Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Shame Boy
Mar 2, 2010


yeah i checked the URL too and like, i could kind of understand (though not agree with, but understand) if it were a list of poo poo that changed all the time and you wanted to make sure you always had the latest list, but why the hell wouldn't you just set something like this up once, does he think the list is going to be constantly updated??

Adbot
ADBOT LOVES YOU

~Coxy
Dec 9, 2003

R.I.P. Inter-OS Sass - b.2000AD d.2003AD

it's speex!!!

Shame Boy
Mar 2, 2010

Dr_0ctag0n posted:

There was a really fun HackTheBox machine named "Player" where one of the exploits involved creating/uploading a malicious avi file that had ffmpeg HLS vulnerability where it would output specified file contents within the playback of the video in VLC.

i remember one ffmpeg vuln a while ago that was in one of the libraries that played videogame console chip music, which turned out was more or less just a full emulator of various game processors so you had to use like motorola 68000 assembly as part of the exploit or something. that's prolly my favorite one

BattleMaster
Aug 14, 2000

Subjunctive posted:

another approach to secure format parsing, from the Windows kernel. terrible name though

https://www.fstar-lang.org/papers/EverParse3D.pdf

farts-lang

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.

Shame Boy posted:

yeah i checked the URL too and like, i could kind of understand (though not agree with, but understand) if it were a list of poo poo that changed all the time and you wanted to make sure you always had the latest list, but why the hell wouldn't you just set something like this up once, does he think the list is going to be constantly updated??

well, start with making a terrible decision for arbitrary and likely poorly understood reasons and work from there

Subjunctive
Sep 12, 2006

✨sparkle and shine✨


that too

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

infernal machines posted:

well, start with making a terrible decision for arbitrary and likely poorly understood reasons and work from there

always do, buddy. always do

Beeftweeter
Jun 28, 2005

OFFICIAL #1 GNOME FAN

Shame Boy posted:

i remember one ffmpeg vuln a while ago that was in one of the libraries that played videogame console chip music, which turned out was more or less just a full emulator of various game processors so you had to use like motorola 68000 assembly as part of the exploit or something. that's prolly my favorite one

yeah libavcodec/format has a fuckton of dependencies and a lot of them are super old, it kinda sucks because it's so drat useful

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.

Subjunctive posted:

always do, buddy. always do

it's good to have a process

Ulf
Jul 15, 2001

FOUR COLORS
ONE LOVE
Nap Ghost
hello again yossec!

if you have an interest in elliptic curve cryptography, or just like watching dots and lines move on your screen, then you might enjoy a thing I made: https://curves.ulfheim.net

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock

Ulf posted:

hello again yossec!

if you have an interest in elliptic curve cryptography, or just like watching dots and lines move on your screen, then you might enjoy a thing I made: https://curves.ulfheim.net

Neat animations!

Eeyo
Aug 29, 2004

Ulf posted:

hello again yossec!

if you have an interest in elliptic curve cryptography, or just like watching dots and lines move on your screen, then you might enjoy a thing I made: https://curves.ulfheim.net

i know absolutely nothing about cryptography.

i ran the alice/bob key exchange example and it displayed a big infinity symbol at some point and stopped. does that mean that you can just fail at some point? or do you just try again with a new starting number.

DELETE CASCADE
Oct 25, 2017

i haven't washed my penis since i jerked it to a phtotograph of george w. bush in 2003

nudgenudgetilt posted:

my experience is the reality is that the law dictates a drug free workplace, but the only parties interested in enforcing the law are those who are in the business of constantly having to ask for new work (contractors). aside from defense or cleared positions, the agencies themselves don't really seem to give a gently caress. i imagine the majority of compliance from contractors comes from the fact other contractors could use a lack of compliance as leverage.

probably an overly cynical view, but *shrug*

they drug test for security clearances, and it's hard to get a federal toucher job without one of those

Ulf
Jul 15, 2001

FOUR COLORS
ONE LOVE
Nap Ghost

Eeyo posted:

i know absolutely nothing about cryptography.

i ran the alice/bob key exchange example and it displayed a big infinity symbol at some point and stopped. does that mean that you can just fail at some point? or do you just try again with a new starting number.
dang, I thought I guarded again that by fudging^W adjusting the numbers if you put in any multiple of the base point’s order.

I tested it a bunch but you know what they say about code making contact with the enemy.

so what happened is that as you multiply points on the curve you’ll eventually land on the point with the same x-value as the base point, but a different y-value. if you draw a line through that point from P it’s vertical and that line can never intersect another point. we call that result the “infinity” point, and in EC math (infinity + P) = P. the number of point additions it takes to reach this is called the “order” of the base point, and the cycle resets and all the points repeat in the same way after that.

so in my toy curve, which I picked to be small and visible, infinity is the result 1/73 of the time. in a real curve like Curve25519, infinity is the result one out of 2^252 times which is trillions of trillions of trillions … repeat the word “trillions” three more times. the curve scheme might also have mitigation against hitting hit by masking certain bits, I’d have to check the paper again. they might also reserve a special value like all-zeros to represent infinity.

in practice what would probably happen is your key exchange fails, your endpoints get confused, and they attempt a new connection. the user might be annoyed if they’re not distracted by the whole heat death of the universe thing.

Ulf
Jul 15, 2001

FOUR COLORS
ONE LOVE
Nap Ghost
that probably breaks the page because of a hanging await though, I’ll fix it when I get home. thanks for letting me know!

Beeftweeter
Jun 28, 2005

OFFICIAL #1 GNOME FAN

Ulf posted:

hello again yossec!

if you have an interest in elliptic curve cryptography, or just like watching dots and lines move on your screen, then you might enjoy a thing I made: https://curves.ulfheim.net

wooo, lookit those bits fly :haw:

outhole surfer
Mar 18, 2003

DELETE CASCADE posted:

they drug test for security clearances, and it's hard to get a federal toucher job without one of those

I feel like I covered that:

nudgenudgetilt posted:

aside from defense or cleared positions

the federal government has a *lot* of positions that are neither. i know plenty of potheads working in unclassified dept of energy, noaa, and nsf roles. personal experience with these three organizations makes me think it isn't a stretch that other chunks of the federal government are the same.

Eeyo
Aug 29, 2004

Ulf posted:

that probably breaks the page because of a hanging await though, I’ll fix it when I get home. thanks for letting me know!

it didn't seem to break the page very much. i had it do another random number and it worked fine after that. fwiw apparently 201 was one of the "magic" numbers (for lack of a better word) if you need to try that one.

it does look like it keeps you from hitting some of the magic numbers, if i put in 73 it will do 74 instead. but it will happily try to do 201 and fail.

edit: again i don't know anything about this, but in this case it wasn't failing when adding to the base point, it's failing when doing an intermediate summation, so it's adding 64P + 9P (9+64+128 getting you to 201).

Eeyo fucked around with this message at 18:01 on Jun 16, 2022

Ulf
Jul 15, 2001

FOUR COLORS
ONE LOVE
Nap Ghost

Eeyo posted:

it's failing when doing an intermediate summation, so it's adding 64P + 9P (9+64+128 getting you to 201).

aha that makes perfect sense. maybe I’ll fix it so the animation continues, or maybe just add the 2^n points in a different order so I don’t have to explain the weirdness. thanks again!

Phone
Jul 30, 2005

親子丼をほしい。

Ulf posted:

dang, I thought I guarded again that by fudging^W adjusting the numbers if you put in any multiple of the base point’s order.

I tested it a bunch but you know what they say about code making contact with the enemy.

so what happened is that as you multiply points on the curve you’ll eventually land on the point with the same x-value as the base point, but a different y-value. if you draw a line through that point from P it’s vertical and that line can never intersect another point. we call that result the “infinity” point, and in EC math (infinity + P) = P. the number of point additions it takes to reach this is called the “order” of the base point, and the cycle resets and all the points repeat in the same way after that.

so in my toy curve, which I picked to be small and visible, infinity is the result 1/73 of the time. in a real curve like Curve25519, infinity is the result one out of 2^252 times which is trillions of trillions of trillions … repeat the word “trillions” three more times. the curve scheme might also have mitigation against hitting hit by masking certain bits, I’d have to check the paper again. they might also reserve a special value like all-zeros to represent infinity.

in practice what would probably happen is your key exchange fails, your endpoints get confused, and they attempt a new connection. the user might be annoyed if they’re not distracted by the whole heat death of the universe thing.

i warned you about rollin' your own bro!!!!

i told you dog!

(this is incredibly neat, thanks for making these pages)

Chris Knight
Jun 5, 2002

me @ ur posts


Fun Shoe

FlapYoJacks posted:

I can’t get a government job because I smoke a huge amount of weed. Also the pay is poo poo compared to the private sector.
weed is legal :canada:

Perplx
Jun 26, 2004


Best viewed on Orgasma Plasma
Lipstick Apathy
i wonder if canada has recruited hackers rejected by the nsa for weed

if you hack for us we'll pay you in weed

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

I’m told that there was a major recruiting push along those lines after legalization, but I don’t know how successful it was.

Kuvo
Oct 27, 2008

Blame it on the misfortune of your bark!
Fun Shoe

Ulf posted:

hello again yossec!

if you have an interest in elliptic curve cryptography, or just like watching dots and lines move on your screen, then you might enjoy a thing I made: https://curves.ulfheim.net

this is cool

Albinator
Mar 31, 2010

nudgenudgetilt posted:

I feel like I covered that:

the federal government has a *lot* of positions that are neither. i know plenty of potheads working in unclassified dept of energy, noaa, and nsf roles. personal experience with these three organizations makes me think it isn't a stretch that other chunks of the federal government are the same.

Sure, but if you're filling out the form for public trust or security clearance you have to answer about drug use, and lying on that is a felony. That would give most people pause whether or not a test is involved. Lots of jobs may not require the form, but lots do, even if there's no sensitive stuff at all involved.

outhole surfer
Mar 18, 2003

Albinator posted:

Sure, but if you're filling out the form for public trust or security clearance you have to answer about drug use, and lying on that is a felony. That would give most people pause whether or not a test is involved. Lots of jobs may not require the form, but lots do, even if there's no sensitive stuff at all involved.

public trust forms are for jobs that require clearance.

i don't understand what y'all aren't getting about the concept that there are plenty of roles that require no clearance. the only thing you sign related to drug use is acknowledging receipt of the agency's policy surrounding a drug free workplace implementation

you're certainly open to being fired for failure to comply with the organization's policy, but there are no attestations that you don't do drugs, only an attestation that you received the policy that forbids drug use.

Eeyo
Aug 29, 2004

there's some middle-ground as well. the two doe workplaces i've had contact with (federal contractors, not actual doe employees) required drug tests at the start and random drug screenings, even if you don't touch classified work.

drug use is occasionally just forgiven for clearance work too. i've heard of at least one person who smoked weed in college and said "yeah i used to smoke weed" and they gave him one anyway. of course continued use is a no-no, so you've got to use the hard drugs that leave your system within a few days so you can't get popped.

Midjack
Dec 24, 2007



Eeyo posted:

there's some middle-ground as well. the two doe workplaces i've had contact with (federal contractors, not actual doe employees) required drug tests at the start and random drug screenings, even if you don't touch classified work.

drug use is occasionally just forgiven for clearance work too. i've heard of at least one person who smoked weed in college and said "yeah i used to smoke weed" and they gave him one anyway. of course continued use is a no-no, so you've got to use the hard drugs that leave your system within a few days so you can't get popped.

this is the current state of weed and highsec fedgov as i understand it, they are currently somewhat more willing to overlook it if you stop when you apply and they will probably check up on you at some point after you start working. i think fbi and other federal law enforcement are still "lolnope" with any use at all.

additionally "public trust" is a level below fedgov security clearance but above low level workers. become senior enough in any agency and you will likely get the background check and interview. and of course contractors may have their own policies that interact with insurance and other business things and will have a spectrum of attitudes toward weed.

brugroffil
Nov 30, 2015


My dad's worked for the IRS for over a decade. I don't recall if he had a drug test as part of his extensive background checks before being hired, but I know he's definitely never had one since and it'd have to be a strongly documented for-cause screening

Maybe contractors are subjected to it but regular non clearance federal employees, even in positions of trust, aren't.

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug
We were subject to random drug tests in the DOD, and I know some DOD contractors have to get tested once in a blue moon and tested at start of employment.

El Mero Mero
Oct 13, 2001

As a government employee who's had a variety of background checks, including ones where they call your friends and interview them too.

I can tell you that most of the feds don't care. I've always disclosed that I smoke when asked.

If you happen into a role where they do care then you've gotten lucky because it's an early screen that you can use to know if your employer is a shithead or not.

outhole surfer
Mar 18, 2003

El Mero Mero posted:

including ones where they call your friends and interview them too.

i had a friend go through one of these while i was working at a doe national lab (he was dod). despite being non-classified, there was still a dance you had to do to register visitors. opm calls me to schedule an interview and tells me i don't need to worry about it when i start giving them access instructions. sure enough, date/time for the interview comes up and they just roll into my office, several badge swipes and a security gate deep in the lab.

still creeps me out a little

hobbesmaster
Jan 28, 2008

the specific OPM guys probably were probably assigned to the lab if it was a bigger one

still, yeah that’s be weird

Shame Boy
Mar 2, 2010

the only time i've ever been into a secure area was when i took a tour of the maintenance shop for the trident missiles out at cape canaveral but it was a scheduled thing so they put all the secret cool stuff away and the only security stuff i had to do was leave my phone with a bored-looking guy sitting at a desk by an imposing-looking door with a radioactivity symbol on it

spankmeister
Jun 15, 2008






they had to put all the 8" floppies away? sad

Shame Boy
Mar 2, 2010

spankmeister posted:

they had to put all the 8" floppies away? sad

it was a maintenance hangar for the missile not a launcher lol

though i did get to see a copy of windows XP for submarines in person, running on a computer hooked up to the third stage presumably for diagnostics

Shame Boy
Mar 2, 2010

i was a snarky rear end in a top hat teenager so i asked the dude giving the tour what the payload was, in front of a bunch of small children cuz it was take your kid to work day (i was there to give a presentation originally and they were like 'wanna come visit the trident basin?' and i'm like sure)

he awkwardly laughed and went "oh that's the part we don't like to talk about... the trident II is a nuclear deterrent missile, and that's all i can say about it"

The Lone Badger
Sep 24, 2007

Are there design differences between a first-strike weapon and a second strike/deterrent weapon, or is it purely in how they're housed and deployed?

Shame Boy
Mar 2, 2010

The Lone Badger posted:

Are there design differences between a first-strike weapon and a second strike/deterrent weapon, or is it purely in how they're housed and deployed?

probably. second-strike weapons need to be as survivable as possible, first strike needs to be as sneaky as possible. i kinda doubt there'd ever be any kind of public release of "here's why our missile is real good at first strikes" though since that would be diplomatic suicide

Adbot
ADBOT LOVES YOU

pseudorandom name
May 6, 2007

more importantly, retaliatory weapons need to cause as much genocide as possible individually under the assumption that most of the arsenal was destroyed in the first strike

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply