Video for my #P99CONF talk on DTrace at 21 is now up, though you will miss me in the chat explaining which of the slides are throwing shade at eBPF https://www.youtube.com/watch?v=KjQnB9yB9kQ
CVE-2024-26926 Binder n-day analysis.
It is labeled EoP in Android Security Bulletin (Is it really exploitable?)
A quick newsletter post on the dehumanization behind Satya Nadella's remarks about copyright law
https://buttondown.com/maiht3k/archive/virtual-employees-and-remixing-machines-devalue/
That's a wrap for #Pwn2Own Ireland 2024! Over last 4 days, we awarded $1,066,625 for over 70 0-day bugs. That makes 4 contests in a row that exceeded the million-dollar mark. Congratulations to the Viettel Cyber Security team for winning Master of Pwn with 33 points and $205,000.
Seasonal Spells for #ToddlerDnD
Toddler's Vicious Snot: This spell initially impacts the member of the party with the lowest HP. It lasts for 2 days. After that it affects all other members of the party, is immune to Healing, and you need a 20+ Con saving throw to recover from it.
Fall Back: This spell interrupts the target's Long Rest one hour too soon. Every time. For about two weeks.
Toddler's Disappearing Accessories: This spell affects hats, gloves, scarves, and boots.
The thing where companies make websites for their own executives, who never visit them, instead of their customers, who are forced to.
This makes me want to scream and pull out my hair.
"Reduce your vocabulary by 10-20% to prove you're a human."
The Apple Security Research blog now has an RSS feed, though it’s not properly advertised.
A vulnerability in the Common Log File System (CLFS) driver allows a local user to gain elevated privileges on Windows 11 https://ssd-disclosure.com/ssd-advisory-common-log-file-system-clfs-driver-pe/
Has anyone attempted to calculate the overall environmental / energy consumption of Electron, vs if the most popular applications using it were rewritten in a more efficient native framework?
It has now been twelve years since the paper "The most dangerous code in the world: validating SSL certificates in non-browser software" was published.
My blog post about it from back then: https://daniel.haxx.se/blog/2012/10/25/libcurl-claimed-to-be-dangerous/
It'd be interesting to know how much HTTPS clients are still skipping cert verification in the wild. I bet it is still widespread.