Posts
2581
Following
629
Followers
1407
"I'm interested in all kinds of astronomy."
I just got reminded of this masterpiece:

https://en.wikipedia.org/wiki/Kazohinia

Can recommend to anyone who wants to see our societies from a different, enlightening perspective.

There's a new edition in #Hungarian (and also a couple of pirate ebooks online) too! English versions seem to be a rarity, but you should definitely grab a copy if there is a chance.

#bookstodon
0
1
3
repeated

šŸ“£ Announcing the availability of:

- PHP 8.3.8
- PHP 8.2.20
- PHP 8.1.29

ā€¼ļø These SECURITY releases fix:

- Argument Injection in PHP-CGI
- Bypass in filter_var FILTER_VALIDATE_URL
- proc_open workaround Windows with escaping arguments for bat/cmd files
- openssl_private_decrypt vulnerability to the Marvin attack

Please upgrade ASAP.

Changelog: https://www.php.net/ChangeLog-8.php
Source: https://www.php.net/downloads
Windows: https://windows.php.net/download/

0
3
0
repeated
repeated

Companies that bought a metric shit load of Nvidia processors want you to know how very badly you need a virtual assistant who spies on you and makes stuff up in order to justify it.

0
7
0
On a related note: It's significantly easier to find a pirate copy of Windows Security Internals than a EU distributor...
2
0
1
'It’s not a security vulnerability that users can access files that they have access to, even if the file is a little hard to find' by Raymond Chen seems relevant to the #Recall discussion:

https://devblogs.microsoft.com/oldnewthing/20200113-00/?p=103322

Indeed, you can even find @tiraniddo in the comments, who wrote about the topic recently:

https://www.tiraniddo.dev/2024/06/working-your-way-around-acl.html

I still don't see how *cross-user* access might be achieved *without admin* (as reported by @gossithedog ).
2
1
4
repeated

"...Suddenly every PC becomes a target for Discovery during legal proceedings. Lawyers can subpoena your Recall database and search it, no longer being limited to email but being able to search for terms that came up in Teams or Slack or Signal messages, and potentially verbally via Zoom or Skype if speech-to-text is included in Recall data..."

ah the clarity of @cstross

https://www.antipope.org/charlie/blog-static/2024/06/is-microsoft-trying-to-commit-.html

0
3
0
repeated

look i am not going to be a recall defender, nor am i a fan of the ā€œuac is not a security boundaryā€ bit, but this commentary seems… disingenuous. yes, your data is restricted to your user. yes, admins have full control over the machine meaning they can access your data. this shouldn’t be surprising. windows admin security boundaries are basically non-existent, i wish that wasn’t the case but that’s how it’s always been and will be for the foreseeable future

3
1
1
repeated

AhnLab researchers warn about phishing HTML files attached to emails that prompt users to directly paste (CTRL+V) and run commands. https://asec.ahnlab.com/en/66300/

0
1
0
repeated

Ooh cool @travisgoodspeed has written a book on Microcontroller Exploits. Will certainly be adding this to my collection!

https://nostarch.com/microcontroller-exploits

0
2
0
[RSS] Debugging the Windows kernel on VMware Part Two

https://cra0.net/blog/posts/debugging-the-windows-kernel-vmware-p2/
0
0
0
Edited 10 months ago
I'm posting this again to my main timeline, because it's really frustrating (emphasis mine):

"Beaumont says *admin access to the system isn’t required* to read another user’s Recall database. *Another user with an admin account* can easily grab any other user’s Recall database and all the Recall screenshots by clicking through a simple UAC prompt."

https://arstechnica.com/ai/2024/06/windows-recall-demands-an-extraordinary-level-of-trust-that-microsoft-hasnt-earned/2/

How is this not a contradiction? All demos I've seen clearly show that UAC elevation (from an admin account) is needed to access the DB.

I find the idea of #Recall as baffling as anyone, but as professionals we must clearly communicate the risks, so that *real* threats (e.g. abusive spouse with local admin access) are highlighted and MS can't dismiss them as FUD.
3
2
3
[RSS] An Introduction to Chrome Exploitation - Maglev Edition

https://www.matteomalvica.com/blog/2024/06/05/intro-v8-exploitation-maglev/
0
2
4
[RSS] Frida 16.3 is out with CoreDevice/RemoteXPC support, new Service API, and many other improvements

https://frida.re/news/2024/05/31/frida-16-3-0-released/
0
1
1
repeated

endrift šŸ³ļøā€āš§ļø

Anyone have security contacts at Google? One of their IP addresses is spamming my ssh server, apparently as part of a botnet. Seems someone got compromised.

34.71.138.230 is the guilty party.

2
2
0
repeated

I added disabling Recall to my HardeningKitty list:
https://github.com/0x6d69636b/windows_hardening

Disable Recall - User
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\WindowsAI]
"DisableAIDataAnalysis"=dword:00000001

Disable Recall - Machine (not yet official)
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsAI]
"DisableAIDataAnalysis"=dword:00000001

1
2
0
repeated

Introducing Honeykrisp: the world's first conformant VulkanĀ® 1.3 driver for Apple Silicon.

https://rosenzweig.io/blog/vk13-on-the-m1-in-1-month.html

1
8
0
repeated
repeated

It happened again. We accidentally broke another check-in . This time Mr O'Yolo triggered a problem, crashed the Allegro Scenario Player and escaped the mode, which enabled access to the Windows Desktop: https://www.pentagrid.ch/en/blog/ariane-allegro-hotel-check-in-terminal-kios-escape/

0
2
0
Show older