Wiki/rss/aninix.xml
2024-04-17 15:27:01 -05:00

55 lines
3.3 KiB
XML
Executable File

<feed xmlns="http://www.w3.org/2005/Atom">
<title>AniNIX/RSS | News from the Network</title>
<icon>https://foundation.aninix.net/assets/img/AniNIX.png</icon>
<logo>https://foundation.aninix.net/assets/img/AniNIX.png</logo>
<link rel="self" href="https://aninix.net/aninix.xml" />
<link href="https://aninix.net/" />
<updated>2022-04-14T20:30:20Z</updated>
<author>
<name>AniNIX</name>
</author>
<id>https://aninix.net/</id>
<entry>
<title>CVE-2024-3094 Follow-up</title>
<link href="https://aninix.net/aninix.xml#CVE-2024-3094"></link>
<updated>2024-04-17T20:15:00Z</updated>
<id>https://aninix.net/aninix.xml#CVE-2024-3094</id>
<summary>
AniNIX was informed of CVE-2024-3094 via our OSINT community on 2024-03-28 -- patching was completed in AniNIX/Maat on 2024-03-29 and in all systems the day after. Security review of our access logs in AniNIX/Sharingan do not indicate a compromise, using dork `"accepted" AND application_name:"sshd" AND NOT "Accepted publickey"` and others. We apologize for the delay in follow-up and transparency, but other considerations have required attention prior to this post.
</summary>
</entry>
<entry>
<title>OSINT Feed</title>
<link href="https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml"></link>
<updated>2022-10-01T04:09:00Z</updated>
<id>https://aninix.net/AniNIX/Wiki/raw/branch/main/rss/osint.xml</id>
<summary>
We're starting an open-source intelligence or OSINT feed to announce some of our incoming threat data to the world. We hope this can be the start of meaningfully giving back to the cybersec community.
</summary>
</entry>
<entry>
<title>GPG Key Distribution</title>
<link href="https://foundation.aninix.net/AniNIX/ShadowArch/src/branch/main/EtcFiles/aninix.gpg"></link>
<updated>2022-01-19T00:10:00Z</updated>
<id>https://foundation.aninix.net/AniNIX/ShadowArch/src/branch/main/EtcFiles/aninix.gpg</id>
<summary>
The SKS keyservers have been shut down -- some recent attacks on the network have made their hosting untenable for the providers. We will be distributing our GPG public key via the AniNIX/ShadowArch package and on our repo. Please add it to your own keyrings.
</summary>
</entry>
<entry>
<title>Warrant Canary</title>
<link href="https://foundation.aninix.net/AniNIX/WarrantCanary"></link>
<updated>2019-12-10T12:28:00Z</updated>
<id>https://foundation.aninix.net/AniNIX/WarrantCanary</id>
<summary>
We want everyone to know that, despite recent law enforcement and Senate cries that they can't do their job without backdoors into encrypted communications, the AniNIX is committed to protecting your communications with our network. We do offer proxies of some semipublic information to outside sources -- Discord and GitHub -- but our internal services over SSH, IRCS, and HTTPS are hardened and audited. We are now additionally offering a warrant canary. This is a GPG-based device for users to know that our communications have not been compromised. If you are cybersecurity-minded, please watch the linked repo.
</summary>
</entry>
</feed>