Anyone who has already dealt with the security of the DNS protocol had to realize that it can be easily manipulated, monitored and censored without much effort. These censors are not only theory, but are already implemented by various countries. To cover these topics in the DNS protocol, several extensions were specified, such as DNSSEC with DANE/TLSA to detect man-in-the-middle attacks. The newest approaches in this area go a step further and encrypt the whole DNS traffic.
Recently I noticed, that reading some code and text in the gnome terminal under Fedora is difficult for me, especially by low screen lightning on my laptop. The default color scheme has some really bright white foreground color and has been bothering me for some time, therefore I have searched a new color scheme, that appears less glaring to me. It should also support a enjoyable code syntaxhighlighting and have a good contrast.
The last few months sysadmins, engineers and security components were on needles. Many security holes were found and patched. And in this case, patched means patched in the code, built binaries and pushed out by the sysadmins. Specially in the SSL/TLS segment, resp. openssl and its algorithms.
UPDATE (21. Oct 2017):
Needless to say, there is always improvement on security, so I updated the mentioned ciphers, protocols and configurations in this article.
But not everything can be patched if its weak by nature. There are protocols, which are now insecure and you should not...