What year is this?!
I think I am taking crazy pills!
FWIW: The first ever vulnerability I reported to a vendor was a DNS cache poisoning attack against BIND due its use of predictable query IDs.
I reported it.... in 1996!
The replies to your posts since the AWS outage have been an amazing source of 'Signal has a flaw and therefore we should ignore the dozens of fundamental design flaws in {other thing} and use it instead' posts.
The mindset of 'X is not perfect, therefore we should use Y, which is strictly worse in almost every way but lacks this one problem of X' never ceases to amaze me.
Miss anything from Day 2 of #Pwn2Own Ireland 2025? Join @TheDustinChilds as he recaps what happened and covers some of the highlights of the event.
https://youtu.be/Xz7jjz6xIic
This follows the Silicon Valley model popularised by Facebook 20 years ago of opting people into consent for things op because they were in other people’s address books and those people consented to sharing personal information. It’s a shame it took regulators so long to stamp on that, it should have been the result of massive fines, possibly followed by fire.
RT @ednewtonrex
Wait… so users of OpenAI’s Atlas browser can opt-in the web pages they browse - *which belong to other people* - to AI training?
Cool cool
If you know who did this, or if you know how to set it back, the hotel kindly asks you to do so, respecting the fun achievement unlocked :)
https://infosec.exchange/@xme/115422139879568495
every AI generated pixel, every AI generated token I see makes me want to use the internet less. it makes me want to log off and spend the rest of my days reading books published before 2020. this must be how the paranoid creatives felt in the 2000s when cross-site tracking and the patriot act also pushed them offline. this must be how those creatives who refused to give up their own methods of distribution felt when things like facebook and twitter and youtube monopolized attention through the 2010s and turned the internet into a small collection of walled gardens. I don't know what kind of creative you'd call me, but I cannot abide by the internet being polluted by mushy, merely-probable junk data which is drowning out what had once been a place to find real testimony, real human effort and art whose maxim is to bridge the gap between us. sure there will always be oases, places where human creativity continues to thrive, but I'll forever miss when the entire land was covered in green.
this story is crazy not because someone in the exploit business got a taste of their own medicine, that part should be expected. the crazy thing is that trenchant, widely considered to be one of the “good discerning western exploit shops” was leaking chrome exploits to who knows where.
https://infosec.exchange/@lorenzofb/115412729875549507
Boom! Rafal Goryl of PixiePoint Security needed two attempts but was able to get his exploit of the Phillips Hue Bridge working. He heads off to the disclosure room to provide all the details. #Pwn2Own
You can find all of the results from Day Two of #Pwn2Own Ireland at https://www.zerodayinitiative.com/blog/2025/10/22/pwn2own-ireland-2025-day-two-results - We'll be updating this blog throughout the day as results become available. #P2OIreland
The new version of the Sanitizer API is now enabled by default in @firefoxnightly!
https://developer.mozilla.org/en-US/docs/Web/API/Sanitizer
https://wicg.github.io/sanitizer-api/
Please give it a try and provide us with feedback.
Recapping Day One of #Pwn2Own Ireland 2025. Join @dustin_childs (and Maude) as he covers the highlights of the first day of the competition. We awarded $522,500 for 34 unique 0-day bugs, and more is to come. https://youtu.be/tiM_StSFvow
The schedule for r2con2025 is out!
It's online, plenty of awesome talks.