I always look at the site’s Wikipedia page, gives the correct url in its summary on the right of the page.
There are dozens of us! Dozens!
Exact same experience here, I think I got through the whole thing in 2 days, keen as for the next season.
What do you think of the new show?
Umm why did your refrigerator leak a picture of my parents yelling at each other?
Oh yea poor old Palo Alto Networks is having a rough time at the moment. But a mature OT network has implemented defence in depth correctly and have a plan in place for incidents such as this one should they occur. I know a few sites who have had to island until they were able to put vulnerability mitigation in place, the good thing is that they could do this without disrupting their OT operations significantly. What you’re saying is correct, if its connected its only a matter of when not if, but you design your system with this in mind.
At the end of the day corporations are going to want business data from your site, and we need to design around that. To fight it and just air gap is going to result in you getting side stepped and your system being even more vulnerable. It’s going to happen either way so we need to make sure we have the plans in place to implement it as safely as possible.
Nah man, this is my game, air gap systems aren’t really a thing for anything non-military anymore. Companies want a real-time view into their production for making business decisions.
There are ways to secure your control systems network properly without a full airgap with proper boundary controls between the various layers of your Purdue model as well as fully separate Active Directories just to make a start.
Its actually an entire independent cybersecurity specialisation for OT networks. For anyone who is interested I would recommend Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Clint Bodungen its a fantastic read and very easy to follow.
Now the concept of air gapping still exists in this architecture, its designed to be able to “Island” which is where you break the connection between your corporate and OT networks when an incident has occurred on the corporate side essentially creating an airgap.
Sometimes an airgap isn’t enough (Stuxnet is a good example), but realistically cybersecurity is an afterthought unfortunately. Simply go onto Shodan and lookup Schneider or Allen-Bradley to see how many of these controllers are accessible directly from the internet
The cool kids are using Prowlarr these days
bUt gUyS WhAt aBoUt sEcUrItY ThRoUgH ObScUrItY??
Ko-fi is better for the creator anyway, I wish I knew about the Ko-Fi first haha
53 of us are on Patreon too
The infographic would be so nice!
Sweet, set up periodic donations, hopefully ive covered my costs of use
Wait, how do we donate?
Psst… massgrave.dev
I use Feeder for RSS feeds
Hey, yes there is. I was 100% torrents up until recently, also using multiple torrent sites including private trackers. The thing I struggled with was getting all the episodes of TV shows. Like if I added a niche or old TV show to Sonarr, it would be a constant struggle to find missing episodes or seasons (for some reason Southpark was a misery). This was pretty much completely eliminated with usenets. So now I have usenets as a primary and torrenting as a fallback if something cant be found. This config gives me almost full coverage. The downside is that usenets typically aren’t free whilst torrenting is (although they are very cheap)
Been to china, my advice is to amour up with a few vpn providers, and if you can get a sim card from Hong Kong, it gives full coverage in the mainland with western internet access