Home | Blog | Software | Reviews and Features | Forum | Help | Donate | About us

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • May 28, 2017, 05:16:07 PM
  • Proudly celebrating 10 years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - f0dder [ switch to compact view ]

Pages: [1] 2 3 4 5 6 ... 361next
I would have thought UTF-8 subtitles and buffer overruns leading to code execution - specifically mentioning .zip downloads makes me think otherwise.

It could be several different bugs in different players - it could be absolute paths in zip files? - it could be one ore more bugs in one or more common subtitle handling libraries.

Interesting! :)

Living Room / Re: [Breaking News] Cyber Attack cripples UK NHS.
« on: May 27, 2017, 09:28:30 AM »
"The same" or "a similarly bad and wormable" security hole?

Living Room / Re: [Breaking News] Cyber Attack cripples UK NHS.
« on: May 18, 2017, 02:28:14 AM »
A toothbrush is a product, and electricity produced by a nuclear power plant is a product, but the latter produces nuclear waste as a side-effect that will be causing a headache for our progeny for tens of thousands of years. So you can't just leave it up to the companies or the markets.
The comparison of the current situation to nuclear powerplants is... bordering crazy.

Let's reiterate:
  • XP has had longer general support than most Long-Time-Support OS versions.
  • Product roadmap has been available for ages, EOL is no surprise to anyone.
  • "Special Snowflake" support has been available at a very reasonable pricetag.
  • For "can't upgrade" scenarios, third-party (irresponsible!) vendors are responsible.
  • Mitigations are available for "can't upgrade" scenarios, and there's been plenty of time to implement them.

And it's not unreasonable that security patch wasn't initially released to the general public - XP is EOL, after all. And there's an insane amount of testing needed before releasing a GA patch - can you imagine the outcry if Microsoft released a patch that broke people's systems?

Living Room / Re: [Breaking News] Cyber Attack cripples UK NHS.
« on: May 15, 2017, 02:24:20 AM »
It isn't malware research - they actually produced the malware that was used by the hackers. As far as I am aware they weren't reporting the security issue to MS but rather keeping it quiet so that they could illegally exploit it themselves.
Oh, but it *is* malware research - and weaponization of the bugs found. And that's fine, really, it's part of what a national security agency should be doing. We're a lot better off with this model than having intentional backdoors inserted by government agencies.

Of course it's bloody bad that agencies have had their malware treasure troves robbed and leaked by bad actors, but there's no guarantee that the exploits wouldn't have been found by somebody else. You can be sure that the cybercriminals have people hunting for 0days.

Your "govt must have access to everybody's data" worries is something I share, but it's a different issue from TLAs hunting for bugs and weaponizing them.

Living Room / Re: [Breaking News] Cyber Attack cripples UK NHS.
« on: May 14, 2017, 11:12:47 AM »
f you have a product (e.g. Win XP) that has fundamentally changed the world and the world in its current form still relies on it to function, then you (MS) can't just decide for commercial reasons to entirely abandon it (and the world). I mean you can, but it is not right and it will have consequences, including commercial ones.
I quite disagree.
Windows XP is 15+ years old, has had way longer support lifetime than you get for LTS version of other software, and there's been a very clearly planned and communicated timeline for support EOL. Now, it would be interesting if some product liability (within limited timeframe) was introuced - Poul-Henning Kamp of FreeBSD frame has some thoughts on this that are worth reading, but for a product as antiquated as WinXP, it really is the fault of the victims for not upgrading.

As I've said, and Stoic Joker confirmed, there's good reasons why some equipment is not upgraded, and it's not easy to secure those machines - but it's not impossible, either. Virtualization, network segragation, proper backups, etc... and obviously a lot of the photos we've seen the last couple of days show pwned machines where there really aren't any good excuses for not having patched.

Anyway, the bugs exploited are pretty bad - the SMBv1 used for worming isn't exactly XP-only, and the Windows Defender/Anti-Malware exploit is probably the worst I've seen in... 10+ years, I reckon.

It is the US governments fault for legislating that the NSA can snoop on American citizens that ultimately got stolen by/leaked to hackers (which everyone knows is inevitable) - this is going to happen more oftne inthe US and UK and we should all be railing against the decimation of our rights and privacy as citizens.
NSA does what National Security Agencies do - I'm appalled at how they're doing mass surveillance of honest citizens, but NSA doing offensive malware research is not a problem - the bugs were there, it's only a matter of time before somebody found and exploited them.

Living Room / Re: [Breaking News] Cyber Attack cripples UK NHS.
« on: May 13, 2017, 12:18:30 AM »
An OS that was released over 15 years ago, in an age where people pay for latest phones, latest consoles and other gadgets ... sorry but that's silly.
Yes and no.

In general, I agree that it's silly to cling on to an operating system that's that old - but there might be good reasons for it at a hospital. They have special equipment that sometimes, unfortunately, need drivers that haven't been updated for modern systems.

This is a pretty, pretty bad vulnerability, and I'm glad Natalie Silvanovich and Tavis Ormandy found it before it was wormed.

It's yet another example of why it's so bloody dangerous to run complex code in privileged (whether that's kernel-mode or "just" administrator/root privileges) accounts. Researches have generally called Windows defender the "least bad" security wise (3rd-party AV tools tend to do way too much stuff in kernelmode for their own good, and some of them fuck your browser security) - but obviously when something of this scale is found, it's terribad because of the scale of deployment.

Hopefully Microsoft will eventually get all the file-format parsing, untrusted code evaluation (etc.) for antimalware running in a non-privileged sandbox.

EDIT: kudos to Microsoft for fixing this very fast. Four day turnaround.

I was wondering the same as Deozaan :)

Having system info was probably fun to code, but it seems strangely out of place in your tool.

Also, you should probably remove 3Des - it's not suitable for use anymore. If somebody has a cryptic and arcane use for it, it's better that they go find arcane and cryptic software rather than offering an insecure algorithm in a general-purpose application.

And finally, you should document the cipher mode and key derivation functions you're using - both are pretty important with regards to the effective security of the encryption.

The only good thing about the touchbar is being able to run NyanCat on it.

I hate the idea, and IMHO crApple is pissing on developers (and other non-sheeple consumers) by taking out the hardware Escape key - which is far more useful than the preserved caps lock.

That is absolutely crazy, and super cool!

p3lb0x told me about the video a while ago, but didn't get around to watching it until now. The focus on zero-overhead abstractions in C++ is one of the extremely strong features of the language, and something I haven't really seen in other languages.

Oh, and translating x86 assembly to 6510? Pretty cool, even though it's just a subset - pretty interesting that it was more viable than a LLVM codegen :)

Found Deals and Discounts / Re: Antivirus
« on: April 27, 2017, 05:27:02 PM »
I haven't tried MSE myself but regular posters on several Windows Support Forums swear by it.  I just never got around to checking it out.  It can't be a total piece of crap because the regulars who praise it are no dummies.  If you have a pre W10 system you may want to download MSE.
It's not as much of a "MSE is super cool and catches everything" as it's a case of "Pretty much everything else has a high snake-oil factor, and is so hopelessly engineered that it creates more security problems than it fixes".

Found Deals and Discounts / Re: Antivirus
« on: April 27, 2017, 03:13:36 PM »
Oh, windows defender is enough!
Important requirement: On Windows 10 that is, older Windows releases only have a 'less well-developed' MSE version available.
Isn't it Win7+?

General Software Discussion / Re: Windows 10 Privacy Concerns
« on: April 20, 2017, 03:48:28 AM »
What antivirus I can for my windows 10 Privacy and protection?
Just stick with Windows Defender for AV - possibly supplementing with MalwareBytes AntiMalware - but read this.

As for "privacy", you might want to read this. O&O Shutup10 doesn't seem too bad, though.

Announce Your Software/Service/Product / Re: FrogTea
« on: April 05, 2017, 11:19:47 AM »
Sure, I can see some potential weaknesses in the use of FrogTea, but what puzzled me in your initial response was what seemed to be your outright damning of the whole thing in this thread - for no compelling, apparent, verifiable and substantive reason - as though it could not possibly be any kind of useful encryption tool. That would seem to be absurd.
Not really.

The reasons I listed against using FrogTea are pretty sound. If anything is absurd, it's that insistance that there's some merit in using an unmaintained, closed-source program with problematic encryption - while not philosophically untrue, it's about as ridiculous as insisting that it's better to wear a pajamas in a blizzard than being naked.

In the other thread, you went further and even asked what use/purpose it had and were seemingly mistakenly implying/thinking that I was putting FrogTea forward as some kind of a proposed technological solution to address the issues/problems in that other thread (which I decidedly wasn't doing and which would have been an absurd thing to do in any case).
You seem intent on muddling things up. I tried keeping this thread about FrogTea in and by itself (which can be kept fairly technical), whereas the other thread is political, and it's in that context I struggle to see how tech is supposed to be a solution for a political problem.

IainB, I'm going to cut your prose short.

You revived the other thread, so that's where I posted objective reasons to avoid the product.

This thread is about a political issue, and thus this thread is where I ask why you're trying to solve a political problem with a (bad) technological solution.


Announce Your Software/Service/Product / Re: FrogTea
« on: April 04, 2017, 10:37:17 AM »
Well, that all looks pretty good, but some of the references here could be mistaken or out of date, I suppose. (I wouldn't know.) For those who are interested, there seems to be quite a lot of heavy academic documentation about it too, on the Internet.
If one wanted to explore this further, it could be interesting to know how xTEA has been broken, or something, and where that is documented, and how easy that might be to replicate for the average laptop/smartphone thief.
I haven't scoured the net, but I assume the notes on wikipedia are correct with regards to TEA attacks. A 2^59 chosen plaintexts is "not excatly trivial", but the attack is six years old by now - and XXTEA probably isn't getting a lot of (public) attention since it's not a sexy thing to break. It's not one of the normally used ciphers, so why bother throwing a lot of resources at it?

For academia, that is. Our friendly three-letter agencies haven't got the same resource constraints, nor a drive for public glory.

However, for the purposes of securely encrypting the typical user's portable bits of personal/private/confidential HTML and text-based data (...)
If you have a hard requirement of no other requirements than a browser (e.g. no executables), perhaps - but I'd still look for other solutions. And it wouldn't be hard to cook up something with a proper encryption algorithm that still decrypts from html+js.

Other than that: threat modeling.

1) Don't be fooled into thinking VPN will secure your privacy on the internet, it's not what it was designed for.
2) Don't even consider using a free offering.

Don't use FrogTea - I've posted some reasons in the other thread.

What on earth is it supposed to help with, anyway? You're suggesting a product that's technically inferior to modern crypto, while not solving the issue at hand which is a politics based one.

Announce Your Software/Service/Product / Re: FrogTea
« on: April 03, 2017, 10:43:25 PM »
Don't use.

It's unmaintained software, the source is not available, TEA should be considered broken, and the page doesn't mention whether the algorithm is being used in EBC or a chained mode, nor whether any key stretching is being used for the input passphrase.

General Software Discussion / Re: LessPass password manager
« on: March 22, 2017, 02:35:35 AM »
Have they changed the core mechanics of how it works, or is it still 100% utterly useless?

Last time I looked at it, the design meant compromised master password == having to change each and every password you've used it for.

Also, what this guy wrote.

While VMs can be escaped, you should keep in mind that a VM escape is an extremely valuable 0day.

So, if you get a piece of "interesting software" containing a VM escape, there's basically two scenarios:

1) you're targeted by a nation-state, YOU'RE GONNA DIE AND THERE'S NOTHING THAT YOU CAN DO ABOUT IT.
2) you're dealing with a potentially nasty piece of malware, but it's using publically-known escape techniques.

Keep your VM software up-to-date! And don't even think about using sandboxing/containerizing software for testing BadStuff.

PS: while you're not super likely to find VM-escape in the wild, it's a lot more common for malware to have VM detection - meaning it won't activate when running in a VM, so it lulls you into a false feeling of safety.

General Software Discussion / Re: Malwarebytes goes full Anti-Virus
« on: March 17, 2017, 07:26:40 PM »
What a shame :(

General Software Discussion / Re: Windows Explorer now has banner ads
« on: March 12, 2017, 12:07:31 PM »
Man, ads in your operating system... ugh.

I quite like Windows 10, it's pretty snappy - but I really don't like this direction. Meh. Thought Microsoft had wisened up with Natya Sadella and all, but... ugh.

all of systems we work on now have a licensed copy on Notepad++ installed.
Huh, there's licensed versions of Notepad++?  :huh: :huh: :huh:

Living Room / Re: What books are you reading?
« on: February 28, 2017, 04:55:47 PM »
Finally reading The Mythical Man-Month.
"Few books on software project management have been as influential and timeless as The Mythical Man-Month. With a blend of software engineering facts and thought-provoking opinions, Fred Brooks offers insight for anyone managing complex projects."

While I'm a developer and not a project manager, I've been told (and sorta agree) that it's one of the "really should read" books in the industry. It's probably a bit over-hyped, but nonetheless it's a good read so far (next chapter is "No Silver Bullet") - and it's amazing how little of it seems dated, even though the first edition is from 1975.

Pages: [1] 2 3 4 5 6 ... 361next