Opens profile photo
Follow
Click to Follow tqbf
Thomas H. Ptacek
@tqbf
Full of passionate intensity. @tqbf@infosec.exchange
✶ ✶ ✶ ✶sockpuppet.org/meJoined October 2007

Thomas H. Ptacek’s posts

The all-new Mac Pro, in its maxed-out configuration, will run as many as 12 concurrent Slack sessions. This workflow has never been possible before.
24
4,116
Welp. It’s the crypto bug of the year. Mark it down for April. Java 15-18 ECDSA doesn’t sanity check that the random x coordinate and signature proof are nonzero; a (0,0) signature validates any message. Breaks JWT, SAML, &c.
36
2,384
The implications of this for bash scripting are terrifying.
Quote
TIL you can run SQL queries directly against CSV files as a one-liner using the default sqlite3 command line utility til.simonwillison.net/sqlite/one-lin
sqlite3 :memory: -cmd '.mode csv' -cmd '.import taxi.csv taxi' -cmd '.mode column' \
    'SELECT passenger_count, COUNT(*), AVG(total_amount) FROM taxi GROUP BY passenger_count'

Output is an ASCII-art table of results
24
870
The cheapest and (probably) most popular TLS Certificate Authority is also the best and most trustworthy. Not the outcome I’d have expected 10 years ago. Congratulations, LetsEncrypt.
9
737
The boy just asked if he should learn C++. It’s long past due for THAT conversation, and bad parenting that I waited for him to ask. I’m glad we caught him before he started experimenting on his own.
27
720
Talk all you want about Bolton or Pompeo or Mueller or Guccifer but the end result is the same: The 2018 midterms are probably the most important election in our lifetimes.
16
643
Reminder that it’s 2017 and there’s still no reliable built-in way to encrypt a file to send to a peer on any mainstream OS.
71
622
If you’re telling people to stop using WhatsApp because it’s insecure, you’re a crypto antivaxxer. Please stop. Call people out on this.
23
576
Look, I am just not having this. Vulnerabilities you discover internally — rather than in a security incident where they were discovered, or reported unbidden by a third party — ARE NOT BREACHES. Words mean things.
10
583
DOWNVOTES IMPRISONING ME ALL THAT I SEE ABSOLUTE HORROR I CANNOT LIVE I CANNOT DIE TRAPPED IN THIS THREAD COMMENTS MY HOLDING CELL
13
550
People who never, ever report vulnerabilities have the most interesting opinions about how people should report vulnerabilities.
11
525
Matrix is not the first group chat system to have this basic flaw, which is apparently non-obvious: if you can’t securely control group membership, the cryptography doesn’t much matter.
Image
5
551
Your periodic reminder that CS stands ALMOST ALONE among STEM fields for gender disparity. Mathematics, astronomy, biochem: ALL FAR BETTER.
19
454
Mudge is the new head of security at Twitter, which got me talking about cDc, hacking groups, cliques, and the distinctions between them. I mentioned 8lgm and TESO as examples of hacking groups best understood as hacking groups, unlike cDc. Someone said: “never heard of them”.
14
488
Reminder to techs: work is political whether you like it or not. Apolitical nerds simply accept the default settings of their employers.
6
433
If I have to pick just one, the dumbest thing Hacker News believes about security is that phishing is a simplistic attack that only unsophisticated users fall for.
17
399
Use Signal for messages. Use Tarsnap for backups. Use Magic Wormhole for file transfers. Use age for file encryption (but make sure file encryption is actually what you need).
Quote
Replying to @tqbf
The real question is what to use instead of GPG (maybe something based on sodium?)
11
424
If you’re a Congressional campaign within 5 hours driving distance of Chicagoland (lookin’ at you, Londrigan and Dady) in any direction: Erin and I will give your staff hardware security tokens and train them how to secure their email with it. 2018. Don’t screw around.
9
374
I’ve written like 1500 lines of bash in the last two weeks and my entire experience of bash is just Googling how to do anything and never retaining anything. I wonder if this is what Java felt like in the 2000s.
27
349
Everyone please take a moment to consider what a big deal it would be if this had been Google accounts rather than Facebook accounts.
Image
11
324
Honestly? At this point? I don’t think Apple can do a public event that mentions the Macbook without STARTING WITH AN APOLOGY FOR THIS FUCKING KEYBOARD.
27
329
This paper is basically Github Copilot in reverse: researchers scraped open source code to build an NN model that can look at decompiled code and somewhat reliably recover the original types and variable names(!). Works with Hex-Rays now, but could be made to work with Ghidra.
Quote
This paper is awesome (h/t @tqbf): usenix.org/system/files/s Turns out that machine learning can reconstruct reasonable variable names from decompiled source! I'd love to see this integrated with Ghidra.
4
364
Here Assange pretends that he didn’t help sign the death warrants for his two most prominent supporters.
Quote
President Obama has a political moment to pardon Manning & Snowden. If not, he hands a Trump presidency the freedom to take his prize.
5
300
I don’t know how this isn’t the biggest story on the Internet right now. The key ceremony for the WHOLE INTERNET has been POSTPONED. THIS IS NOT NORMAL.
Quote
The DNSSEC key ceremony scheduled for today has been postponed. We are working on identifying a new date for the ceremony. mm.icann.org/pipermail/root #DNSSEC #ICANN
20
338
“Things were just starting to get boring in the field of computer security when somebody said, ‘Hey, let’s reinvent desktop applications in a way that transforms the most common web app vulnerability into native remote code execution!’.”
3
298
The fuck? We’ve never taken a dollar of funding, here or at Matasano, and we pay interns. Everyone we talk to pays interns. What dipshit founders is he talking about?
Quote
Congratulations to @AOC on fighting the hard fight to kill internship programs! almost every founder I talk to has canceled their internship programs (or won’t start them) because they see no reason to pay for the right to slow down their A players to train young people twitter.com/AOC/status/115…
29
314
Tailscale has built one of the most valuable and widely-loved connectivity services of the last decade and the top comment on the orange site thinks that THEY’RE the joke because they did it by ignoring a lot of the conventional wisdom about n-tier app design.
10
315
I am so confused by the constant question of “well if not PGP then what?” Huh? Nobody uses PGP. It’s like asking “if not Betamax then what?” It’s not even wrong. Use Signal and Wire like everyone else.
37
296
More Fly.io job stuff: I’m putting together a team dedicated to private networking — WireGuard, eBPF. Go, Rust, and BPF-C. I haven’t put a JD together, but feel free to reach out if you’re interested (thomas at fly io works, too).
7
299
Steal or write your dotfiles when you’re 17. Accrete lines over time; remove or edit rarely. The entries in your gradually expanding PATH like rings in a tree trunk. One day you may need your .profile to work on a SunOS 4.1.3 machine again, just wait.
Quote
What are people's dot files pro-tips? I keep my dot-files super small and boring (github.com/colmmacc/dotfi) but I couldn't live without "set bg=dark" in a .vimrc, or server keepalives in .ssh/config.
10
291
Replying to
I suggest that’s because 95% of “computer science” isn’t science at all, and most of the nerds ranting about this have never done science.
4
237
“The CSO of Equifax has a music degree” is the very dumbest Equifax complaint; immediately suggests cluelessness about security field.
27
237
Reminder: recommended Google 2FA config: 1. U2F Security Key 2. iPhone Code Generator 3. Physically secure backup codes 4. NO SMS.
14
231
Replying to
The single most important cryptographic feature of Signal is Signal’s willingness to say “no” to feature requests, even for what seem like table stakes basic messaging features. No secure group messaging feature is ever simple.
4
244
This is the biggest, most impactful cryptographic result in years, and nobody is talking about it. You can have a whole successful career and not discover something half as important as this.
Quote
Tomorrow (Wednesday 6th) at @BlackHatEvents, we are presenting with @martinralbrecht, @DowlingBJ and @djwj_ our work on finding practically exploitable vulnerabilities in Matrix. Join us!! blackhat.com/eu-22/briefing (and check our paper: nebuchadnezzar-megolm.github.io)
10
246
If you’re freaked out that your browser turned something called “DNS over HTTPS” on, you’re being bamboozled. DoH is a good thing.
18
220
Thing computer security people have done for years that will hit the mainstream in 2017: burning their phones before crossing borders.
3
204
Replying to
Every large company with _any_ security competence is continuously finding vulnerabilities in everything they build. You will hear about virtually none of them. This isn’t a massive cover-up.
3
214