Posts
2469
Following
654
Followers
1479
"I'm interested in all kinds of astronomy."
repeated

The SEC has ruled that meme coins aren’t securities since they “typically have limited or no use or functionality” and are “more akin to collectibles.”

These means getting rug pulled on a memecoin isn’t securities fraud. It’s more like overpaying for Beanie Babies.

https://www.cnbc.com/2025/02/27/sec-says-most-meme-coins-are-not-securities.html

1
4
0
repeated

Tony “Abolish ICE” Arcieri🌹🦀

Gene Hackman’s Family Reveals What They Believe Caused His Death: Carbon Monoxide

Yet another reason to get rid of all the gas appliances in your home if you can: they’re dangerous!

https://www.thedailybeast.com/gene-hackmans-family-daughter-elizabeth-hackman-reveals-what-they-believe-caused-his-death/

2
4
0
Edited 5 months ago
I'm tired enough to read "CVE Nürnberg Authority" and think that vulnerability management took a quite radical turn
0
0
2
SEC Consult SA-20250226-0 :: Multiple vulnerabilities in Siemens A8000 CP-8050 & CP-8031 PLC

https://seclists.org/fulldisclosure/2025/Feb/19

- Firmware Downgrade (CVE-2024-39601)
- Firmware Update Decryption via Secure Element Oracle (CVE-2024-53832)
0
0
1
repeated

If a government can issue a secret order to push a 'special' version of a mobile app just to a specific person (or set of people), how can this be mitigated?

  • How can app "rarity" be detected locally? (Antivirus and its descendants have a concept of a "well-known benign executable" vs one that has only been rarely seen.

  • Can a local app, or an OS feature, be used to compare local apps with a list of expected versions?

  • Can this be done independently of the OS (since the order could also subvert the rarity check)? (Even an independent app can be subverted if the only app store is the official one maintained by the same vendor.)

  • To detect unusual app versions, reproducible builds are necessary but not sufficient, unless the project is also FOSS -- because even if everyone gets the same APK, the app might receive different instructions from its server depending on unique metadata.

4
2
0
[RSS] Taking the relaying capabilities of multicast poisoning to the next level: tricking Windows SMB clients into falling back to WebDav

https://www.synacktiv.com/en/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking
0
0
0
Hyperlight is a library for creating micro virtual machines — or sandboxes — specifically optimized for securely running untrusted code with minimal impact.

https://github.com/hyperlight-dev/hyperlight

It supports both Windows and Linux, utilizing Windows Hypervisor Platform on Windows, and either Microsoft Hypervisor (mshv) or KVM on Linux.

#hypervisor #virtualization
1
1
4
repeated

HKEY_CURRENT_USER. You will never find a more wretched hive of scum and villainy.”

0
2
0
repeated

Anybody knows how to demangle a string, not a symbol, in using Python?

1
1
0
repeated

been reminded of this several times this week and not in a nice way

1
5
0
repeated

HAHAHAHA I'M DECOMPILING SOFTWARE IN BLATANT VIOLATION OF THE EULA AND THERE'S NOTHING YOU CAN DO TO STOP ME.

2
11
0
repeated

Firefox now has Terms of Use! This'll go over like a lead balloon.

You give Mozilla all rights necessary to operate Firefox, including processing data as we describe in the Firefox Privacy Notice, as well as acting on your behalf to help you navigate the internet. When you upload or input information through Firefox, you hereby grant us a nonexclusive, royalty-free, worldwide license to use that information to help you navigate, experience, and interact with online content as you indicate with your use of Firefox.

https://www.mozilla.org/en-US/about/legal/terms/firefox/

39
25
0
RIP Michelle Trachtenberg, thanks for all the laughs :(
0
0
2
repeated

524 new Linux kernel CVEs today, 7 newly-rejected

1
1
0
repeated

I got another for you all. This time, lets try something new.
Its quite hard to make a challenge that is both accessible and challenging at the same time. So now, I will post multiple pictures. The first in this post is the 'hard' level. If you are not an expert, look at the 2nd picture that will be behind a CW. There is also a 3rd picture for easy-mode.

As always, try to write down you observations and deductions behind a CW to not spoil it for others.

3
2
0
repeated

Lorenzo Franceschi-Bicchierai

NEW: Hacked crypto exchange Bybit is offering $140 million in bounties to anyone who can help locate and freeze the stolen ethereum.

Bybit also disclosed preliminary results of investigations, which reveal hackers breached a developer’s device at a wallet platform Safe Wallet.

http://techcrunch.com/2025/02/26/hacked-crypto-exchange-bybit-offers-140-million-bounty-to-trace-stolen-funds/

0
5
0
I spent the afternoon reading OSR.com and now I hear it in old Obi-Wan Kenobi's voice in my head
0
0
0
Show older