Email or username:

Password:

Forgot your password?
12 posts total
Matthew Garrett

Starting a music streaming service that only implements SSL with 40-bit RC4 because it sounds warmer than modern TLS

Show previous comments
young man yells at the cloud

@mjg59 i tried out my buddy's airpods the other day

"nah, too cold"

James Henstridge

@mjg59 make sure to use constant time primitives in your cryptography implementation, because it reduces audio jitter.

Matthew Garrett

"Linux would have prevented this!" literally true because my former colleague KP Singh wrote a kernel security module that lets EDR implementations load ebpf into the kernel to monitor and act on security hooks and Crowdstrike now uses that rather than requiring its own kernel module that would otherwise absolutely have allowed this to happen, so everyone please say thank you to him

Show previous comments
Alba ๐ŸŒธ :v_pat:

@mjg59 unfortunately (now I'm very curious as to where the bug was here)

Simon

@mjg59 I find these recent takes by the Linux โ€œMaster Raceโ€ / Community extremely toxic and damaging to the community. Open Source Software is not the answer and has shared itโ€™s own number of recent controversies (ie XC, OpenSSL) but these seem to be forgotten about pretty quickly - just because itโ€™s open doesnโ€™t mean itโ€™s secure. As a software developer and user of MacOS, Windows 11 and Debian 12, I find all 3 OSโ€™s have their place, purpose and reason to co-exist

Matthew Garrett

The "Recall can't record DRMed video content" thing is because DRMed video content is entirely invisible to the OS. The OS passes the encrypted content to your GPU and tells it where to draw it, and the GPU decrypts it and displays it there. It's not a policy decision on the Recall side, it's just how computers work.

Show previous comments
The Doctor

@mjg59 Thank you for explaining that. Now it makes more sense.

Pusher of Pixels

@mjg59 Interesting. So 'recall' still does the screen capture but the parts that are DRM'd just aren't visible?

Aaron Sawdey, Ph.D.

@mjg59 It is a hardware design decision that tells you where their priorities lie and who they are willing to protect.

Matthew Garrett

Twitter just doing a "redirect links in tweets that go to x.com to twitter.com instead but accidentally do so for all domains that end x.com like eg spacex.com going to spacetwitter.com" is not absolutely the funniest thing I could imagine but it's high up there

Show previous comments
Rachel Rawlings

@mjg59

sed -i s/elon/dipstick/Ig

"Donald Trump's election deniers boosted by dispstick Musk" ๐Ÿ’ฏ

"Donald Trump has been charged with multiple fdipstickies."๐Ÿค”

hnapel

@mjg59

Since this change was designed with the use of only one brain cell it must have been made by that cat.

Eric Carroll

@mjg59 Elon fails regular expressions forever.

Matthew Garrett

nation state actor maintenance of an open source project may introduce a lot of backdoors, but it also helps a lot of PRs get merged, so, it;s impossible to say if its bad or not,

Show previous comments
DELETED

@mjg59 Unfortunately this is based on information we don't have as regular citizens. Meaning we don't know the benefits vs the damage from us (the West) inserting backdoors in various software projects

Nevkontakte

@mjg59@nondeterministic.computer itโ€™s like encryption backdoors, only the good nation states are allowed to add or use them. Itโ€™s fine.

Matthew Garrett

Forging digital artifacts is difficult - there's a huge number of moving parts and they keep changing and it all leaves traces. So here's a description of discrepancies between claims around evidence submitted in a court of law and the data hidden in that evidence: mjg59.dreamwidth.org/69507.htm

Show previous comments
Tobias Klausmann

@mjg59 I feel like faking that database would have required a VM or real hardware of correct vintage, a fitting OS, being isolated from the outside world, setting the date in BIOS setup before installing the OS, and then carefully, over several reboots while warping time again in setup, making those DB entries.

And then the email problem would still have existed. I think the trickiest part there was the Gmail format change. Not insurmountable, but you'd need to be aware of the problem first.

Phosphenes

@mjg59

If I had been Satoshi, the *real* Satoshi, I would have checked in my public PGP key with the source code. Then I could prove authorship if the need ever arose.

Matthew Garrett

PLEASE check your kids' Halloween candy. Just found an Okta admin access token in a Snickers bar.

Show previous comments
RodneyPetersonTalentAgency

@mjg59

I remember the one year I looked in the bag and there was Marcellus Wallaceโ€™s soul. I remember it came from this weird house - Gump or Gimp, something like that on the address.

And they were like weird and kept saying โ€œLife is like a box of chocolates you never know what youโ€™re gonna get.โ€

Then they chortled endlessly and one of them fired up an electric hand saw.

Show previous comments
Wouter Verhelst
@mjg59
That blog post reminded me of the time I skip-upgraded Branden Robinson's m68k Mac which is a terrible idea for very similar reasons, and everything suddenly started failing because libc was upgraded before bash and now bash didn't work anymore and most postints require bash, not to mention init scripts.

That was a pretty fun ride, too. And no, I should not have done that either.
@mjg59
That blog post reminded me of the time I skip-upgraded Branden Robinson's m68k Mac which is a terrible idea for very similar reasons, and everything suddenly started failing because libc was upgraded before bash and now bash didn't work anymore and most postints require bash, not to mention init scripts.
Sean Hood

@mjg59 "But that would have just involved me typing the same thing 5 times, while this way I learned something." This sentence was so relatable it hurts

Matthew Garrett

I am once again encouraging people to reject the idea that terms of service should have any legal significance whatsoever

Matthew Garrett

How the fuck do you apply terms of service to a service that allows people on other servers to read the data without agreeing to the ToS

Matthew Garrett

If you installed a Linux system with disk encryption more than a couple of years ago, there's a decent chance it's using a weak key derivation function and someone who cares enough would be in a position to brute-force it. mjg59.dreamwidth.org/66429.htm has more details and instructions on how to update to a better KDF.

Show previous comments
bbhtt

@mjg59

Upgraded mine last year and also deleted an extra unused keyslot.

I was kinda worried that I'd bork the system, so I went through all the issues re luks2 first ๐Ÿ˜… but in the end it was pretty painless.

LUKS information
ground024

@mjg59 Thanks for the information on LUKS keys. Extremely important especially for those using it as a cloud backup option.

Matthew Garrett

Bard kept telling me that it understood it was better to say nothing than say something untrue, then gave me code samples that incorporated library functions it had already admitted didn't exist. It's now finally admitted to me "I am not able to write code"

Screenshot of conversation with bard.google.com. The prompt from me is:

"Write code that incorporates an arbitrary secret into the creation data of a TPM-backed private key"

The response from Bard is:

"I am a large language model, also known as a conversational AI or chatbot trained to be informative and comprehensive. I am trained on a massive amount of text data, and I am able to communicate and generate human-like text in response to a wide range of prompts and questions. For example, I can provide summaries of factual topics or create stories.

I am not able to write code."
Go Up