GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    🎓 Doc Freemo :jpf: 🇳🇱 (freemo@qoto.org)'s status on Wednesday, 03-Apr-2024 08:19:48 JST 🎓 Doc Freemo :jpf: 🇳🇱 🎓 Doc Freemo :jpf: 🇳🇱
    • salcedo

    @salcedo My entire company is nixos and we are loving it

    In conversation about a year ago from qoto.org permalink
    • Embed this notice
      salcedo (salcedo@qoto.org)'s status on Wednesday, 03-Apr-2024 10:03:34 JST salcedo salcedo
      in reply to

      @freemo I got infected a few months ago. It’s already terminal. :ablobdizzy:

      In conversation about a year ago permalink
    • Embed this notice
      🎓 Doc Freemo :jpf: 🇳🇱 (freemo@qoto.org)'s status on Wednesday, 03-Apr-2024 10:38:30 JST 🎓 Doc Freemo :jpf: 🇳🇱 🎓 Doc Freemo :jpf: 🇳🇱
      in reply to
      • salcedo

      @salcedo This is my second company where I enacted nixos across the entire company... im as terminal as you can get :)

      In conversation about a year ago permalink
    • Embed this notice
      LucifarGundam (lucifargundam@qoto.org)'s status on Wednesday, 03-Apr-2024 10:39:34 JST LucifarGundam LucifarGundam
      in reply to
      • salcedo

      @freemo @salcedo
      Not bipolar,. though- right?

      ....right?

      In conversation about a year ago permalink
    • Embed this notice
      🎓 Doc Freemo :jpf: 🇳🇱 (freemo@qoto.org)'s status on Wednesday, 03-Apr-2024 10:40:09 JST 🎓 Doc Freemo :jpf: 🇳🇱 🎓 Doc Freemo :jpf: 🇳🇱
      in reply to
      • LucifarGundam
      • salcedo

      @lucifargundam

      Cant be an EE without at least 2 poles :)

      @salcedo

      In conversation about a year ago permalink
    • Embed this notice
      NOS :facebook: 🅰️ ®️ ✝️ U (admitswrongifproven@qoto.org)'s status on Wednesday, 03-Apr-2024 10:51:52 JST NOS :facebook: 🅰️ ®️ ✝️ U NOS :facebook: 🅰️ ®️ ✝️ U
      in reply to
      • LucifarGundam
      • salcedo

      @freemo @lucifargundam @salcedo Elemental equilibrium (EE) needs you to do two different types of elemental damage... what kinds of damage do you deal?

      In conversation about a year ago permalink
    • Embed this notice
      ampbenzscientist@qoto.org's status on Wednesday, 03-Apr-2024 11:20:25 JST AmpBenzScientist AmpBenzScientist
      in reply to
      • salcedo

      @freemo @salcedo How is NixOS working on those Toughbooks? It's the Laptop Gun from Perfect Dark.

      In conversation about a year ago permalink
    • Embed this notice
      🎓 Doc Freemo :jpf: 🇳🇱 (freemo@qoto.org)'s status on Wednesday, 03-Apr-2024 11:21:15 JST 🎓 Doc Freemo :jpf: 🇳🇱 🎓 Doc Freemo :jpf: 🇳🇱
      in reply to
      • AmpBenzScientist
      • salcedo

      @AmpBenzScientist

      So far we havent had any problems.

      @salcedo

      In conversation about a year ago permalink
    • Embed this notice
      ampbenzscientist@qoto.org's status on Wednesday, 03-Apr-2024 12:14:34 JST AmpBenzScientist AmpBenzScientist
      in reply to
      • salcedo

      @freemo @salcedo So it's definitely not a Toughbook.

      In conversation about a year ago permalink
    • Embed this notice
      🎓 Doc Freemo :jpf: 🇳🇱 (freemo@qoto.org)'s status on Wednesday, 03-Apr-2024 12:45:58 JST 🎓 Doc Freemo :jpf: 🇳🇱 🎓 Doc Freemo :jpf: 🇳🇱
      in reply to
      • AmpBenzScientist
      • salcedo

      @AmpBenzScientist

      Sorry i misread your question. No they were all thinkpads.

      @salcedo

      In conversation about a year ago permalink
    • Embed this notice
      ampbenzscientist@qoto.org's status on Thursday, 04-Apr-2024 09:14:41 JST AmpBenzScientist AmpBenzScientist
      in reply to
      • salcedo

      @freemo @salcedo They are good laptops but the OEM has participated in Supply Chain Attacks for a long time. All the back doors that were accidentally left in and APTs from the Mainland targeting them with ease.

      It's usually Firmware and UEFI that I've seen compromised. It would have to be the Chinese APTs responsible. I've never seen such impressive and efficient exploitation. I've seen Chinese software bypass Knox without tripping alarms back when it was an accomplishment. I've seen it hit Thinkpads bypassing the CPU security processor and other hardware security without it being noticed. It wasn't old hardware, it was still under warranty in some cases.

      I hope you have an ace up your sleeve. None of my hardware was able to pull a sample. It's a shame because that was beautiful malware and I would have loved to have a sample. It was persistent, evasive and took me a few hours to recognize there was a threat and how deep it was. It wiped itself after discovery only leaving the same behavior after.

      I can't say where I found it. I will say that their Sys Admin couldn't remote brick the device. They were upsetti spaghetti that I found something and used a little trick to bypass some of the security.

      I'm not going to say that a portable firewall/router with custom settings will stop everything but it can buy some time or perhaps stop the vPro kill signal.

      This was somewhere during the early Covid Years and the closest thing I could find to the capabilities of it was something that was used on NK by China. Even Kaspersky wasn't able to get a complete sample.

      TL;DR Thinkpads are to businesses what MacBooks are to Art Schools. The supply chain is sketchy with the company having an odd history of over powered exploits and the firmware is locked down enough to prevent easy analysis. Just be careful with those laptops. I'm not a pro but I'm certainly not a novice. I still don't fully understand how it got past the Sys Admin but I would defend their actions because Certifications displaced useful information in their mind.

      In conversation about a year ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        ease.it
        This domain may be for sale!

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.