Posts
2521
Following
647
Followers
1462
"I'm interested in all kinds of astronomy."
repeated

diana 🏳️‍⚧️🦋🌱

7
13
0
@Some_Emo_Chick Wait, I literally heard this argument yesterday but sampled in an old EDM track o.O Will try to dig it up from history...
0
0
1
repeated

“There is significant public interest in knowing when and on what basis the UK government believes that it can compel a private company to undermine the privacy and security of its customers.”

ORG, Big Brother Watch and Index on Censorship call for the Tribunal into the UK government's secret order for Apple to break encryption to be held in public.

The case happens TOMORROW.

Read more ⬇️

https://techcrunch.com/2025/03/13/apples-appeal-against-uks-secret-icloud-backdoor-order-must-be-held-in-public-rights-groups-urge/

1
6
0
Edited 4 months ago
Representing type lattices compactly

https://bernsteinbear.com/blog/lattice-bitset/

"The Cinder JIT compiler does some cool stuff with how they represent types so I’m going to share it with you here. "

("Cinder is Meta's internal performance-oriented production version of CPython.")

/via exploits.club
0
0
2
@wdormann On a more serious note setting a hard deadline for publication can do wonders to the pipeline IME.
0
0
2
@wdormann Just repost your original report to FD, if MSRC can't repro without a video I'm sure bad guys can get no value from it either.
1
0
6
repeated

"Don't make vulnerability reporters angry" is not high on anybody's list, it seems.

5
2
0
repeated

We value your opinion! Please respond to our:

“CVE Data Usage and Satisfaction Survey”
https://forms.office.com/g/hx168RPctg

The CVE Program is requesting feedback from:
* CVE consumers
* Defenders

0
2
0
repeated

hugovangalen 🤖 🕹️ 😼

This weekend, talking to a guy who does IT at a Dutch bank.

Me: So everything runs on Azure or AWS these days?

He: Yes

Me: So they can see all the data.

He: No it's on separate servers, on EU soil. That was a thing before we decided to go ahead with this.

Me: So... They can see all the data.

He: No it's encrypted and threw some acronyms at me.

Me: So, you download the data, decrypt it, and work on it?

He: No that's done on the servers.

Me: So... They can see all the data.

3
13
0
CVE-2025-27363: out of bounds write in FreeType <= 2.13.0

https://seclists.org/oss-sec/2025/q1/206

"This vulnerability may have been exploited in the wild."

"This commit fixes most of the issue - except `limit` is still signed short":

https://github.com/mozilla/gecko-dev/commit/026f6a947085020cd189dd9af3da00be433a44f8
0
1
4
repeated

Graham Sutherland / Polynomial

the absolute state of infosec vulnerability marketing these days

on further analysis by folks who actually understand the tech it turns out the claimed backdoor isn't a backdoor at all, it isn't even really a security issue, and has been framed in a way that is both disingenuously overhyped and also pretty racist

bravo, folks, really advancing the field

4
6
0
[RSS] Sign in as anyone: Bypassing SAML SSO authentication with parser differentials

https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/
0
2
1
In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass Spying | Electronic Frontier Foundation
https://www.eff.org/deeplinks/2025/03/memoriam-mark-klein-att-whistleblower-about-nsa-mass-spying

#fromBsky
0
1
2
repeated

This is something that was occupying my time for some time already and I'm super happy that this research is finally released.

I believe this to be only a second reporting on malware targeting Juniper devices. Following Lumen Technologies blog from last month (but this one related to a different actor and different malware).

This blogs dives into specifics of Veriexec bypass vulnerability used by UNC3886, and details of 6 different backdoors found on Juniper MX devices.

UNC3886 is a very interesting actor that does not shy away from targeting less commonly known technologies like routers, edge devices or hypervisors.

More details here: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers

0
4
0
repeated

I learned today that MySQL connections are crypto agility hell.

It has a concept of "secure" and "insecure" connections, opportunistic TLS, less opportunistic TLS, rsa based password encryption for transmitting a connection password securely over an insecure connection, and here's the kicker: an authentication cache that allows to authenticate over an insecure connection if you have first authenticated over a secure connection.

Paging @soatok ...

0
5
0
repeated
repeated

One of the things I've been advocating for years - and where I want to raise my voice even louder - is the importance of owning your data.

Over the past few days, I’ve come across two examples of how misinformation is causing immense damage, leading people to believe that there's no alternative but to hand over their data to big corporations, putting themselves entirely in their hands.

- A well-known lawyer, just before a meeting, warned about using Teams and its new "virtual assistant," which joins conferences before anyone else and transcribes everything. When I pointed out that it would be wise to use alternative tools (like Jitsi, for example, but there are others), he abruptly ended the conversation, saying, "We've lost this war. There's no alternative anymore."
That wasn’t the right moment for a detailed discussion, so I just noted that alternatives do exist - but if no one starts using them, and if we passively accept certain behaviors from certain companies, things will never improve for us.

- Just now, I received another one of those emails that hurt more in the heart than in the wallet: "Our e-commerce is taking off, so we’re moving it to Shopify to better manage our growth."
I replied, trying to explain that handing over a growing e-commerce business to a third-party company (right now, they have full access to their own server - meaning all their databases, data, etc., are under their control) means losing ownership of it. Prices could change at any moment, contract terms could shift negatively, and, worst case scenario, if Shopify itself faced issues (which seems impossible today, but think of giants like Kodak), they could lose everything. Of course, they’ll do what they think is best, but I feel obligated to warn them.

Luckily, others are making the opposite choice. But I keep wondering: since these big platforms aren’t exactly cheap, rather than "selling themselves" to them just for (potentially) fewer headaches, wouldn’t it be worth paying someone (not me, of course, but someone working exclusively for them) to handle these things - ensuring they retain full ownership of their business and their data?

2
5
0
Show older