Gene Hackman’s Family Reveals What They Believe Caused His Death: Carbon Monoxide
Yet another reason to get rid of all the gas appliances in your home if you can: they’re dangerous!
If a government can issue a secret order to push a 'special' version of a mobile app just to a specific person (or set of people), how can this be mitigated?
How can app "rarity" be detected locally? (Antivirus and its descendants have a concept of a "well-known benign executable" vs one that has only been rarely seen.
Can a local app, or an OS feature, be used to compare local apps with a list of expected versions?
Can this be done independently of the OS (since the order could also subvert the rarity check)? (Even an independent app can be subverted if the only app store is the official one maintained by the same vendor.)
To detect unusual app versions, reproducible builds are necessary but not sufficient, unless the project is also FOSS -- because even if everyone gets the same APK, the app might receive different instructions from its server depending on unique metadata.
“HKEY_CURRENT_USER. You will never find a more wretched hive of scum and villainy.”
Anybody knows how to demangle a string, not a symbol, in #Ghidra using Python?
been reminded of this several times this week and not in a nice way
Firefox now has Terms of Use! This'll go over like a lead balloon.
You give Mozilla all rights necessary to operate Firefox, including processing data as we describe in the Firefox Privacy Notice, as well as acting on your behalf to help you navigate the internet. When you upload or input information through Firefox, you hereby grant us a nonexclusive, royalty-free, worldwide license to use that information to help you navigate, experience, and interact with online content as you indicate with your use of Firefox.
I got another #NameThatWare for you all. This time, lets try something new.
Its quite hard to make a challenge that is both accessible and challenging at the same time. So now, I will post multiple pictures. The first in this post is the 'hard' level. If you are not an expert, look at the 2nd picture that will be behind a CW. There is also a 3rd picture for easy-mode.
As always, try to write down you observations and deductions behind a CW to not spoil it for others.
NEW: Hacked crypto exchange Bybit is offering $140 million in bounties to anyone who can help locate and freeze the stolen ethereum.
Bybit also disclosed preliminary results of investigations, which reveal hackers breached a developer’s device at a wallet platform Safe Wallet.
Wrapping up our COM hijacking series! 🎉
In the final part, we discuss a custom IPC protocol, use a registry write to gain SYSTEM privileges, and explore Denial of Service attacks on security products. 💥💻
Don't miss it! https://neodyme.io/en/blog/com_hijacking_4/
here is my problem today: how to get more readers onto Pivot To AI? https://pivot-to-ai.com
you know what the site is and what it does
typically ~1000 unique viewers a day, pretty stable
regular readers become patrons, but first I have to lure them in repeatedly - that's my pipeline
ideas welcome, including bad and hackneyed ones