on the narrow scope of user and application activity endemic to identity and authentication based attacks seen recently in multiple sectors.

~Open Source Security Tool of the Day~

OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created in order to structure, store, organize and visualize technical and non-technical information about cyber threats.

The structuration of the data is performed using a knowledge schema based on the STIX2 standards.

The Top Reasons Why You Should Give eBPF a Chance

eBPF is a virtual machine running inside the Linux kernel, which can receive code to execute. Here's why it's worth exploring.

Any White Stripe 🦓 fans?

The White Stripes – Animated Yule Log Video

Put a White Stripes spin on the holiday season and enjoy the new Yule Log animated video & music mix featuring 90 minutes of Greatest Hits songs, classic aco...

I love Moxie's rebuttal.

No, Cellebrite cannot 'break Signal encryption.'

Yesterday, the BBC ran a story with the factually untrue headline, “Cellebrite claimed to have cracked chat app’s encryption.” This is false.Not only can Cellebrite not break Signal encryption, but Cellebrite never even claimed to be able to.Since we weren’t actually given the opportunity to comm...

Self-hosting Kubernetes on your Raspberry Pi

Your complete guide to self-hosting applications Kubernetes on Raspberry Pi including: hardware, HA, Ingress, storage and Operating Systems.

~Open Source Security Tool of the Day~

T-Pot - The All-in-One Honeypot Platform

T-Pot is based on the Debian (Stable) network installer. The honeypot daemons as well as other support components are dockered. This allows T-Pot to run multiple honeypot daemons and tools on the same network interface while maintaining a small footprint and constrain each honeypot within its own environment.

One of the perks of living in Italy

What Does 1GB of Mobile Data Cost in Every Country?

Globally, the cost of mobile data ranges between $0.09 per GB up to $27 per GB. Here's how it breaks down in 150+ countries.


Fosstodon is an English speaking Mastodon instance that is open to anyone who is interested in technology; particularly free & open source software.