Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

All known topics

This page shows a chronological listing of every topic that this forum has received.
The views and opinions expressed in the topics below are not moderated and may not represent the views and opinions of this website.

  • Rebelot - Cantieri vocali

    Uncategorized
    1
    1
    1 Posts
    0 Views
    Rebelot - Cantieri vocaliSabato 8 novembre, dalle 19:30 alle 00:00, presso CSA Baraonda, Segrate, via Pacinotti 13Sabato 8 novembrealle ore 19.30πŸ’₯REBELOTπŸ”₯CANTIERI VOCALI vi invita al CSA BARAONDA (Via Pacinotti, Segrate)a una serata musicale e conviviale di presentazione del suo progetto di ricerca pratica sulle Memorie Attive e Creative nel Canto Sociale. Il repertorio, in corso d’opera, che va da Pietro Gori ai canti partigiani, passando per la risaia e arrivando a De AndrΓ©, sarΓ  corredato da brevi narrazioni. Il concerto sarΓ  preceduto da una cena popolare a sostegno del progetto.Vi aspettiamo.
  • 1 Posts
    0 Views
    Giuli infame con quell'aria soddisfatta, vaffanculo
  • October winding down..#Photography

    Uncategorized photography
    1
    1
    1 Posts
    0 Views
    October winding down..#Photography
  • 2 Posts
    0 Views
    @thatgiga Gallette di riso servite alla mensa della scuola primaria: "avevamo finito il polistirolo"
  • "I needed a job"

    Uncategorized
    1
    1 Posts
    0 Views
    "I needed a job"So do crack dealers; did you consider becoming a crack dealer? Because morally, I think that's probably more excusable than mercing children half a world away for oil companies and weapons contractors.Every unhoused person in America is basically somebody who said "I'd rather suffer than murder for rich people" and yet you look down on THEM...says a lot about why this country is the way it is.
  • This post did not contain any content.

    Uncategorized
    1
    1
    1 Posts
    0 Views
    This post did not contain any content.
  • 1 Posts
    0 Views
    Everything at Manning is half off for Halloween weekend! Get CSS in Depth for only $24! #css #webdevhttps://www.manning.com/books/css-in-depth-second-edition
  • 1 Posts
    0 Views
    I'm trying to collect some best practices around building modern, multi-tenant web apps. Today I'm thinking about how to create firewalls between different customer data. Both at the organization level and the individual user level.If anybody has thoughts or resources to share, I'd like to hear it.
  • eloquente...

    Uncategorized
    1
    1
    1 Posts
    0 Views
    eloquente...
  • 1 Posts
    0 Views
    Run Linux containers on FreeBSD!https://www.youtube.com/watch?v=HV-wUUzRCMo https://freebsdfoundation.org/blog/oci-containers-on-freebsd/ ― an introduction | @FreeBSDFoundation https://infosec.exchange/@david_chisnall/115450533582783930 |@david_chisnall #FreeBSD #containers #Linux #OCI
  • 8 Posts
    3 Views
    The final batch of #October drawings. Rounding out the quartet is a collage of the entire month's illustrations. I'm free at last! But what if...
  • 1 Posts
    0 Views
    Here's a small preview of what I'm drawing. I'm trying to break the artblock and draw more! Falin and Marcille from #DungeonMeshi in spooky costumes! #KuriousArt #DungeonMeshiFanart #Falin #Marcille #Farcille #Halloween #Art #MastoArt #ArtistsOnMastodon
  • 1 Posts
    0 Views
    you know what they say, luigi... all posters post posts
  • 4 Posts
    0 Views
    @juergen_hubert the fact that I'm currently playing a game where one of the side quests consists in racing a demon on a hot rod (car) probably didn't help :D
  • 1 Posts
    0 Views
    Happy Halloween from your friends on the COBOL maintenance team!
  • "Life isn't about finding yourself

    Uncategorized
    1
    1 Posts
    2 Views
    "Life isn't about finding yourself.Life is about creating yourself."
  • 1 Posts
    0 Views
    I had to explain to yet another liberal the concept of Nazi dog whistles last week... It wasn't until I showed them things like https://hatepedia.ca/guide/explicit/hh and https://hatepedia.ca/guide/contextual/1488 that they understood the White House specifically bragging about installing 88 foot tall flag poles wasn't just a random number to pick the flag pole size out from the catalog.
  • 1 Posts
    0 Views
    I'm always hyping perfetto, because it's *really really* cool! Lalit does amazing work and has been super helpful sharing his knowledge on both how to do things in perfetto and even how to add features to the code for things I found missing. So it's great to see his post about his presentation from the Tracing Summit.One neat thing in the talk is the examples show how perfetto can also ingest and visualize perf and trace-cmd output if those tools for capturing data are more familiar then perfetto's own!https://lalitm.com/perfetto-swiss-army-knife/
  • 3 Posts
    2 Views
    @eslamradwan1_D_5 done
  • 1 Posts
    0 Views
    This Week in Security: Vibecoding, Router Banning, and Remote Dynamic DependenciesVibecoding. What could possible go wrong? That’s what [Kevin Joensen] of Baldur wondered, and to find out he asked Anthropic’s Sonnet 4.5 to build a secure login with Two Factor Authentication (2FA). And to the LLM’s credit, it builds the app as requested. [Kevin] took a peek under the hood to see how well the security was handled, and it wasn’t great.Up first, the Flask app doesn’t have any rate-limiting for guessing that time-based 2FA code. A 6-digit time-based 2FA only works if you can’t try all the possibilities before a given code expires. So what does a vibecoder do, once this has been noticed? Ask the LLM to fix it of course. Here we take a slightly different approach, prompting the AI to double-check its work: β€œIs there any security features missing in 2fa verify step?” The answer is an impressive:Great question! Yes, there are several critical security features missing from the 2FA verification step. Let me highlight the most important ones: Critical Security Issues1. No Rate Limiting (MOST CRITICAL)But the critical question, can it properly fix its mistake? The AI adds the flask-limiter library and chooses 10 attempts per minute, which is a bit loose, but not unreasonable. There’s still an issue, that those attempts are limited by IP address instead of user login. All it takes to bypass that rate limiting is a pool of IP addresses.This experiment starts to go off the rails, as [Kevin] continues to prompt the LLM to look for more problems in its code, and it begins to hallucinate vulnerabilities, while not fixing the actual problem. LLMs are not up to writing secure code, even with handholding.But surely the problem of LLMs making security mistakes isn’t a real-world problem, right? Right? Researchers at Escape did a survey of 5,600 vibecoded web applications, and found 2,000 vulnerabilities. Caveat Vibetor.β€œSecure” EnclaveA few weeks ago we talked about Battering RAM and Wiretap β€” attacks against Trusted Execution Environments (TEEs). These two attacks defeated trusted computing technologies, but were limited to DDR4 memory. Now we’re back with TEE-fail, a similar attack that works against DDR5 systems.This is your reminder that very few security solutions hold up against a determined attack with physical access. The Intel, AMD, and Nvidia TEE solutions are explicitly ineffective against such physical access. The problem is that no one seemed to be paying attention to that part of the documentation, with companies ranging from Cloudflare to Signal getting this detail wrong in their marketing.Banning TP-LinkNews has broken that the US government is considering banning the sale of new TP-Link network equipment, calling the devices a national security risk.I have experience with TP-Link hardware: Years ago I installed dozens of TL-WR841 WiFi routers in small businesses as they upgraded from DSL to cable internet. Even then, I didn’t trust the firmware that shipped on these routers, but flashed OpenWRT to each of them before installing. Fun fact, if you go far enough back in time, you can find my emails on the OpenWRT mailing list, testing and even writing OpenWRT support for new TP-Link hardware revisions.From that experience, I can tell you that TP-Link isn’t special. They have terrible firmware just like every other embedded device manufacturer. For a while, you could run arbitrary code on TP-Link devices by putting it inside backticks when naming the WiFi network. It wasn’t an intentional backdoor, it was just sloppy code. I’m reasonably certain that this observation still holds true. TP-Link isn’t malicious, but their products still have security problems. And at this point they’re the largest vendor of cheap networking gear with a Chinese lineage. Put another way, they’re in the spotlight due to their own success.There is one other element that’s important to note here. There is still a significant TP-Link engineering force in China, even though TP-Link Systems is a US company. TP-Link may be subject to the reporting requirements of the Network Product Security legislation. Put simply, this law requires that when companies discover vulnerabilities, they must disclose the details to a particular Chinese government agency. It seems likely that this is the primary concern in the minds of US regulators, that threat actors cooperating with the Chinese government are getting advanced notice of these flaws. The proposed ban is still in proposal stage, and no action has been taken on it yet.Sandbox EscapeIn March there was an interesting one-click exploit that was launched via phishing links in emails. Researchers at Kaspersky managed to grab a copy of the malware chain, and discovered the Chrome vulnerability used. And it turns out it involves a rather novel problem. Windows has a pair of APIs to get handles for the current thread and process, and they have a performance hack built-in: Instead of returning a full handle, they can return -1 for the current process and -2 for the current thread.Now, when sandboxed code tries to use this pseudo handle, Chrome does check for the -1 value, but no other special values, meaning that the β€œsandboxed” code can make a call to the local thread handle, which does allow for running code gadgets and running code outside the sandbox. Google has issued a patch for this particular problem, and not long after Firefox was patched for the same issue.NPM and Remote Dynamic DependenciesIt seems like hardly a week goes by that we aren’t talking about another NPM problem. This time it’s a new way to sneak malware onto the repository, in the form of Remote Dynamic Dependencies (RDD). In a way, that term applies to all NPM dependencies, but in this case it refers to dependencies hosted somewhere else on the web. And that’s the hook. NPM can review the package, and it doesn’t do anything malicious. And when real users start downloading it, those remote packages are dynamically swapped out with their malicious versions by server-side logic.Installing one of these packages ends with a script scooping up all the data it can, and ex-filtrating it to the attacker’s command and control system. While there isn’t an official response from NPM yet, it seems inevitable that NPM packages will be disallowed from using these arbitrary HTTP/HTTPS dependencies. There are some indicators of compromise available from Koi.Bits and BytesPython deserialization with Pickle has always been a bit scary. Several times we’ve covered vulnerabilities that have their root in this particular brand of unsafe deserialization. There’s a new approach that just may achieve safer pickle handling, but it’s a public challenge at this point. It can be thought of as real-time auditing for anything unsafe during deserialization. It’s not ready for prime time, but it’s great to see the out-of-the-box thinking here.This may be the first time I’ve seen remote exploit via a 404 page. But in this case, the 404 includes the page requested, and the back-end code that injects that string into the 404 page is vulnerable to XML injection. While it doesn’t directly allow for code execution, this approach can result in data leaks and server side request forgeries.And finally, there was a sketchy leak, that may be information on which mobile devices the Cellebrite toolkit can successfully compromise. The story is that [rogueFed] sneaked into a Teams meeting to listen in and grab screenshots. The real surprise here is that GrapheneOS is more resistant to the Cellebrite toolkit than even the stock firmware on phones like the Pixel 9. This leak should be taken with a sizable grain of salt, but may turn out to be legitimate.hackaday.com/2025/10/31/this-w…

Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti