|
I'm the goo girl
|
# ? Aug 10, 2015 17:44 |
|
|
# ? Jun 1, 2024 05:43 |
|
Carbon dioxide posted:This might be useful to someone. https://github.com/shutterstock/List-of-Dirty-Naughty-Obscene-and-Otherwise-Bad-Words/blob/master/en e: 'women rapping'
|
# ? Aug 10, 2015 17:45 |
|
Aleksei Vasiliev posted:i don't understand how they could possibly have a big enough problem to need to block some of these, like 'dendrophilia' i think that's code for rape
|
# ? Aug 10, 2015 17:48 |
|
spankmeister posted:it's funny because I expected these machines to run Windows but this runs some flavor of red hat and the most old-skool looking version of X11. my old cable company had this one channel you could only tune to with a third-party receiver that showed nothing but an old Red Hat login screen 24/7. i did some research and apparently it's like their flavor of the emergency alert system or something like that.
|
# ? Aug 10, 2015 17:57 |
|
Luigi Thirty posted:I'm the goo girl text me
|
# ? Aug 10, 2015 18:03 |
|
Parallel Paraplegic posted:my old cable company had this one channel you could only tune to with a third-party receiver that showed nothing but an old Red Hat login screen 24/7. i did some research and apparently it's like their flavor of the emergency alert system or something like that. couple years ago I was in a motel and one of the channels was a fedora 8 text console login. (i suppose it was still fedora core back then)
|
# ? Aug 10, 2015 18:08 |
|
https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf HTC One Max stores saved fingerprints in the /data/ folder as a .bmp with full read/write permissions lol
|
# ? Aug 10, 2015 18:10 |
|
http://blogs.bis.gov.uk/exportcontrol/files/2015/08/Intrusion-Software-Tools-and-Export-Control1.pdf uk wassenaar rules exploit that just pops calc: "unlikely to be controlled" explaining that exploit to a vendor: need an export license (according to @i0n1c)
|
# ? Aug 10, 2015 18:11 |
|
froward posted:im gay & hungry for cum please dont post my bank challenge answers
|
# ? Aug 10, 2015 18:15 |
|
|
# ? Aug 10, 2015 18:22 |
|
|
# ? Aug 10, 2015 18:23 |
|
Aleksei Vasiliev posted:http://blogs.bis.gov.uk/exportcontrol/files/2015/08/Intrusion-Software-Tools-and-Export-Control1.pdf how does wassenaar work wrt poo poo like exhibition/competitive hackers? and does hosting the software at home and just accessing/running it remotely sidestep it at all?
|
# ? Aug 10, 2015 18:23 |
|
Parallel Paraplegic posted:my old cable company had this one channel you could only tune to with a third-party receiver that showed nothing but an old Red Hat login screen 24/7. i did some research and apparently it's like their flavor of the emergency alert system or something like that. the real estate listings channel here in the 90s was an Amiga guru meditation screen half the time I stayed in a hotel in TN once and the public access channel was a Commodore Plus/4 boot screen the other government channel was a cable company headend "unable to acquire signal" error screen that rebooted every 180 seconds
|
# ? Aug 10, 2015 18:26 |
|
Aleksei Vasiliev posted:http://blogs.bis.gov.uk/exportcontrol/files/2015/08/Intrusion-Software-Tools-and-Export-Control1.pdf jfc what a boondoggle. the whole thing is just a means of legitimising intrusive DRM and "Commercial Malware Toolkit for Law Enforcement" by making them "export controlled", right?
|
# ? Aug 10, 2015 18:28 |
|
DOG AT THE DOOR posted:https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf
|
# ? Aug 10, 2015 18:29 |
|
lmao
|
# ? Aug 10, 2015 18:33 |
|
DOG AT THE DOOR posted:https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf anroid lol
|
# ? Aug 10, 2015 18:39 |
|
i got a lot of catching up to do, just got back from a week vacation. Anyone got any highlights other than the elevator hacking video?
|
# ? Aug 10, 2015 19:18 |
|
All of you guys like to have sex with animals
|
# ? Aug 10, 2015 19:36 |
|
Squeezy Farm posted:All of you guys like to have sex with animals you and me baby ain't nothin but mammals
|
# ? Aug 10, 2015 19:39 |
|
cheese-cube posted:what use-case is there for the variable-length output modes (SHAKE128/256)? you can use the same core as both a hash and a CSPRNG / keystream, I think that's neat
|
# ? Aug 10, 2015 19:46 |
|
Captain Foo posted:you and me baby ain't nothin but mammals OHMIGOD FUCKYOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOUUUUUUUUUUUUUU
|
# ? Aug 10, 2015 19:46 |
|
graph posted:anroid lol Biometrics lol
|
# ? Aug 10, 2015 20:45 |
|
biometri.cx
|
# ? Aug 10, 2015 20:45 |
|
cheese-cube posted:what use-case is there for the variable-length output modes (SHAKE128/256)? hashes are often used for key derivation: take a bunch of data in whatever length and format is convenient, and make one or more secure keys of the required length this has come up in the cfrg's work on elliptic curve signatures (the current ECDSA standard is kind of crap, see http://blog.cr.yp.to/20140323-ecdsa.html for an explanation of why it was pretty dated even in the 90s when it was made (by the nsa)) depending on the curve strength they'll need to generate numbers with an upper bound of anywhere between ~2256 to 2521, so even sha-512 isn't big enough, and they'd like to use the same method for all the curves. SHAKE is great for that use case Wheany posted:it makes the implementation more complex and error prone. eh. keccak is a pretty neat design called a sponge. there's one simple function in the middle that just needs to act as a 1600 bit fixed random permutation, no keys or nothing that's where most of the cryptoanalysis happens, and also any optimization and hardware acceleration then you can build other constructs on top - a hash, a mac, a kdf, etc. and prove that they're secure assuming properties of the base function the main problem with sha3 is that software implementations are pretty slow compares to the alternatives, even sha2, so it's not very attractive for developers but if sha3 hardware acceleration became common i bet you'd see the core function reused for other things
|
# ? Aug 10, 2015 20:55 |
|
|
# ? Aug 10, 2015 21:01 |
Luigi Thirty posted:I'm the goo girl
|
|
# ? Aug 10, 2015 21:19 |
|
eyyy girl
|
# ? Aug 10, 2015 21:32 |
|
thank god i work at the slime girl anime factory!
|
# ? Aug 10, 2015 21:34 |
|
keep up the good work says my supervisor as i read the yospos security gently caress up thread
|
# ? Aug 10, 2015 21:35 |
|
text me (an application)
|
# ? Aug 10, 2015 21:35 |
|
wtf is a "blumpkin," some silly brit thing like tallywacker or fanny?
|
# ? Aug 10, 2015 21:46 |
|
DOG AT THE DOOR posted:https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf dammit i came here to post this graph posted:anroid lol
|
# ? Aug 10, 2015 21:49 |
|
i would also like to point out that the naughty words list includes "yaoi" but not "yuri" and this bothers me
|
# ? Aug 10, 2015 21:51 |
|
it was chill to meet you all. i have some photos to share later including a very special one in other news http://www.theregister.co.uk/2015/08/07/sophos_anti_muslim_name_filter
|
# ? Aug 10, 2015 21:59 |
|
Parallel Paraplegic posted:i would also like to point out that the naughty words list includes "yaoi" but not "yuri" and this bothers me As it loving should be. They're providing a public service by signalling that if you're looking for it to beat off then you're barking up the wrong tree. Yaoi is for beating off. Yuri is for weeping to yourself in your apartment as you read it while drinking the cheapest chu-hai. ErIog fucked around with this message at 22:04 on Aug 10, 2015 |
# ? Aug 10, 2015 22:01 |
|
yuri is also a name, so i imagine they dont block it because of that?
|
# ? Aug 10, 2015 22:02 |
OSI bean dip posted:it was chill to meet you all. i have some photos to share later including a very special one TRWTF is Sophos also antivirus for mac
|
|
# ? Aug 10, 2015 22:03 |
I set up 900 users each with unique permissions and a unique password and the account manager wants me to set all of their passwords to one thing so she doesn't have to send individual emails Lol, nope
|
|
# ? Aug 10, 2015 22:18 |
|
|
# ? Jun 1, 2024 05:43 |
|
Did you offer to help her automate the e-mail process?
|
# ? Aug 10, 2015 22:22 |