Posts
2521
Following
646
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

We misunderstood the concept of afterlife. What the religious texts meant to say is that the essence of your online life will be preserved as the weights of an LLM that handles airline customer support and prescribes Viagra in a telehealth app.

4
8
0
repeated

TIL: https://ladybird.org a truely independent browser built by engineers not motivated by data driven revenue. DNSSEC, DANE, no shady CA list, etc. Theyvare always looking for help.

3
2
0
repeated

I'm happy to share that LIEF (extended)
is now providing an API to disassemble code (backed by the LLVM MC layer).

This disassembler is integrated with other functionalities
like dyld shared cache support or DWARF debug info.

You can checkout https://lief.re/doc/latest/extended/disassembler/index.html for the details.

0
4
0
repeated

And Transmission64 is live. Head on over to https://t64.to/watch .

0
2
0
repeated

George Takei verified 🏳️‍🌈🖖🏽

Moooooommmmm!!

1
4
0
repeated

I wrote some cool scripts that I want to share with the world but I do not want to start being in the business of maintaining another open source project. I guess I will just describe it in my blog and tell the world that it's cool and they can use it?

Anyway, I now have an python script for my homepage.
Whenever I build my blog, it also generates an XML Atom feed (many static site generators do that). After adding an article and building, I can loop ... 1/2

3
1
0
C Harness to #LibAFL

https://github.com/v-p-b/libfuzzer_kfx/blob/main/C2LIBAFL.md

I nice part of making an archive of my Twitter posts is that I realize I wrote stuff like this o.O #fuzzing
0
0
3
I implemented threading in my RSS2Bsky script so my larger posts are better propagated across networks:

https://github.com/v-p-b/rss2bsky.py

#RSS #Syndication #Bluesky #POSSE
0
0
3
#testing
Show content
This is a long test post, sorry...

Secure trust data mining linux cache poisoning encapsulation cyclic redundancy check cloud computing PKI signature FTP hijacking. Trust ephemeral port IP forwarding linux stream cipher port exponential backoff internet control message protocol race condition full duplex exposure IP spoofing. Challenge-handshake authentication protocol public key hypertext markup language topology war dialing disaster recovery plan decryption authorized. Account harvesting masquerade NAT stream cipher, cookie intranet certificates patch covert channel penetration test tunnel IP forwarding egress filtering.

https://www.securityipsum.com/

Ephemeral port reverse engineer fingerprint form-based authentication day zero. FTP UDP address resolution protocol boot sector, PPTP ransomware business continuity plan intrusion detection. IP flooding authentication disaster recovery plan corruption decryption MD5 dictionary attack socket egress filtering fragment digital signature exponential backoff worm. Reverse proxy encapsulation shell tunnel bastion host.
0
0
1
repeated

Handling Cookies is a Minefield:

inconsistencies in the HTTP cookie specification and its implementations have caused a situation where countless websites (including Facebook, Netflix, Okta, WhatsApp, Apple, etc.) are one small mistake away from locking their users out.

https://grayduck.mn/2024/11/21/handling-cookies-is-a-minefield/

3
10
0
repeated

David Schinazi mentioned @april's cookie blog post and I'm sorry but I had to do a "I told you so".

On the httpbis list.

https://lists.w3.org/Archives/Public/ietf-http-wg/2024OctDec/0231.html

1
1
0
repeated

Code ligatures suck ass.

12
3
0
repeated
repeated

We found our first bug today, in ‘s Client credential rotation feature. https://github.com/keycloak/keycloak/issues/35104

Will probably not be the last one - the runup to 2038 will be interesting.

1
5
0
repeated

HOPE XV videos just dropped on YouTube! https://www.youtube.com/channel2600

1
1
0
Update on Recall security and privacy architecture | Windows Experience Blog
https://blogs.windows.com/windowsexperience/2024/09/27/update-on-recall-security-and-privacy-architecture/
1
0
0
Previewing Recall with Click to Do on Copilot+ PCs with Windows Insiders in the Dev Channel
https://blogs.windows.com/windows-insider/2024/11/22/previewing-recall-with-click-to-do-on-copilot-pcs-with-windows-insiders-in-the-dev-channel/

Here we go again...
0
0
0
repeated

Trellix: When Guardians Become Predators: How Malware Corrupts the Protectors
A malware campaign drops a legitimate Avast Anti-Rootkit driver (BYOVD) to terminate security processes, disable protective software, and seize control of the infected system. Indicators of compromise provided.

0
1
0
repeated
repeated

In an ideal world for reverse engineering, every function would have a name, and every variable would be correctly typed. Take a step towards that world, learn to build your own custom Ghidra Data Types in my latest post: https://medium.com/@clearbluejar/everyday-ghidra-ghidra-data-types-creating-custom-gdts-from-windows-headers-part-2-39b8121e1d82

0
2
1
Show older