Infosec.Exchange
Welcome aboard!Infosec.Exchange is a Mastodon instance with an information security focus but plenty of room for other things. It is one of the more popular instances in the fediverse.
Infosec.Exchange is administered by @jerry with help from a team of moderators and some rules.
Infosec.Exchange is hosted on servers in data centers and costs money to run. You can chip in to offset those costs if you wish to.
Featured Articles
wiki shop windowFAQ & How to
In case it helps someone, there it isBrowse the full list of FAQs, or see the categories below:
Category | Description | |
---|---|---|
About Infosec.Exchange | Pages about the Infosec.Exchange instance itself. Admin. Hosting. Donate. | |
Rules | Don't be a jerk | |
Security | Moderation. Guide to reporting problems with people or content. | |
Security | Protect your account. Two-factor authentication/MFA. Security research policy. | |
Profile | Join Infosec.Exchange. Move in, move out. Work with your profile. | |
Verification | Blue checkmark 'Verified' emoji fun but meaningless. Prove it's you with rel=“me”. | |
Read & Discover | User interface. Browse. Read. Discover. Follow. Lists. RSS feeds. | |
Post & Share | Alt text. Character limit. Content Warning. | |
Privacy | Direct messages (DMs) are not secure. Privacy policy. Set audience restrictions. | |
Mastodon | The software Infosec.Exchange runs on. GitHub. Glitch-soc. | |
The fediverse | The fediverse: not just Mastodon. |
Need help?
If something's not right, start hereWe strive to make Infosec.Exchange a safe and welcoming instance for everyone.
We take our rules seriously. If you want to report problematic posts or accounts, start with our guide to reporting on Infosec.Exchange.
Rules
Don't be a jerk“Don't be a jerk” covers ~90% of the rules.
- Rule 1: Do unto others as you think they would want done to them.
- Rule 2: Mark sensitive content with a Content Warning.
- Rule 3: Gratuitously obscene content serving no practical benefit to a discussion is not permitted.
- Rule 4: Illegal content such as child pornography, unsurprisingly, is not permitted.
- Rule 5: Spam is not permitted, this includes creating spam accounts that only serve to provide profile links or advertise products and services.
- Rule 6: Hate speech, abusive or threatening behaviour is not permitted.
- Rule 7: Lack of a specific rule does not mean something is permitted.
- Rule 8: Violating one or more of these rules may result in an immediate, permanent ban without notice or warning.
- Rule 9: You may not impersonate a person or brand without a clear indication that the account is unofficial and/or parody.
- Rule 10: No attacks against (or from) the instance
Blog
News and updateswiki
wiki.infosec.exchangeYou are reading the Infosec.Exchange wiki, which relies on volunteer editors to extend and improve content (join us!)
Recent changes: