“There is significant public interest in knowing when and on what basis the UK government believes that it can compel a private company to undermine the privacy and security of its customers.”
ORG, Big Brother Watch and Index on Censorship call for the Tribunal into the UK government's secret order for Apple to break encryption to be held in public.
The case happens TOMORROW.
Read more ⬇️
#encryption #e2ee #privacy #security #ukpolitics #ukpol #cybersecurity #apple
"Don't make vulnerability reporters angry" is not high on anybody's list, it seems.
We value your opinion! Please respond to our:
“CVE Data Usage and Satisfaction Survey”
https://forms.office.com/g/hx168RPctg
The CVE Program is requesting feedback from:
* CVE consumers
* Defenders
#cve #vulnerability #vulnerabilitymanagement #cybersecurity
This weekend, talking to a guy who does IT at a Dutch bank.
Me: So everything runs on Azure or AWS these days?
He: Yes
Me: So they can see all the data.
He: No it's on separate servers, on EU soil. That was a thing before we decided to go ahead with this.
Me: So... They can see all the data.
He: No it's encrypted and threw some acronyms at me.
Me: So, you download the data, decrypt it, and work on it?
He: No that's done on the servers.
Me: So... They can see all the data.
the absolute state of infosec vulnerability marketing these days
on further analysis by folks who actually understand the tech it turns out the claimed backdoor isn't a backdoor at all, it isn't even really a security issue, and has been framed in a way that is both disingenuously overhyped and also pretty racist
bravo, folks, really advancing the field
This is something that was occupying my time for some time already and I'm super happy that this research is finally released.
I believe this to be only a second reporting on malware targeting Juniper devices. Following Lumen Technologies blog from last month (but this one related to a different actor and different malware).
This blogs dives into specifics of Veriexec bypass vulnerability used by UNC3886, and details of 6 different backdoors found on Juniper MX devices.
UNC3886 is a very interesting actor that does not shy away from targeting less commonly known technologies like routers, edge devices or hypervisors.
More details here: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers
I learned today that MySQL connections are crypto agility hell.
It has a concept of "secure" and "insecure" connections, opportunistic TLS, less opportunistic TLS, rsa based password encryption for transmitting a connection password securely over an insecure connection, and here's the kicker: an authentication cache that allows to authenticate over an insecure connection if you have first authenticated over a secure connection.
Paging @soatok ...
Project: mpengine-x64-pdb 1.1.24090.11
File: mpengine.dll
Address: 75a6ac088
get_resource_info
SVG:
dark https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a6ac088.json&colors=dark
light https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a6ac088.json&colors=light
One of the things I've been advocating for years - and where I want to raise my voice even louder - is the importance of owning your data. #OwnYourData
Over the past few days, I’ve come across two examples of how misinformation is causing immense damage, leading people to believe that there's no alternative but to hand over their data to big corporations, putting themselves entirely in their hands.
- A well-known lawyer, just before a meeting, warned about using Teams and its new "virtual assistant," which joins conferences before anyone else and transcribes everything. When I pointed out that it would be wise to use alternative tools (like Jitsi, for example, but there are others), he abruptly ended the conversation, saying, "We've lost this war. There's no alternative anymore."
That wasn’t the right moment for a detailed discussion, so I just noted that alternatives do exist - but if no one starts using them, and if we passively accept certain behaviors from certain companies, things will never improve for us.
- Just now, I received another one of those emails that hurt more in the heart than in the wallet: "Our e-commerce is taking off, so we’re moving it to Shopify to better manage our growth."
I replied, trying to explain that handing over a growing e-commerce business to a third-party company (right now, they have full access to their own server - meaning all their databases, data, etc., are under their control) means losing ownership of it. Prices could change at any moment, contract terms could shift negatively, and, worst case scenario, if Shopify itself faced issues (which seems impossible today, but think of giants like Kodak), they could lose everything. Of course, they’ll do what they think is best, but I feel obligated to warn them.
Luckily, others are making the opposite choice. But I keep wondering: since these big platforms aren’t exactly cheap, rather than "selling themselves" to them just for (potentially) fewer headaches, wouldn’t it be worth paying someone (not me, of course, but someone working exclusively for them) to handle these things - ensuring they retain full ownership of their business and their data?
#DataOwnership #Decentralization #BigTech #DataRights #MyDataMyChoice #TakeBackControl