Pebbling Club 🐧đŸȘš

  • Anyone with 14.7.1. Does it have the equivalent Sequoia non-developer app lockout? | MacRumors Forums
    Notes
    Sequoia 15.1 now hard-locks out any app that is not approved by Apple, including a bunch of my old and well used utilities. They can be made to run by hacking underneath in BSD, but the situation is unsatisfactory for a computer that I consider is MINE.
    Unfurl
  • Apple Forces The Signing Of Applications In MacOS Sequoia 15.1 | Hackaday
    Notes
    Many MacOS users are probably used by now to the annoyance that comes with unsigned applications, as they require a few extra steps to launch them. This feature is called Gatekeeper and checks for an Apple Developer ID certificate. Starting with MacOS Sequoia 15, the easy bypassing of this feature with e.g. holding Control when clicking the application icon is now no longer an option, with version 15.1 disabling ways to bypass this completely. Not unsurprisingly, this change has caught especially users of open source software like OpenSCAD by surprise, as evidenced by a range of forum posts and GitHub tickets.
    Feed
    Embed
    Unfurl
  • Computers Are Bad
    Notes
    COMPUTERS ARE BAD is a newsletter semi-regularly issued directly to your doorstep to enlighten you as to the ways that computers are bad and the many reasons why. While I am not one to stay on topic, the gist of the newsletter is computer history, computer security, and "constructive" technology criticism.
    Feed
    Unfurl
  • It's Now Possible To Sign Arbitrary Data With Your SSH Keys
    Notes
    Did you know that you can use the ssh-keygen command to sign and verify signatures on arbitrary data, like files and software releases?
    Feed
    Unfurl
  • Open-Source LLMs - Schneier on Security
    Notes
    We have entered an era of LLM democratization. By showing that smaller models can be highly effective, enabling easy experimentation, diversifying control, and providing incentives that are not profit motivated, open-source initiatives are moving us into a more dynamic and inclusive AI landscape. This doesn’t mean that some of these models won’t be biased, or wrong, or used to generate disinformation or abuse. But it does mean that controlling this technology is going to take an entirely different approach than regulating the large players.
    Feed
    Embed
    Unfurl
  • The Facebook Hack Is an Internet-Wide Failure | WIRED
    Notes
    On Friday, Facebook announced that hackers had leveraged three separate bugs to collect 50 million users’ so-called access tokens, which are the equivalent of digital keys to a Facebook account. With those tokens, hackers can take full control of users’ Facebook accounts, but because of Single Sign-On, they can also access any other website that those 50 million users log into with Facebook.
    Feed
    Unfurl
  • Fun With Teensy - Security SiftSecurity Sift
    Notes
    I’ve been wanting to write about the Teensy and its application in security testing or some time now. It’s extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction. It can be used to bypass auto-run, AV
    Feed
    Embed
    Unfurl
  • Pass: The Standard Unix Password Manager
    Notes
    With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password.
    Unfurl
  • Thunderstrike - Trammell Hudson's Projects
    Notes
    Thunderstrike is the name for the Apple EFI firmware security vulnerability that allows a malicious Thunderbolt device to flash untrusted code to the boot ROM
    Unfurl
  • TechnoSophos: Run Node.js apps on low ports without running as root
    Notes
    $ sudo apt-get install libcap2-bin $ sudo setcap cap_net_bind_service=+ep /usr/bin/node $ node foo.js
    Feed
    Unfurl
  • Passwordless - A node.js/express module for token-based logins
    Notes
    Passwords are broken. Inspired by Justin Balthrop's article Passwords are Obsolete token-based one-time password (OTPW) authentication is faster to deploy, better for your users, and more secure.
    Unfurl
  • Password Generator (Extra Strong version) | SS64.com
    Unfurl
  • On Hacking MicroSD Cards « bunnie's blog
    Notes
    An Arduino, with its 8-bit 16 MHz microcontroller, will set you back around $20. A microSD card with several gigabytes of memory and a microcontroller with several times the performance could be purchased for a fraction of the price.
    Feed
    Embed
    Unfurl
  • A Few Thoughts on Cryptographic Engineering: On the NSA
    Notes
    All of this is a long way of saying that I was totally unprepared for today's bombshell revelations describing the NSA's efforts to defeat encryption. Not only does the worst possible hypothetical I discussed appear to be true, but it's true on a scale I couldn't even imagine. I'm no longer the crank. I wasn't even close to cranky enough.
    Feed
    Embed
    Unfurl
  • Crypto prof asked to remove NSA-related blog post | Ars Technica
    Notes
    Today, Green's academic dean contacted him to ask that "all copies" of the blog post be removed from university servers. Green said that the move was not "my Dean's fault," but he did not elaborate. Were cryptology professors at Johns Hopkins not allowed to say, as Green had, things like:
    Unfurl
  • A Few Thoughts on Cryptographic Engineering: A note on the NSA, the future, and fixing mistakes
    Notes
    The question to me -- as an American and as someone who cares about the integrity of speech -- is how we restore faith in our technology. I don't have the answers to this question right now. Unfortunately this is a long-term problem that will consume the output of researchers and technologists much more talented than I am. I only hope to be involved in the process.
    Feed
    Embed
    Unfurl
  • Hard-Coded Bluetooth PIN Vulnerability in LIXIL Satis Toilet
    Notes
    Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user.
    Unfurl
  • Persona and Surveillance - Identity at Mozilla
    Notes
    It’s also worth pointing out that we do take certain technical measures to limit the data we collect. We’ve designed Persona so that the identity provider – including the fallback Identity Provider that we run – does not learn your browsing history. We consider that a good security practice, not specifically because of surveillance, but generally because collecting data without a user benefit just creates risk.
    Unfurl
  • [liberationtech] Why didn't tech company leaders blow the whistle?
    Notes
    Dave asks some great questions about why the people who had power over these networks didn't blow the whistle instead of some anonymous insider having to do it. Here's one possible answer.
    Unfurl
  • ongoing by Tim Bray · On ID Tokens
    Notes
    ID To­kens are lit­tle chunks of text which claim that some par­tic­u­lar per­son wants to tell some par­tic­u­lar party out there that they’re signed in and au­then­ti­cated by the Iden­tity Provider that is­sued the token.
    Feed
    Unfurl
  • Introduction to emerging JSON-based ID and Security protocols. Brian Campbell, Ping Identity. #gluecon (with tweets) · johnfontana · Storify
    Notes
    Introduction to emerging JSON-based ID and Security protocols. Brian Campbell, Ping Identity.
    Unfurl
  • Secure Your REST API... The Right Way | Stormpath
    Notes
    We already showed you how to build a Beautiful REST+JSON API, but how do you secure your API? At Stormpath we spent 18 months researching best practices, implementing them in the Stormpath API, and figuring out what works. Here’s our playbook on how to secure a REST API.
    Unfurl
  • Proposal: LDAP password resets as a unit of measure - Will's blog
    Notes
    The 3 month LDAP password reset is such a large part of our lives that I propose it become a standard unit of measure for elapsed time.
    Feed
    Unfurl
  • Print out all your saved passwords – OSX | Song Zheng
    Notes
    Here’s a reason why you shouldn’t let anyone use your computer. In your terminal, type: security dump-keychain -d ~/Library/Keychains/login.keychain
    Unfurl
  • Meet the men who spy on women through their webcams | Ars Technica
    Notes
    If you are unlucky enough to have your computer infected with a RAT, prepare to be sold or traded to the kind of person who enters forums to ask, "Can I get some slaves for my rat please? I got 2 bucks lol I will give it to you :b" At that point, the indignities you will suffer—and the horrific website images you may see—will be limited only by the imagination of that most terrifying person: a 14-year-old boy with an unsupervised Internet connection.
    Unfurl
  • gbraad/html5-google-authenticator
    Notes
    A simple Google Authenticator app written in HTML
    Unfurl
  • IBM Outlaws Siri, Worried She Has Loose Lips | Wired Enterprise | Wired.com
    Notes
    The reason? Siri ships everything you say to her to a big data center in Maiden, North Carolina. And the story of what really happens to all of your Siri-launched searches, e-mail messages and inappropriate jokes is a bit of a black box.
    Unfurl
  • google-authenticator - Two-step verification - Google Project Hosting
    Notes
    The Google Authenticator project includes implementations of one-time passcode generators for several mobile platforms, as well as a pluggable authentication module (PAM). One-time passcodes are generated using open standards developed by the Initiative for Open Authentication (OATH) (which is unrelated to OAuth).
    Unfurl
  • Does Airport Security Really Make Us Safer? | Culture | Vanity Fair
    Notes
    The best memorial to the victims of 9/11, in Schneier’s view, would be to forget most of the “lessons” of 9/11. “It’s infuriating,” he said, waving my fraudulent boarding pass to indicate the mass of waiting passengers, the humming X-ray machines, the piles of unloaded computers and cell phones on the conveyor belts, the uniformed T.S.A. officers instructing people to remove their shoes and take loose change from their pockets. “We’re spending billions upon billions of dollars doing this—and it is almost entirely pointless. Not only is it not done right, but even if it was done right it would be the wrong thing to do.”
    Feed
    Unfurl
  • Does Airport Security Really Make Us Safer? | Culture | Vanity Fair
    Notes
    The best memorial to the victims of 9/11, in Schneier’s view, would be to forget most of the “lessons” of 9/11. “It’s infuriating,” he said, waving my fraudulent boarding pass to indicate the mass of waiting passengers, the humming X-ray machines, the piles of unloaded computers and cell phones on the conveyor belts, the uniformed T.S.A. officers instructing people to remove their shoes and take loose change from their pockets. “We’re spending billions upon billions of dollars doing this—and it is almost entirely pointless. Not only is it not done right, but even if it was done right it would be the wrong thing to do.” Heaps of federal money, endless bureaucracy, and constant travel delays are the most visible by-products of the Transportation Security Administration. Too bad “increased safety” doesn’t fit on that list.
    Feed
    Unfurl
  • Hackers hit supermarket self-checkout lanes, steal money from shoppers
    Notes
    Lucky Supermarkets has removed the tampered card readers, which were made by VeriFone, in the stores known to be affected and says it is enhancing security of every credit and debit card reader in all 234 of its stores. Joseph Steinberg, CEO of the security company Green Armor Solutions, released a statement saying "Everyone should always check any device in which they insert/swipe a credit/debit/ATM card, or to which they touch their card, to see if it looks like it may have been modified/covered."
    Unfurl
  • Full disk encryption is too good, says US intelligence agency | ExtremeTech
    Notes
    It’s a tough situation: On the one hand, being able to crack full disk encryption is vital for the prosecution of white-collar criminals, child porn ringleaders, pharmaceutical spam barons, and the curtailment of terrorism — but on the other, it’s quite satisfying to know that, perhaps at long last, we have a way of escaping the ireful eye of Big Brother. Where do you stand on FDE?
    Unfurl
  • Stop Sharing Your Files When You Travel
    Notes
    I have been on the road a lot in the past several months, and one thing I keep seeing is that folks are over-sharing. I am not talking about putting up those ribald pictures on your Facebook account, or forwarding those questionable email "jokes." But literally sharing your computer's data files across the hotel (and some airports too). Here is what my Mac Finder looks like at a Hilton that I was at earlier in the week (you can see that I am connected to several of my fellow travelers' PCs):
    Unfurl
  • Passive RFID tag cloning
    Feed
    Embed
    Unfurl
  • PWNIE Express :: The Pentesters Edge
    Unfurl
  • Ksplice » Hijacking HTTP traffic on your home subnet using ARP and iptables - System administration and software blog
    Notes
    "Let’s talk about how to hijack HTTP traffic on your home subnet using ARP and iptables. It’s an easy and fun way to harass your friends, family, or flatmates while exploring the networking protocols."
    Unfurl
  • Cross-domain Ajax with Cross-Origin Resource Sharing | NCZOnline
    Notes
    "A couple of years ago, web developers were banging their head against the first wall in Ajax: the same-origin policy. While we marveled at the giant step forward enabled by cross-browser support for the XMLHttpRequest object, we quickly bemoaned the fact that there was no way to make a request to a different domain from JavaScript. Everyone setup proxies on their web sites, which was the onset of a new host of open redirect problems, as a way to get around the restriction. Although developers were working around this limitation using server-side proxies as well as other techniques, the community outcry was around allowing native cross-domain Ajax requests. A lot of people are unaware that almost all browsers (Internet Explorer 8+, Firefox 3.5+, Safari 4+, and Chrome) presently support cross-domain Ajax via a protocol called Cross-Origin Resource Sharing."
    Feed
    Unfurl
  • support : SAML toolkit for Ruby on Rails
    Notes
    "Security Assertion Markup Language (SAML) is a standard for logging users into applications based on their session in another context. This has significant advantages over logging in using a username/password: no need to type in credentials, no need to remember and renew password, no weak passwords etc."
    Unfurl
  • Stunnel.org
    Notes
    "Lets say you want to use POP from your local machine to a remote machine, but don't have an SSL aware email client. What you can do is to have your machine talk to stunnel on the local machine, who then encrypts the packets and sends them another stunnel running on the remote machine, which forwards them in clear text to the POP server on that machine. "
    Unfurl
  • RANDOM.ORG - True Random Number Service
    Notes
    "Perhaps you have wondered how predictable machines like computers can generate randomness. In reality, most random numbers used in computer programs are pseudo-random, which means they are a generated in a predictable fashion using a mathematical formula. This is fine for many purposes, but it may not be random in the way you expect if you're used to dice rolls and lottery drawings."
    Unfurl
  • Undressing the Terror Threat - WSJ.com
    Notes
    "No amount of statistical evidence, however, will make any difference to those who give themselves over to almost completely irrational fears. Such people, and there are apparently a lot of them in America right now, are in fact real victims of terrorism. They also make possible the current ascendancy of the politics of cowardice—the cynical exploitation of fear for political gain. ... It's a remarkable fact that a nation founded, fought for, built by, and transformed through the extraordinary courage of figures such as George Washington, Susan B. Anthony and Martin Luther King Jr. now often seems reduced to a pitiful whimpering giant by a handful of mostly incompetent criminals, whose main weapons consist of scary-sounding Web sites and shoe- and underwear-concealed bombs that fail to detonate."
    Unfurl
  • Benlog » Don’t Hash Secrets
    Notes
    "So the next time you’re using a hash function on anything, ask yourself: is any of the stuff I’m hashing supposed to stay secret? If so, don’t hash. Instead, use HMAC."
    Unfurl
  • What Airline Passengers Can Learn - TIME
    Notes
    "This now familiar ritual distracts us from the real lesson, which is that we are not helpless. And since regular people will always be first on the scene of terrorist attacks, we should perhaps prioritize the public's antiterrorism capability — above and beyond the fancy technology that will never be foolproof. By definition, terrorism succeeds by making us feel powerless. It is more often a psychological threat than an existential one"
    Unfurl
  • thestar.com iPhone : The 'Israelification' of airports: High security, little bother
    Notes
    ""Do you know why Israelis are so calm? We have brutal terror attacks on our civilians and still, life in Israel is pretty good. The reason is that people trust their defence forces, their police, their response teams and the security agencies. They know they're doing a good job. You can't say the same thing about Americans and Canadians. They don't trust anybody," Sela said. "But they say, 'So far, so good'. Then if something happens, all hell breaks loose and you've spent eight hours in an airport. Which is ridiculous. Not justifiable"
    Feed
    Unfurl
  • Ralph Schindler - Dynamic Assertions for Zend_Acl in ZF
    Notes
    "In plain English, what developers want to be able to do is be able to design assertions that can accept application models that implement the Resource or Role interface, and be able to apply some dynamic or custom logic to assess whether or not the given role has access to the given resource. ... For the purposes of this example, we’ll take a simple concept: a user needs to be able to only edit their own blog post. The user in this case, would be our applications model for users. The actual class will implement the Zend_Acl_Role_Interface. We will also have a BlogPost model which will serve as the resource in question, thus implementing the Zend_Acl_Resource_Interface"
    Unfurl
  • OSX.Loosemaque: It’s Not Just a Game Anymore | Symantec Connect
    Notes
    Must be a slow day on the OS X malware front. This is really reaching... "What’s interesting is that the author of this “game” flat-out says what it does on his Web site. Reading through the author’s description, it seems that he has created this game/threat as some sort of artistic project. The aliens are your files and there are consequences for “killing” them."
    Unfurl
  • hackademix.net » Dear Adblock Plus and NoScript Users, Dear Mozilla Community
    Notes
    "I abused the power and wasted the enormous trust capital gained by the NoScript add-on through the years to prevent Adblock Plus from blocking stuff on four internet domains of mine, without asking an explicit preemptive user consent." The rest of the blog entry is basically sorry-but-not-really.
    Unfurl
  • Google Online Security Blog: Reducing XSS by way of Automatic Context-Aware Escaping in Template Systems
    Feed
    Unfurl
  • Think Progress » Security for the Bush family costing Dallas more than $1 million annually.
    Notes
    "The Star-Telegram has a report on the tight security surrounding George W. and Laura Bush’s move into their Dallas home. Police officers have been turning away vehicles trying to enter the Preston Hollow neighborhood, “explaining that it is closed to the general public.”"
    Unfurl
  • National Vulnerability Database (NVD)National Vulnerability Database (CVE-2008-5353)
    Unfurl