Yes, it’s easy to get all paranoid here. The big question is whether the paranoia is justified, and I don’t expect the answer to turn up any time soon. All we get is a suspicion that there might be more things going on than busting drug cartels.
And with Signal making rather questionable crypto decisions lately, how do we know who is currently pulling the strings there?
The FBI had to disclose their operation at some point for legal reasons. Russian or Chinese APTs are not bound by such rules. How do we know that they haven’t compromised some encrypted messengers already and are reading all communications?
Fascinating read on how the FBI ran Anom encrypted phone company. In particular:
“We wanted to shatter the trust in the encrypted phone industry that catered to criminals.”
The question remaining is: how can we as non-criminals still trust encrypted messengers?
A quote from the article explaining what happened at Basecamp:
“Do you protect this extremely senior employee that you’ve protected for many years? And [the answer] was yes.”
You cannot both tolerate toxic people and have an inclusive work environment at the same time.
I looked into the Ninja Cookie extension and found it really sloppy with security. I don’t know why after three months they only managed to address the biggest issue, they never wrote back after acknowledging my initial report. #infosec #xss
The #Firefox add-on blocklist is now a Bloom filter, meaning that seeing its contents isn’t trivial. Also, #Mozilla stopped updating https://blocked.cdn.mozilla.net/ last year. If you need a human-readable list of blocks, it seems that https://firefox.settings.services.mozilla.com/v1/buckets/blocklists/collections/addons-bloomfilters/records is the only place now.
Great thread on how to manage a team in order to make it more inclusive and welcoming to women. Yes, it’s sad but all of this is really necessary. Patricia knows what she is talking about. No, we cis men don’t.
Wow. As we don’t have enough vulnerabilities in open source projects as it is, “researchers” from University of Minnesota introduce more on purpose. To “prove” that it can be done. 🤦♂️
Via @firstname.lastname@example.org: https://twitter.com/rakyll/status/1384870642240077830
It seems that he has shut down most of his websites hosting copycat content, that’s good news. Yes, even the one with copyright message replaced by “See you in court.” However, he has set up a new fake company website and a Twitter account for it. 🙄
The Print Friendly & PDF browser extension allowed any website to completely take over the extension. Considerable attack surface remains, and Firefox version is still vulnerable (exploitation slightly more complicated there). #XSS #infosec #BugBounty
Don’t get me wrong, deepfakes are a concern. But apparently not big enough a concern yet that we need to worry about a mom manipulating videos in order to harass her daughter’s competition. Harassment with a real video is enough to get her indicted.
So whoever compromised the PHP source code repository did so by pushing via HTTPS with password-based auth. They had to guess usernames. Sounds like a password reuse issue: the password leaked elsewhere, so they didn’t know the matching username.
So apparently the leaked data of 533 million Facebook users came from a 2019 breach that wasn’t previously disclosed after all. Not just that, Facebook chose not to notify the users affected either. Yes, totally reasonable and responsible behavior, as you would expect.
Great blog post, explaining how linked list questions in job interviews had their time and place in the 80s. Also showing how the cargo culting likely happened which made them still popular today despite being largely pointless.
Wladimir Palant, software developer and security researcher, browser extensions expert. He/him
Other Mastodon account for non-technical topics: https://social.tchncs.de/@WPalant
A Mastodon instance for info/cyber security-minded people.