Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Jabor
Jul 16, 2010

#1 Loser at SpaceChem
pos software is aptly named

Adbot
ADBOT LOVES YOU

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
changing the password regularly (e.g. daily) is also a good way to make people actually look it up in the appropriate system every time, instead of writing it on a post-it or something

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
more like "root shell"

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Volmarias posted:

"Your parents now have to figure out wtf to do with you during this time, when they would normally be at work, they will punish you far more effectively than we will"

yeah, but that stops working once you're talking about kids that are old enough for the parents to just say "whatever just stay home and play videogames all day"

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Winkle-Daddy posted:

doesn't sound terrible to fix:


Sounds like this bit of logic just needs to be thought through again...but as they didn't release the specifics yet, it's hard to say ¯\_(ツ)_/¯

e: lmaorf

my read of that is that the code that decides what to do when secure boot can't verify the firmware can itself be modified, so all you need to do is modify it to just boot anyway.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
there's probably some amd designer that's been spending years trying to do fast speculative execution that doesn't leak a bunch of state between virtual cores, and being frustrated that they just can't quite get it as fast as intel.

i guess they'd be feeling a little vindicated now.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
there's a massive difference between knowing a language via hearing it a lot while the language centers of the brain are forming, vs. learning a language through the application of hard work and effort once those structures are already in place.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
I'm the binaries checked into source control, which may or may not be compiled from the accompanying code.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
i mean, notepad does do text layout (break into lines, tab spacing, etc.), and unicode

so i wouldn't be too surprised if it turned out some obscure combination of those things blew a stack buffer

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
lolnovo

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
"Buying a new hard drive (which you were going to do anyway)" is "going all cloak and dagger"?

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
it's a good thing we have an elaborate and expensive certification process to ensure that cryptographic solutions work correctly and aren't broken.

it would really suck if it was just bureaucratic horseshit that made it very expensive to create compliant implementations while not actually providing any meaningful benefit

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
fails in providing security

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
wanna bet that it gets changed instantly the moment a politician or rich person ends up getting scammed that way?

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
dang, you must have made a typo because the auto-* feature didn't pick it up

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

akadajet posted:

did star citizen come out?

It depends on what the discussion is.

If you're talking about how they're incompetent and take forever to implement the things they've promised then actually the game is out and you can play it right now!

If you're talking about how the thing they've released is buggy as poo poo and laughably incomplete compared to what they've promised then actually it's just a test build, the game isn't released yet and it will be awesome when it is.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
it's a start

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
if you really thought it was worthy, you'd emptyquote it and eat the probe

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
i'm not really getting how that's more of a problem for someone looking to fork the kernel than it is for the current kernel developers themselves

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

CRIP EATIN BREAD posted:

if they really mean backdoor in the encryption and not the app, then the minute the government says "you HAVE to use encryption scheme/cipher X", everybody and their brother is going to be going over it with a fine-toothed comb to figure out what the exploit is.

it'll be something like dual-ec-drbg where it's only exploitable if you were the one that generated the parameters and know how they're related

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
of course i have a girlfriend, no it's a long-distance thing you can't meet her

yes the only pictures she sends me are publically available photos of a porn star

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
my understanding is you can get a low-limit credit card if you have income but no credit history, and then by paying that off you establish yourself as "someone who knows how to transfer money from their bank account in order to pay their debts"

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Kazinsal posted:

if it were 1972 I'd want to go into compsci research but every actual game-changing research paper has been written

this is a pretty self-centered way of saying "i can't think of anything that hasn't been done already"

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
whoever wrote that complaint really likes italicising the phrase three months

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
the delete link is actually perfectly idempotent, in that opening it multiple times will still only delete the post once

what you want is for opening it zero times to have the same effect as opening it one or more times

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
you need physical access to the unlocked device, lol

here's another security flaw for ya: a hacker can browse through your contacts and copy the information with a pen and paper

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
if apple is storing plaintext passwords somewhere for this to leak then yeah that's a fuckup, but i don't see that mentioned in the article?

the entire passwords line seems to be "the hacker could set up malware that steals your password if you type it in later"

and again, need physical access and for the device to already be unlocked.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
ctfmon?

run strings on it and see if there's a flag{} somewhere

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
Bug is still locked down, so it's hard to see the details. Are they literally storing plaintext passwords and the master password only controls whether the ui lets you see them?

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
it'd be great if there was a way for a mitm proxy to say "hey i'm mitming your traffic, here's my certificate, here's what the website presented" and then the browser could validate the original cert appropriately and even still do meaningful cert pinning.

but apparently the sort of people that want to run an mitm proxy for enterprise monitoring or whatever also throw a massive fit if you dare tell users that their employer is monitoring their connection, so that sort of thing is basically a non-starter.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
you can run an mitm proxy already, if you can install your own root ca on your user's computers. people literally do this, today, for various reasons.

yes, there would be interest in letting people be more secure while their employer is doing that.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

mystes posted:

Are the browser developers and the people designing TLS interested in providing a way for the browser to independently verify the integrity of the page while simultaneously allowing the connection to be intercepted by a proxy (using a CA cert)?

When you say "there would be interest" you are saying that the browser developers and the people designing TLS are interested in changing the protocols to allow that?

Since the browser developers and the people designing TLS can change the protocols to allow that whenever they want, have they done that and the people making middleware appliances that intecept connections have just refused to implement this?

the people running mitm proxies were literally throwing their toys out of the pram after android started showing a notification when you had an enterprise ca cert installed on your device

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
Love to have my kernel code read values directly from userspace, and then read them again assuming they haven't changed.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
it'd still be real problematic even if they were only uploading the library hashes, hth

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

CommieGIR posted:

Because it can easily be MITM if you are on a public connection, it increases your attack surface, and its just not good in practice. If you are also not setting up Fail2Ban or some sort of MFA alongside it, someone someday is going to get in.

It sure sounds like that's what you're implying? What else does this mean?

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

CommieGIR posted:

Shared key and Pub key are different words for the same things.

This is emphatically not true.

Where are you getting your security ideas from anyway? Well-meaning-but-totally-naive blog posts?

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
All security is about usability. If your goal is something that is secure but unusable you should just turn your computer off and be done with it.

Port knocking is dumb as hell because sending a second password in cleartext doesn't add any security at all while majorly impacting usability. It's a bad tradeoff no matter how you look at it.

Using a nonstandard port could be fine, since it's not a significant penalty to usability, but the main upsides aren't actually security related and are more about just not having your network clogged with lovely scanner traffic.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

CommieGIR posted:

Port knocking is not a password. And it opens the ssh port, which is closed until you execute the knocks.

The sequence of ports is de facto a password.

Sending your password in cleartext doesn't magically become more secure just because you put it in the port number field instead of in the payload.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
So you're admitting that your scheme adds no security at all, merely impairs usability by making it so that you, the legitimate user, need to jump through hoops before you can connect?

Adbot
ADBOT LOVES YOU

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
Remember that my position here was "port knock schemes are dumb as hell, because they cripple usability while not adding any security" - thanks for helping prove that to everyone else.

My server requires you to recite ten Hail Mary's and three Lord's Prayer's before connecting, and yes it's inconvenient and also trivial for anyone to bypass that requirement, but hey layered security and defense in depth, right?

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply