• 0 Posts
  • 67 Comments
Joined 1 year ago
cake
Cake day: August 3rd, 2023

help-circle













  • I have used Excel to make tags from a table before. Usually just for one off stuff and before I was very familiar with JavaScript.

    E.g. if you have a table of 100 urls you could use excel to easily turn them into a tags using the various text formulas like concat.

    It’s probably never the best tool for the job but sometimes I’ll do stuff in Excel just because I’m very familiar with it.

    To clarify I am not a programmer by trade lol


  • I am a big fan of BLUF (Bottom Line Up Front). Condense your entire email to a single sentence and then explain afterward.

    The person you’re emailing will see the key point immediately (maybe even in the lede). If they agree with you, you’re good. If not, they can then read your explanation.

    If the email is so complex I can’t explain it one sentence, that’s usually when I consider asking for a meeting or try to reduce further.

    Example:

    Hi {boss},

    I think we should do X.

    X is the best way to do Y because it can be automated and reproduced sustainably.

    Etc. Etc. Supporting details…

    Let me know if you’d like to meet to discuss further, {Name}





  • Generally no-- the payload typically comes from some sort of interaction (click a link, open an attachment, reply to the message). There have been some zero interaction attacks with emails before. Like for example, when the email is previewed in the reading pane in Outlook. These are exceptionally rare and not what we’re training against when we do phishing training.

    That said, if you know an email is phishing it’s always best to not interact with it at all, but you really can’t always tell by the sender and subject line alone.


  • The good news is, a lot of old secrets won’t really matter anymore by the time we have quantum computers that can break the encryption. There will obviously be a big impact on information that was encrypted just before we get a working quantum computer that can crack modern crypto.

    In cryptography discussions, I feel like we’re usually implying (or even saying out loud) that the encryption is secure for a sufficient amount of time and computer power. Perhaps people outside of cryptography don’t know it, but I think there is a reasonable expectation that encrypted communications could be decrypted at some point in the future. We just hope it’s sufficiently far enough away (or difficult enough) to not be a problem.

    Honestly as soon as we get some good post-quantum crypto, we’ll probably want to switch over to it asap, even if good quantum computers are still far out, just to help alleviate some of this problem. Of course, I imagine we’re still going to be finding new things once the technology is real and being used. Let’s hope the post-quantum cryptography algorithms we come up with actually are strong against a sufficiently large quantum computer.