ALittleInsecure

Exploring the insecurities I find in the world so I can repress the ones I find in myself.

Who we are

Our website address is: https://alittleinsecure.com.

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

Where your data is sent

Visitor comments may be checked through an automated spam detection service.

  • Unraid Research

    Coming Soon…

    Continue Reading

    4 min read

  • Files that Coerce: Search Connectors and Beyond

    Inspired by a webcast on NTLM coercion from Black Hills Information Security, I went down the rabbit hole of file-based forced authentication. After reviewing basically every blog post,…

    Continue Reading

    4 min read

  • DNS Hijacking: Say My Name

    The Domain Name System (DNS) is responsible for converting human-readable names into machine-readable Internet Protocol (IP) addresses. In Windows environments where names are intimately tied to identities and…

    Continue Reading

    4 min read