Posts
2510
Following
649
Followers
1466
"I'm interested in all kinds of astronomy."
repeated

good lord. I pulled a microSD card out of a Raspi inside an IoT product and it appears they had some developer use a raspi to develop/test some software, and then they just yanked the SD card out of that machine and duped it on to all of their deployed products.

it's got .bash_history of the development process! there's git checkouts of private repos! WHY WOULD YOU DO THIS?

9
25
2
repeated

It is looking more and more like the whole thing happened due to malformed data files and a parser that crapped its pants trying to parse them. 🤦‍♀️

With that in mind, I'd like to suggest we all spend some time reminding ourselves of, or learning about, :
https://langsec.org/

✨ LangSec® ✨
Don't pull a CrowdStrike!™

4
5
0
repeated

The ambulance chasing by some companies (of which I used to work at) over the crowdstrike issue is disgusting.

1
1
1
repeated

In an unexpected turn of events, a sensible take on from the Orange Site.

Source: https://news.ycombinator.com/item?id=41004184

7
17
1
repeated

Obvious point - the CrowdStrike worldwide IT incident is not the fault of one CrowdStrike staff member.

Whoever created the signature or pushed the button does not operate in isolation. It’s a company with a $73bn market cap.

They need to, later, go back and look at everything that went wrong.

7
10
0
repeated
repeated

(meme by rantyben who does not elephantpost)

3
9
0
repeated
Edited 1 year ago

Southwest’s tech debt hurt it back in 2022 but it seems to be doing it some favors today.

Old Windows taketh away, but sometimes old Windows giveth.

https://www.digitaltrends.com/computing/southwest-cloudstrike-windows-3-1/

EDIT: Fix date

EDIT: @peterbutler pushed me to do a little more research, and I’m more comfortable saying it the underlying software probably dates to Windows NT or XP.

3
10
0
repeated

The thing I hope is alarming people about today's outage is that if the company can take out that much of America's tech infrastructure by accident with a single buggy update, our adversaries can do the same on purpose with a supply-chain attack against CrowdStrike, and that one probably wouldn't be as quick to recover from.

3
11
0
repeated

@hanno Byzantine designs are marketable, simple reliable, dependable (and, hence, secure) designs are not.

2
1
0
repeated

Their products are flawed not just because they're badly implemented - which they are - but because they are based on a stupid idea. The idea that you improve your IT security by adding more complexity. Doing the opposite is the right approach. But you can't sell that as a product. (You can still sell it, but it's not something you just plug into your network and get security magically.)

2
3
0
repeated

Let's cut the bullshit and spell out a few things. The IT security industry is about as trustworthy as the food supplement and vitamin industry, but somehow they escaped the same reputation. Their products are overwhelmingly based on flawed ideas, and the quality of their software is exceptionally bad. And while not everyone will agree with the harshness of my words, I'll say this: Essentially everyone in IT security who knows anything in principle knows this.

3
8
2
repeated
Edited 1 year ago

#2961 - CrowdStrike

0
2
0
repeated

boB Rudis 🇺🇦 🇬🇱 🇨🇦

The sheer volume of CrowdStrike-esque domains being registered and weaponized today is…staggering.

1
4
0
repeated

@LukaszOlejnik This paper seems to be fundamentally flawed — their simulator failed to properly use an RNG, so it simulated giving people the same topics on every site. See https://github.com/yohhaan/topics_api_analysis/issues/1

This points out how great it is for published papers to post their code and data set on GitHub! It means that we can actually point to the bug in their simulator, offer the one-line fix, and immediately re-run the corrected analysis using the author's own fixed code.

0
2
0
repeated
repeated

Graham Sutherland / Polynomial

Edited 1 year ago

@thephd there's a main kernel driver and a bunch of .sys files that contain update data. the main kernel driver parses those .sys data files. one of those data files has incorrect data in it, which causes the parser (written in C) in the main driver to crash. from what I've seen of the analysis (early days) it looks like bad pointer maths from invalid data, leading to either UAF or OOB memory access.

0
1
0
repeated
repeated

just ran into an incredible bug: portal 2 crashes if you happen to have a CPU with 128 threads

https://github.com/ValveSoftware/portal2/issues/367

0
8
1
repeated

Dear buttplug.io users:

We apologize for the current downtime.

If your butt is BSOD’ing, please try rebooting it a few times.

5
3
0
Show older