Notices by buherator (buherator@infosec.place)
-
Embed this notice
buherator (buherator@infosec.place)'s status on Sunday, 03-May-2026 20:51:05 JST
buherator
@sj chaotic alignment was lacking so I created a chart -
Embed this notice
buherator (buherator@infosec.place)'s status on Thursday, 02-Apr-2026 04:25:29 JST
buherator
AI company once again fails to understand how the Internet works
RE: https://mastodon.cloud/@slashdot/116330548519902234 -
Embed this notice
buherator (buherator@infosec.place)'s status on Wednesday, 04-Feb-2026 22:40:41 JST
buherator
@bagder People probably pay less attention than you think (this is a general rule of thumb of mine), they may still assume there is monetary reward even without H1. IMO you should give it some time. In conversation from infosec.place permalink -
Embed this notice
buherator (buherator@infosec.place)'s status on Wednesday, 28-Jan-2026 00:49:46 JST
buherator
RCECoaster, an exploit for Rollercoaster Tycoon 1999
https://github.com/RickdeJager/RCECoasterIn conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Tuesday, 30-Dec-2025 19:35:56 JST
buherator
[RSS] Blind trust: what is hidden behind the process of creating your PDF file?
https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/In conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Saturday, 27-Dec-2025 02:37:28 JST
buherator
@GossiTheDog Maybe you are confusing MariaDB with MongoDB in their relation to MySQL? In conversation from infosec.place permalink -
Embed this notice
buherator (buherator@infosec.place)'s status on Sunday, 14-Dec-2025 21:48:14 JST
buherator
This is beautiful. I've been looking at this for 5 hours now. In conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Monday, 24-Nov-2025 11:51:36 JST
buherator
@d_olex Good question, but I'd argue that bytecode solves existing problems, while in case of LLM/blockchain I mostly don't see that. Also, isn't JIT specifically a thing to improve performance, meaning less resource consumption? A related observation is that many use-cases for LLMs can probably be solved much cheaper, today. E.g.: better IDE features; more QA for web search results; better education so people can write and understand an email. In conversation from infosec.place permalink -
Embed this notice
buherator (buherator@infosec.place)'s status on Thursday, 20-Nov-2025 21:53:55 JST
buherator
[RSS] Remotely crashing the Spooler service
https://incendium.rocks/posts/Remotely-crashing-spooler/In conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Monday, 22-Sep-2025 05:31:16 JST
buherator
@inthehands @timbray my first thought too, but if electron is compromised obsidian would not be among our primary concerns (esp. because according to this policy they would likely not update before the incident is noticed). So I think electron is more of an attack surface problem than a supply chain one. In conversation from infosec.place permalink -
Embed this notice
buherator (buherator@infosec.place)'s status on Monday, 08-Sep-2025 21:33:02 JST
buherator
@h0ng10 @micahflee This is a fairly common mistake too and causes a lot of bullshit work for security teams. A banner string (*especially* in case of Apache HTTPd) doesn't mean anything, so unless you can demonstrate the presence of a vulnerability this is nothing (aka PoC||GTFO).
(edited) In addition the cited CVE-2024-38476 requires a *malicious backend* to be exploitable:
https://devco.re/blog/2024/08/09/confusion-attacks-exploiting-hidden-semantic-ambiguity-in-apache-http-server-en/In conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Tuesday, 02-Sep-2025 21:22:41 JST
buherator
@GossiTheDog @MisuseCase I mean CTXS stock In conversation from gnusocial.jp permalink -
Embed this notice
buherator (buherator@infosec.place)'s status on Tuesday, 02-Sep-2025 20:47:58 JST
buherator
@GossiTheDog @MisuseCase Neat! It'd be cool to show threats drive down product use predictably! Stocks on the other hand seem pretty stable, so I still don't know what this all tells about the market... In conversation from gnusocial.jp permalink -
Embed this notice
buherator (buherator@infosec.place)'s status on Tuesday, 02-Sep-2025 20:32:48 JST
buherator
@MisuseCase @GossiTheDog I also think this is the true cause of the decline, vulns probably just correlate (evidence: every other product with frequent ItW vulns) In conversation from gnusocial.jp permalink -
Embed this notice
buherator (buherator@infosec.place)'s status on Tuesday, 19-Aug-2025 11:21:16 JST
buherator
Can You Write A Web Server in PURE BASH?! (no socat, no netcat, no external tools) 🍿
https://www.youtube.com/watch?v=L967hYylZucIn conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Friday, 01-Aug-2025 02:43:59 JST
buherator
@jschauma maybe that's why furries are overrepresented in reliable IT projects? In conversation from infosec.place permalink -
Embed this notice
buherator (buherator@infosec.place)'s status on Tuesday, 17-Jun-2025 02:51:22 JST
buherator
[oss-security] CVE-2025-4748: Erlang/OTP 17.0–28.0.0 absolute-path traversal in zip:unzip/zip:extract
https://www.openwall.com/lists/oss-security/2025/06/16/5
Exquisite bug!In conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Wednesday, 28-May-2025 21:12:33 JST
buherator
[RSS] Inside GitHub: How we hardened our SAML implementation
https://github.blog/security/web-application-security/inside-github-how-we-hardened-our-saml-implementation/In conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Sunday, 18-May-2025 04:59:41 JST
buherator
This could be us but you vibe coding
https://suberic.net/~dmm/projects/mystical/README.html
h/t @neauoireIn conversation from infosec.place permalink Attachments
-
Embed this notice
buherator (buherator@infosec.place)'s status on Thursday, 15-May-2025 04:47:07 JST
buherator
"Are Pinky and the Brain still trying to take over the world? Because at this point I'm willing to hear them out." In conversation from infosec.place permalink