Posts
2524
Following
646
Followers
1461
"I'm interested in all kinds of astronomy."
repeated
repeated
repeated

Holy shit, I thought I knew how evil the industry was but here we are:

Two-thirds of European websites just ignore your choice and track you anyways, researchers from found. 🤯

https://www.usenix.org/system/files/sec23winter-prepub-107-bouhoula.pdf

5
32
1
repeated

AI generation when writing software is a false economy. You are replacing writing code with code review. Code review is harder and requires you to already have an understanding of the domain which often means that you would’ve even able to write it yourself to begin with. If you code gen something because you don’t know how to write it yourself, you by definition cannot review it without going though an effort equivalent to writing it yourself in the first place.

Unless of course you don’t care about code review and so doom yourself into treating software like magical incantations that break randomly for no perceivable reason; but no good mage would do that, surely.

16
23
2
repeated

Is anyone aware of a list of software and tech companies that have been recently acquired by private equity firms? Seems like when that happens it's time to start yanking all the software/hardware tied to the acquired firm, because any accountability for security has a habit of disappearing when these firms get bought by PE.

4
7
0
repeated

Update: Found the chicken bit. This fixes the vulnerability.

"The main problem with the attack is that it's one that cannot be patched in Apple Silicon itself, since its a central part of the design."

Press X to doubt. I guarantee there's a chicken bit in the HID registers to disable the DMP. This could be disabled globally, only for some processes, or even exposed as a syscall to do it dynamically around sensitive code (Apple are not allergic to that, they already have codepaths that twiddle a HID4 bit at runtime).

https://gofetch.fail/

Edit: and just to be clear, this only affects M1 and M2. M3 is working entirely as intended, where the DIT bit disables the DMP. Constant-time, data-independent crypto code is already supposed to be using the Data Independent Timing bit. That's what it's for, we learned of this problem many years ago! Any issues on M3 caused by this problem are a code bug, nothing to do with the chips. The chicken bit story is for M1 and M2, where the bug is that the DIT bit is not hooked up to disable the DMP.

2
6
0
repeated
Edited 1 year ago

Forget the xz/liblzma backdoor in Linux distros, there's a confirmed backdoor in D-Link Network Attached Storage (NAS) products. Username is messagebus with an empty password. Tracked as CVE-2024-3273 (7.3 high, disclosed 26 March 2024), D-Link refuses to patch it because "All D-Link Network Attached storage has been End of Life and of Service Life for many years [and] the resources associated with these products have ceased their development and are no longer supported" đź”— https://www.bleepingcomputer.com/news/security/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account/

6
9
0
repeated

You don't need an 8-core CPU and 16 gigabytes of RAM just to jot down some notes. An ESP32 and a handwired keyboard will work quite nicely.

You know...in case you don't have a pen.

https://hackaday.com/2024/04/05/esp32-provides-distraction-free-writing-experience/

0
2
0
repeated

"The biggest source of conflict was an amendment ... that would prohibit from selling consumer data to and would require a warrant to access Americans’ information... National hawks in and local law enforcement groups joined forces to kill the amendment, with the National Sheriffs’ Association claiming it would “kneecap law enforcement” in a letter to Congress..."

https://www.theverge.com/2024/4/5/24122079/data-brokers-fisa-extension-nsa-section-702-surveillance-lexis-nexis

1
4
0
repeated

I've taken to calling the Bitcoin price ticker "ransomware futures".

4
13
1
repeated
Edited 1 year ago

Babe wake up, new Google Pixel zero-days just dropped: đź”— https://source.android.com/docs/security/bulletin/pixel/2024-04-01

  • CVE-2024-29745 (information disclosure, high severity)
  • CVE-2024-29748 (elevation of privilege, high severity)

Note: There are indications that the following may be under limited, targeted exploitation.

EDIT: Reported by security researcher Daniel Micay of GrapheneOS Foundation who reported that the vulnerabilities were exploited in the wild by forensics companies đź”— https://grapheneos.social/@GrapheneOS/112204428984003954

CVE-2024-29745 refers to a vulnerability in the fastboot firmware used to support unlocking/flashing/locking. Forensic companies are rebooting devices in After First Unlock state into fastboot mode on Pixels and other devices to exploit vulnerabilities there and then dump memory. We proposed zeroing memory in firmware when rebooting to fastboot mode to wipe out the whole class of attacks. They implemented this by zeroing memory when booting fastboot mode. USB is only enabled by fastboot mode after zeroing the memory is completed, blocking these attacks. GrapheneOS already implemented defenses against this attack before we became aware of it. After becoming aware of this attack against Pixels running the stock OS, we improved our existing defenses and added new ones alongside reporting the firmware weaknesses to get those fixed.

CVE-2024-29748 refers to a vulnerability providing the ability to interrupt a factory reset triggered by a device admin app. It appears they've implemented a partial solution in firmware. See https://grapheneos.social/@GrapheneOS/112162304896898942 about ongoing work we spotted on wipe-without-reboot support.

See related Bleeping Computer reporting: đź”— https://www.bleepingcomputer.com/news/security/google-fixes-two-pixel-zero-day-flaws-exploited-by-forensics-firms/

1
5
0
repeated

I always forget the CORE SSH story about @4Dgifts and Futo working on the then SSH implementation, finding a bug, sending the report upstream with a patch, upstream botching the patch and… it was a CRC32 checksum backdoor ("No relation"™ to the current stuff).

You might have seen it in a rather famous film where it is shown to enter the utility services from a pretty green phosphors terminal.

flan_XD​

0
2
0
repeated

Any experienced C developers among my followers? .

Expat, arguably the world's most popular parser, is understaffed and without funding. As has shown, situations like this are dangerous.

Last month, maintainer Sebastian Pipping put up a plea for help at https://github.com/libexpat/libexpat/blob/R_2_6_2/expat/Changes

(I would help myself, but my C skills barely surpass "Hello, World".)

Found via @timbray - https://cosocial.ca/@timbray/112203547801373427



1
6
0
repeated
Edited 1 year ago

The Foundation, alongside other organizations including the Software Foundation, Foundation, Software Foundation, Software Foundation, Foundation, and Foundation, announced today a collaborative initiative aimed at establishing common cybersecurity standards in alignment with the European Union’s Cyber Resilience Act ():

https://thephp.foundation/blog/2024/04/02/open-source-community-cra-compliance-initiative/

1
6
0
repeated
Edited 1 year ago

This is not a late April Fool's joke: After , we accidentally dumped the keypad codes of almost half of an IBIS hotel's rooms by entering some dashes into a check-in terminal: https://www.pentagrid.ch/en/blog/ibis-hotel-check-in-terminal-keypad-code-leakage/

6
8
0
repeated
Edited 1 year ago

Here's a fun AI story: a security researcher noticed that large companies' AI-authored source-code repeatedly referenced a nonexistent library (an AI "hallucination"), so he created a (defanged) malicious library with that name and uploaded it, and thousands of developers automatically downloaded and incorporated it as they compiled the code:

https://www.theregister.com/2024/03/28/ai_bots_hallucinate_software_packages/

1/

10
24
0
repeated

I'm watching some folks reverse engineer the xz backdoor, sharing some *preliminary* analysis with permission.

The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().

It's RCE, not auth bypass, and gated/unreplayable.

More details in this thread: https://bsky.app/profile/did:plc:x2nsupeeo52oznrmplwapppl/post/3kowjkx2njy2b

6
13
0
repeated
As someone just catching up on the xz drama I have to say GitHub nuking literally everything related to the repository is incredibly frustrating. Real loser energy right there
1
4
0
repeated

A very niche joke via @leonjza

0
2
0
repeated
Edited 1 year ago

RCE challenge contest: whoever gets code execution on my Macintosh LC 475 running Mac OS 8.1 on the public internet at 185.218.227.18 wins $350 over PayPal

7
6
1
Show older