#privacyprotectionbasedaccesscontrolschemeincloudbasedservices ผลการค้นหา

ไม่พบผลลัพธ์สำหรับ "#privacyprotectionbasedaccesscontrolschemeincloudbasedservices"

Selective disclosure The user has the key, the encrypted data is there, the app only sees the fields that are allowed 👀 With @idOS_network no KYC data sheet store on your server, no audit hassle, just notification and access recovery is in the hands of the user ♥️

0xbardia's tweet image. Selective disclosure The user has the key, the encrypted data is there, the app only sees the fields that are allowed 👀

With @idOS_network no KYC data sheet store on your server, no audit hassle, just notification and access recovery is in the hands of the user ♥️

Microsoft OneDrive is rolling out AI face recognition for your photos. But you can turn it off, right? Well, you CAN, but only “three times a year,” and Microsoft hasn’t clarified what that actually means. To disable (for now), go to Privacy & Permissions → People section.

ProtonDrive's tweet image. Microsoft OneDrive is rolling out AI face recognition for your photos.

But you can turn it off, right? Well, you CAN, but only “three times a year,”  and Microsoft hasn’t clarified what that actually means.

To disable (for now), go to Privacy & Permissions → People section.

Creators started with NFTs; the next leap is datasets as products and @irys_xyz makes that feel native. On Irys, bytes aren’t parked, they’re programmable: you can bind access, attribution, and payouts to the data itself, so apps/agents can use (and pay for) it on-chain without…

0xALTF4's tweet image. Creators started with NFTs; the next leap is datasets as products and @irys_xyz makes that feel native. On Irys, bytes aren’t parked, they’re programmable: you can bind access, attribution, and payouts to the data itself, so apps/agents can use (and pay for) it on-chain without…

Took me a few days, still don't know exactly how/why it works, but I now have a new-ish on-prem to cloud technique via a Seamless SSO (Kerberos) backdoor key. Some features: - No GA needed to add key - Invisible backdoor (no logs in AAD) 🫣 - 1st factor auth to any synced user

_dirkjan's tweet image. Took me a few days, still don't know exactly how/why it works, but I now have a new-ish on-prem to cloud technique via a Seamless SSO (Kerberos) backdoor key. Some features:

- No GA needed to add key
- Invisible backdoor (no logs in AAD) 🫣
- 1st factor auth to any synced user
_dirkjan's tweet image. Took me a few days, still don't know exactly how/why it works, but I now have a new-ish on-prem to cloud technique via a Seamless SSO (Kerberos) backdoor key. Some features:

- No GA needed to add key
- Invisible backdoor (no logs in AAD) 🫣
- 1st factor auth to any synced user

Released VeilPNG. Hide your data, share freely🏴 "Privacy is necessary for an open society in the electronic age." - Eric Hughes, A Cypherpunk's Manifesto VeilPNG is an open-source, free utility designed to securely hide sensitive data within PNG images using strong encryption…

amadon's tweet image. Released VeilPNG. Hide your data, share freely🏴

"Privacy is necessary for an open society in the electronic age."
- Eric Hughes, A Cypherpunk's Manifesto

VeilPNG is an open-source, free utility designed to securely hide sensitive data within PNG images using strong encryption…

Dear Artists! - Don't forget to uncheck this on your setting. - Protect your art/images with NS+Glaze before uploading. - Add on your tos for NOT letting clients to use your works for any kind AI tools.

Mukanjyoo_'s tweet image. Dear Artists! 

- Don't forget to uncheck this on your setting. 
- Protect your art/images with NS+Glaze before uploading. 
- Add on your tos for NOT letting clients to use your works for any kind AI tools.

AI shouldn’t mean “Always Invasive.” Atlas hides traces, deletes on request, And keeps chats private. No logs. No leaks. No lies.

GPTAtlas's tweet image. AI shouldn’t mean “Always Invasive.”

Atlas hides traces, deletes on request, 
And keeps chats private.
No logs. No leaks. No lies.

only grants are public. not your data. @idOS_network The chain shows who can access what and for how long, but the actual payload stays encrypted under your keys. think “permission receipts onchain, PII off-chain.” that’s the whole point: auditability without doxxing this means…

0xpx97's tweet image. only grants are public. not your data.
@idOS_network 
The chain shows who can access what and for how long, but the actual payload stays encrypted under your keys. think “permission receipts onchain, PII off-chain.” that’s the whole point: auditability without doxxing

this means…

Microsoft is testing AI facial recognition for your photos in OneDrive. The feature is enabled for those with early access. You can easily turn this off...but only 3 times a year? 🫠 Toggle this off in Privacy and Permissions.

Malwarebytes's tweet image. Microsoft is testing AI facial recognition for your photos in OneDrive.

The feature is enabled for those with early access.

You can easily turn this off...but only 3 times a year? 🫠

Toggle this off in Privacy and Permissions.

Cloudflare WAF Bypass Leads to Reflected XSS Payload Used : "><img src=x onerror=alert(1)> [Blocked By Cloudflare] Payload Used : "><img src=x onerrora=confirm() onerror=confirm(1)> [XSS Popup] credit:@kingcoolvikas #bugbounty #bugbountytips

RootMoksha's tweet image. Cloudflare WAF Bypass Leads to Reflected XSS

Payload Used : &quot;&amp;gt;&amp;lt;img src=x onerror=alert(1)&amp;gt; [Blocked By Cloudflare]

Payload Used : &quot;&amp;gt;&amp;lt;img src=x onerrora=confirm() onerror=confirm(1)&amp;gt; [XSS Popup]

credit:@kingcoolvikas 

#bugbounty #bugbountytips
RootMoksha's tweet image. Cloudflare WAF Bypass Leads to Reflected XSS

Payload Used : &quot;&amp;gt;&amp;lt;img src=x onerror=alert(1)&amp;gt; [Blocked By Cloudflare]

Payload Used : &quot;&amp;gt;&amp;lt;img src=x onerrora=confirm() onerror=confirm(1)&amp;gt; [XSS Popup]

credit:@kingcoolvikas 

#bugbounty #bugbountytips

Introducing Amazon S3 Object Lambda. You can now add your own code to S3 GET requests to modify and process data as it is returned to an application, such as filtering rows, dynamically resizing images, redacting confidential data & much more. go.aws/3tyqHOn

awscloud's tweet image. Introducing Amazon S3 Object Lambda. You can now add your own code to S3 GET requests to modify and process data as it is returned to an application, such as filtering rows, dynamically resizing images, redacting confidential data &amp;amp; much more. go.aws/3tyqHOn

I= Identity you control. d= Data you own O=Open access across chains. S= Secure by design Locked in with @idOS_network

niner0526's tweet image. I= Identity you control.
d= Data you own
O=Open access across chains.
S= Secure by design 

Locked in with @idOS_network

i = Identity you control. d = Data you own. O = Open access across chains. S = Secure by design. That's @idOS_network

gofcrypto's tweet image. i = Identity you control.

d = Data you own.

O = Open access across chains.

S = Secure by design.

That&apos;s @idOS_network


My data deserves VIP treatment. @idOS_network gave it a private suite. No leaks, no stalkers. Just privacy with class 😌

mo5d3ca1's tweet image. My data deserves VIP treatment.

@idOS_network gave it a private suite.

No leaks, no stalkers.

Just privacy with class 😌

My data deserves VIP treatment. @idOS_network gave it a private suite. No leaks, no stalkers. Just privacy with class 😎

HazerSol's tweet image. My data deserves VIP treatment.

@idOS_network gave it a private suite.

No leaks, no stalkers.

Just privacy with class 😎


New - Control Access to #AWS Regions Using IAM Policies - amzn.to/2I1xPwj

jeffbarr's tweet image. New - Control Access to #AWS Regions Using IAM Policies - amzn.to/2I1xPwj

A new cloud model for secure any-to-any connectivity. cfl.re/3YYK5XS

Cloudflare's tweet image. A new cloud model for secure any-to-any connectivity. cfl.re/3YYK5XS

Loading...

Something went wrong.


Something went wrong.


United States Trends