home.social

#amazons3 — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #amazons3, aggregated by home.social.

  1. UNC6692 Exposes Custom Malware Suite via Social Engineering

    In a clever social engineering ploy, UNC6692 launched a massive email campaign in late December 2025, flooding targets with messages to create a sense of urgency and distraction, before following up with a convincing Microsoft Teams message that pushed a malicious link. The attackers then cleverly disguised their malware as…

    osintsights.com/unc6692-expose

    #SocialEngineering #Unc6692 #GoogleThreatIntelligenceGroup #MicrosoftTeams #AmazonS3

  2. Amazon S3 #vectors are coming for your precious vector databases, like a bear in a honey warehouse 🐻🍯. But don't worry, #Zilliz is here to reassure you with a deluge of buzzwords and a pricing calculator that even your cat could use 🐱🧮. Grab a coffee, folks, this one's a real nail-biter! ☕️💤
    zilliz.com/blog/will-amazon-s3 #AmazonS3 #VectorDatabases #TechBuzzwords #CloudComputing #HackerNews #ngated

  3. Ah, the classic tale of Amazon S3 🥱—it started simple, but surprise, surprise, it got complicated the more they tinkered with it. 🎩💡 Who knew that adding features and fixing bugs could result in complexity? Thank goodness we have a 3851-word treatise to enlighten us on this groundbreaking revelation. 🤯📚
    allthingsdistributed.com/2025/ #AmazonS3 #Complexity #FeatureBloat #TechInsights #CloudStorage #DeveloperCommunity #HackerNews #ngated

  4. I just stumbled across rclone. A tool for syncing files to cloud storage. Which can also encrypt and decrypt the data. So... something for a encrypted remote backup. Not only it works with SSH/SFTP, but also with a lot of other service like S3, Google Cloud Storage, HiDrive, Hetzner Cloud Storage and so on (see rclone.org/docs/).

    Maybe I will create an blog post about rclone in the near future, because the docs weren't that straightforward (at least for me).

    But in short (even when the examples sates otherwise), you need to add two hosts: one for sftp/ssh/rsync (or any other services) and one for "crypt". Then it will be encrypted on the sending computer.

    Nice... I am positively surprised.

    #rclone #sync #backup #encryption #encrypted #rsync #s3 #amazons3 #hidrive #hetzner

  5. (Boost for awareness of this shitty situation.)

    IDrive's got some explaining to do.

    I moved from Amazon S3 to IDrive e2, about a month ago.

    Yesterday I found that my buckets became inaccessible, either through their GUI or through the web.

    This means:

    - No Mastodon cache.
    - No offsite WordPress backups. (They still happen on site.)

    I've reported the problem yesterday using a GUI feature, but truth be told, this did not seem to create a ticket. I've emailed them this morning, and got a reply that a ticket was created.

    This is complete and utter shit. I was over one year with Amazon S3, and *never* had any problem.

    One month with IDrive e2, and I run into this shit.

    #IDrive #IDriveE2 #AmazonS3 #Mastodon #WordPress #S3

  6. #Mountpoint for #AmazonS3 is now generally available: bit.ly/3OLS9Vi

    The new open-source file client provides through a file interface the elastic storage and throughput of Amazon S3, supporting data transfer at up to 100 Gb/second between each EC2 instance and the object storage.

    #InfoQ #AWS

  7. @bohofromthegetgo
    We forget, what is your position on CloudFlare? A lot of sites are "fake Russian" and actually go through #CloudFlare.

    A good way to find #fakeSites or sites that allow #massSurviellance, is to use Ctrl+Shift+E in TorBrowser. CloudFlare sites have "cf-ray" in their HTTP responses, #Amazon have "amz" or "AmazonS3". The #AkamaiGhost and Azure are centralised scams.

    Lots of #malware as a service on the #legacyInternet.

    #amAZONS3 #cDNs #corporateDictatorshipNetworks #useI2P

  8. HOW TO TEST your favourite sites for #CloudFlare surveillance + other nasties.

    1) In a new #TorBrowser tab, hit Ctrl+Shift+E for the #NetworkTab.

    2) Load website.

    3) Order fetched content in NetworkTab by #domainName then check each domain. Ensure that Server is not Cloudflare (or #AmazonS3 = #CloudFront = #amz and MS #azure).

    If its bad, make a BLOK bookmark, if good make ALOW bookmark. Date it (eg. feb'22) so after a year you can test it again.

    #cloudflareTest #deCloudflare #crimeFlare

  9. HOW TO TEST your favourite sites for #CloudFlare surveillance + other nasties.

    1) In a new #TorBrowser tab, hit Ctrl+Shift+E for the #NetworkTab.

    2) Load website.

    3) Order fetched content in NetworkTab by #domainName then check each domain. Ensure that Server is not Cloudflare (or #AmazonS3 = #CloudFront = #amz and MS #azure).

    If its bad, make a BLOK bookmark, if good make ALOW bookmark. Date it (eg. feb'22) so after a year you can test it again.

    #cloudflareTest #deCloudflare #crimeFlare

  10. HOW TO TEST your favourite sites for #CloudFlare surveillance + other nasties.

    1) In a new #TorBrowser tab, hit Ctrl+Shift+E for the #NetworkTab.

    2) Load website.

    3) Order fetched content in NetworkTab by #domainName then check each domain. Ensure that Server is not Cloudflare (or #AmazonS3 = #CloudFront = #amz and MS #azure).

    If its bad, make a BLOK bookmark, if good make ALOW bookmark. Date it (eg. feb'22) so after a year you can test it again.

    #cloudflareTest #deCloudflare #crimeFlare

  11. If you thought the #banking sector was only under a #MITMAttack by #Cloudflare, think again.

    Early research is showing that about 30% of #banks are being served by #Microsoft! — in #Australia, that is!!

    You can test whether your bank is under a #MegaCorpInTheMiddle (MITM) Attack by hitting F12 in your #browser while loading the #website.

    If the response coming back from yourBankDomain.com says #MicrosoftIIS, cloudflare, #AmazonS3, or #Akamai, you may want to #switchBanks

    …immediately!

  12. Three easy steps to test a site for #Cloudflare and other nasties.

    1) In a new #TorBrowser tab, hit Ctrl+Shift+E to bring up the #NetworkTab.

    2) Load the website (optional: strip URL to domain name only),

    3) In the NetworkTab click each #domainName of assets that seem unique to that page. In the column that appears, ensure that Server is not Cloudflare, or #AmazonS3 (or #MicrosoftIIS). If its bad, make a BLOCKMARK bookmark, if good make an ALLOW b'mark. Date it.

    #cloudflareTest #deCloudflare

  13. Three easy steps to test a site for #Cloudflare and other nasties.

    1) In a new #TorBrowser tab, hit Ctrl+Shift+E to bring up the #NetworkTab.

    2) Load the website (optional: strip URL to domain name only),

    3) In the NetworkTab click each #domainName of assets that seem unique to that page. In the column that appears, ensure that Server is not Cloudflare, or #AmazonS3 (or #MicrosoftIIS). If its bad, make a BLOCKMARK bookmark, if good make an ALLOW b'mark. Date it.

    #cloudflareTest #deCloudflare