For those who mentor: how do you learn about someone’s understanding of power dynamics? And especially: are they likely to abuse power at the detriment of the less powerful?
Have any good “interview questions” that help? Especially to identify problems early?
I wanted to give Philippe the spotlight first but I was also laid off two weeks ago. I’m available for fuzzing related contract work and private trainings. I’ll be posting some public online training events soon. I’m also researching AI model fine tuning for security applications twitter.com/richinseattle/…
Obviously, a one time audit only goes so far. And it certainly doesn’t guarantee it’s even the same code that is running in production. But it’s a significant improvement towards transparency that nobody else is doing. Of course, China’s involvement increases the need for it.
You are probably seeing lots of cringe from the TikTok Congress hearing… because there’s so much.
But check this out. This is some of the best I have seen not just from Congress, but anyone outside of infosec.
If TikTok is willing to do these audits, why don’t other companies?
I want to see a public script that monitors for checkmark, renames to “no checkmark”, reverts it back (forcing reverify), waits till check is back, repeat.
It takes ~1 week for a human to reverify & reapply the check. Mass use of a script would saturate until they change things
Been doing some testing of Twitter Blue this month.
Anecdotal, but it feels clear that non-Blue accounts are heavily suppressed. With Blue, it feels a lot like pre-Musk twitter (way more visibility/engagement).
The checkmark is super obnoxious, but interestingly it doesn’t…Show more
Good thread on some of the nuance around the TikTok ban topic.
But I’m more interested in the post-ban effects. Most parents can’t even successfully ban their kids from using it. This will be fun.
Time to prep some “tiktok unbanned” tools for kids to install. 😈
Hey all - here's a quick timeline about how this TikTok spying stuff all went down:
In March, I broke the story that TikTok was working on Project Texas, a companywide effort to separate out US user data and limit China-based employees’ access to it.
https://buzzfeednews.com/article/emilybakerwhite/tiktok-project-texas-bytedance-user-data…
People have been asking me to sell this design for the last 6 years. There is a list of reasons I haven’t, and the above story is a big one. It’s not exactly hard to make, but I’d rather not help.
🧵7/n
This made me laugh. I’m assuming USB A’s notorious 3-or-more-attempts-required saved a different target:
“Milton Pérez at Teleamazonas' Quito offices might have set off the USB stick's explosives if he had plugged it into the computer properly,”
🧵6/n
This made me laugh. I’m assuming USB A’s notorious 3-or-more-attempts-required saved a different target:
“Milton Pérez at Teleamazonas' Quito offices might have set off the USB stick's explosives if he had plugged it into the computer properly,”
🧵6/n
This is the scene of the exploded drive. Laptop is still functional. No visible damage to anything. Very small field of debris.
More firecracker than “military explosive” in terms of damage.
🧵3/n
Here is the guy who plugged it in, Lenin Artieda, getting his hand swabbed for explosives. No visible damage.
Could it be worse? YES! If you have a press mail room, you should be scanning all inbound packages.
🧵4/n
This is the scene of the exploded drive. Laptop is still functional. No visible damage to anything. Very small field of debris.
More firecracker than “military explosive” in terms of damage.
🧵3/n
So this looks to be one of the unexploded drives. Which indicates a modified brand name thumb drive.
Note reads:
THE INFORMATION IS GOING TO UNMASK THE CORREISMO.
THINK IT'S USEFUL, WE CAN REACH AN AGREEMENT AND I'LL SEND YOU THE SECOND PART.
🧵2/n
holy FUCK.
Windows Snipping Tool is vulnerable to Acropalypse too.
An entirely unrelated codebase.
The same exploit script works with minor changes (the pixel format is RGBA not RGB)
Tested myself on Windows 11 twitter.com/ProgramMax/sta…
Who’s not going to interact with a message about an appointment they just made?
It becomes much easier to phish someone and/or get malware on their device once you can see a portion of their comms. Then you just piggyback an existing communication they are involved with.
2/ @ArtemisSeaford's #Predator spyware targeting was diabolical.
She got an "appointment confirmation" text after making a COVID vaccine appointment.
It contained her actual appointment details & appeared to come from the #Greek state vaccine agency.
Most would have clicked.
Another USB C design failure from AliExpress. $200 worth of ATMega32u4 boards I bought this month.
- Does not power up with a C to C cable (no matter rotation)
- Powers up with a C to A cable
Cause: failure to add any USB C signaling resistors. This will never stop happening…
I see confusion around how this bug works.
Summary: after cropping the image, the file size is smaller. Google wrote the new file over the top of the old one without shrinking the file. So the larger original file was left at the end.
Nobody noticed for 5+ years because… ???
Yep. Private channels, DMs, etc. Right-click, copy media link. That URL is something anyone can visit. And it keeps working even after you have “deleted” the file from discord.
Here is a picture I DM’d to
Huh, so every single image ever uploaded to Discord is a public image?
I just tried this, and yes if you copy the link of an image sent in a Discord DM, you can open that link anywhere and it shows the image. Even in browsers that have no active Discord login. twitter.com/_MG_/status/16…
At a minimum, anyone with a Google Pixel seems like years worth of shared pictures are now exposed to this. Big yikes.
Luckily, a lot of services recompress the images.
This Google bug could seriously hurt a lot of people. The default editing tool had a bug that lets you unredact & uncrop all images.
Discord is used in this example because they don’t compress images. A good time to remind you: ALL image attachments are public links. Even for…Show more
Introducing acropalypse: a serious privacy vulnerability in the Google Pixel's inbuilt screenshot editing tool, Markup, enabling partial recovery of the original, unedited image data of a cropped and/or redacted screenshot. Huge thanks to @David3141593 for his help throughout!
While I’m guessing hospital wasn’t using the specific service that Sophos was recommending here, it’s still insane to do this. It’s not hard to check your customer list before posting. It’s also not hard to simply… not do opportunistic ambulance chasing to begin with. 🤦♂️
tried saying their product would have stopped this attack on a hospital.
Then the hospital responded saying they were using Sophos. It not only didn’t save them, but got in the way. 😂😂😂🤡 great ambulance chasing
You can’t make this shit up.
Sophos sales: if the ransomware’d hospital had use Sophos it wouldn’t have happened.
Hospital CIO: well we *do* use Sophos.
Reliable feeding! Toy motors are still hanging on for now…
Now to figure out label application mechanism. I had planned on handling timing & sequencing 100% with cam rings, but this has taken way longer than expected. So I’ll use an arduino for now. Probably shorter legs too.
They need to teach how to do crime in school
Step 1: realize how easy it is to do once you know enough
Step 2: know how much it costs to not go to prison
#2 is much bigger than everyone assumes. Usually much higher than the crime itself pays, even if 95% opsec (most are worse)
Interestingly, one of those charged has previously presented himself to us as an independent security researcher. He provided information about the SIM swapping community. Then two years later, he allegedly committed some of these crimes https://vice.com/en/article/pkae7g/nobody-is-safe-in-wild-hacking-spree-hackers-accessed-federal-law-enforcement-database…
I am incapable of leaving well enough alone. A year later:
650 clips, printed at 57sec per clip was nice. But 1085 clips printed at 43sec per clip is nicer. (67% more clips, 25% faster)
Still plenty left to optimize here.
🧵7/n
asked me at what point it makes more sense to pay a shop to label my envelopes.
Answer: financially, 4 years ago. I’m just stubborn & DIY everything. But I have a long way to go before I hit Cliff Stoll building a below-house warehouse:
With chip prices 📈, the 📈 inflation hurt even more as the $ evaporated in a bank account while waiting for the next “chip just got stocked. But now!” window.
Is the wealthfront account the best choice? I dunno. But it did make some of the pain stop. Tell me if you have better
Everyone’s needs are different, etc.
For me, each batch of hardware is like buying a new car that I could never personally afford. It needs to stay liquid, especially with the volatile chip prices/availability or you miss the window.
Will probably delete this later because it feels way too much like shilling for banks, but wanted to share a tip a friend gave me last year.
This spreads your $ across a bunch of banks, which also means 8x more FDIC insurance. ($2mil)
4.05% APY (4.55% https://wealthfront.com/c/affiliates/invited/AFFD-OKN7-XDP4-XZ0O……Show more
Ehhh kinda?
I’m realizing that loading in from the bottom will be very unreliable if something like springs are used. I’d have to use a motor to keep consistent pressure.
So instead I’m gonna flip it upside down and try gravity feeding instead.