Wiki/rss/aninix.xml

76 lines
4.3 KiB
XML
Executable File

<feed xmlns="http://www.w3.org/2005/Atom">
<title>AniNIX/RSS | News from the Network</title>
<icon>https://foundation.aninix.net/assets/img/AniNIX.png</icon>
<logo>https://foundation.aninix.net/assets/img/AniNIX.png</logo>
<link rel="self" href="https://aninix.net/aninix.xml" />
<link href="https://aninix.net/" />
<updated>2022-04-14T20:30:20Z</updated>
<author>
<name>AniNIX</name>
</author>
<id>https://aninix.net/</id>
<entry>
<title>Lunch-and-Learns Ended</title>
<link href="https://aninix.net/aninix.xml#lnl-ended"></link>
<updated>2024-04-25T17:21:00Z</updated>
<id>https://aninix.net/aninix.xml#lnl-ended</id>
<summary>
AniNIX will be ending the Lunch-and-Learn series for the time being -- we aren't seeing enough engagement, and admins will be otherwise tasked for the near future. Please still reach out on Discord or IRC if there are topics you want to talk about, or open an issue or merge request with your ideas.
</summary>
</entry>
<entry>
<title>Lunch-and-Learns Paused 20240502 through 20240627</title>
<link href="https://aninix.net/aninix.xml#lnl-pause-20240502"></link>
<updated>2024-04-25T17:21:00Z</updated>
<id>https://aninix.net/aninix.xml#lnl-pause-20240502</id>
<summary>
AniNIX will be pausing Lunch-and-Learns effective 20240502 through 20240627 for real-life training. We will merge AniNIX/Wiki#24 on our return.
</summary>
</entry>
<entry>
<title>CVE-2024-3094 Follow-up</title>
<link href="https://aninix.net/aninix.xml#CVE-2024-3094"></link>
<updated>2024-04-17T20:15:00Z</updated>
<id>https://aninix.net/aninix.xml#CVE-2024-3094</id>
<summary>
AniNIX was informed of CVE-2024-3094 via our OSINT community on 2024-03-28 -- patching was completed in AniNIX/Maat on 2024-03-29 and in all systems the day after. Security review of our access logs in AniNIX/Sharingan do not indicate a compromise, using dork `"accepted" AND application_name:"sshd" AND NOT "Accepted publickey"` and others. We apologize for the delay in follow-up and transparency, but other considerations have required attention prior to this post.
</summary>
</entry>
<entry>
<title>OSINT Feed</title>
<link href="https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml"></link>
<updated>2022-10-01T04:09:00Z</updated>
<id>https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml</id>
<summary>
We're starting an open-source intelligence or OSINT feed to announce some of our incoming threat data to the world. We hope this can be the start of meaningfully giving back to the cybersec community.
</summary>
</entry>
<entry>
<title>GPG Key Distribution</title>
<link href="https://foundation.aninix.net/AniNIX/ShadowArch/src/branch/main/EtcFiles/aninix.gpg"></link>
<updated>2022-01-19T00:10:00Z</updated>
<id>https://foundation.aninix.net/AniNIX/ShadowArch/src/branch/main/EtcFiles/aninix.gpg</id>
<summary>
The SKS keyservers have been shut down -- some recent attacks on the network have made their hosting untenable for the providers. We will be distributing our GPG public key via the AniNIX/ShadowArch package and on our repo. Please add it to your own keyrings.
</summary>
</entry>
<entry>
<title>Warrant Canary</title>
<link href="https://foundation.aninix.net/AniNIX/WarrantCanary"></link>
<updated>2019-12-10T12:28:00Z</updated>
<id>https://foundation.aninix.net/AniNIX/WarrantCanary</id>
<summary>
We want everyone to know that, despite recent law enforcement and Senate cries that they can't do their job without backdoors into encrypted communications, the AniNIX is committed to protecting your communications with our network. We do offer proxies of some semipublic information to outside sources -- Discord and GitHub -- but our internal services over SSH, IRCS, and HTTPS are hardened and audited. We are now additionally offering a warrant canary. This is a GPG-based device for users to know that our communications have not been compromised. If you are cybersecurity-minded, please watch the linked repo.
</summary>
</entry>
</feed>