CyberSeeker

joined 1 year ago
[–] [email protected] 5 points 1 week ago

Re:Zero, Konosuba, Overworld, and That Time I Got Reincarnated as a Slime are some of the best, alongside SAO which started the modern version of the genre.

[–] [email protected] 82 points 1 month ago (1 children)

Shouldn’t be this hard to find out the attack vector.

Buried deep, deep in their writeup:

RocketMQ servers

  • CVE-2021-4043 (Polkit)
  • CVE-2023-33246

I’m sure if you’re running other insecure, public facing web servers with bad configs, the actor could exploit that too, but they didn’t provide any evidence of this happening in the wild (no threat group TTPs for initial access), so pure FUD to try to sell their security product.

Unfortunately, Ars mostly just restated verbatim what was provided by the security vendor Aqua Nautilus.

[–] [email protected] 3 points 4 months ago (1 children)

Only the cyber truck. Model S and 3 refreshes are still on the legacy platform, with a lithium ion 12V.

 

Hi all,

The following post appears to crash my feed while scrolling:

https://mander.xyz/post/13720820

It is a very long text post with some technicals, so possibly a parsing error in the text preview?

Thanks! Worked around it by blocking the user temporarily.

[–] [email protected] 67 points 5 months ago (7 children)

So the article repeats, several times, “waymo relies on remote operators”. I don’t think the author knows what “self-driving” means.

[–] [email protected] 18 points 6 months ago

For encryption, the client and server need to share their private keys.

This is incorrect, for asymmetric (public-private) encryption. You never, ever share the private key, hence the name.

The private key is only used on your system for local decryption (someone sent a message encrypted with your public key) or for digital signature (you sign a document with your private key, which can be validated by anyone with your public key).

For the server, they are signing their handshake request with a certificate issued by a known certificate authority (aka, CA, a trusted third party). This prevents a man-in-the-middle attack, as long as you trust the CA.

The current gap is in inconsistent implementation of Organization Validation/Extended Validation (OV/EV), where an issuer will first validate that domains are legitimate for a registered business. This is to help prevent phishing domains, who will be operating with TLS, but on a near-name match domain (www.app1e.com or www.apple.zip instead of www.apple.com). Even this isn’t perfect, as business names are typically only unique within the country/province/state that issues the business license, or needed to be enforced by trademark, so at the end of the day, you still need to put some trust in the CA.

[–] [email protected] 6 points 6 months ago* (last edited 6 months ago) (5 children)

So if ISPs are once again Title II common carriers, how can they enforce the TikTok ban? 🤔

[–] [email protected] 3 points 6 months ago

I believe this is already the case; domain reputation is weighted pretty heavily by Gmail and others, so it will take some months before you’ve established enough rep. Following SPF/DMARC/DKIM is crucial, followed with time your domain has been registered and typical outbound volume from your domain.

[–] [email protected] 29 points 6 months ago (11 children)

That’s the benefit of a custom domain, I suppose; you can always change he provider without changing your email.

view more: next ›