GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Zimmie (bob_zim@infosec.exchange), page 2

  1. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Thursday, 05-Dec-2024 05:13:34 JST Zimmie Zimmie
    • Cory Doctorow
    • Blort™ 🐀Ⓥ🥋☣️
    • evacide

    @evacide @Blort @pluralistic We simply need tech companies to invent a new number you can only use if you believe in truth, justice, and the American way!

    In conversation about a year ago from infosec.exchange permalink
  2. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Wednesday, 04-Dec-2024 07:20:21 JST Zimmie Zimmie
    in reply to
    • David August ❌👑
    • ArchaeoIain

    @ArchaeoIain @davidaugust > Miscarriages of justice can be dealt with by the courts.

    Which courts? Specifically which ones? And where do we go when those fail us? And where do we go when *that* court fails us? It’s not practical to have an infinite series of courts for appeals, so it has to end somewhere. What do you do when the final court is hopelessly corrupt?

    Consider the crime of “felony murder”, which is also known as “not murdering anybody at all”. The fact anybody is in prison over this is inherently a miscarriage of justice, yet it’s very rarely fixed by the courts.

    Edit: looks like the equivalent legal concept in Australia is “constructive murder”. In the US, if you are involved in any way with a felony (even an unwitting accessory) and someone dies (regardless of who or of circumstances), you can be charged with murder. Of course, if you actually kill someone, they charge you with real murder, not with “felony murder”. Stealing as little as $200 is a felony in various states.

    Pardon power is good, and isn’t used nearly often enough.

    In conversation about a year ago from infosec.exchange permalink
  3. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Tuesday, 19-Nov-2024 13:21:04 JST Zimmie Zimmie
    in reply to
    • Hisham
    • Michael W Lucas :flan_on_fire:

    @hisham_hm @mwl People really take the wrong thing away from the trolley problem. It isn’t directly about what you personally would or should do. Instead, it’s like an axis of comparison for ethical frameworks. It’s one of the extremes where differences (and sometimes similarities) between them become more apparent.

    Like how Schrödinger’s cat isn’t saying the cat is both alive and dead, it’s taking a model we have for quantum effects and showing how, when taken to extremes, it produces results which are patently absurd.

    In conversation Tuesday, 19-Nov-2024 13:21:04 JST from infosec.exchange permalink
  4. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Tuesday, 19-Nov-2024 10:09:56 JST Zimmie Zimmie
    in reply to
    • Rich Felker
    • Jørn
    • cR0w :cascadia: :gayint: 🏴‍☠️
    • The_Turtle_Moves

    @cR0w @jornane @The_Turtle_Moves @dalias I share this every time “user education” is brought up as a solution to phishing. It’s the first two lines of an email sent by the security team at my company at the time.

    In conversation Tuesday, 19-Nov-2024 10:09:56 JST from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/506/230/462/216/282/original/594140e7e54058cf.jpeg
  5. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Sunday, 13-Oct-2024 07:52:44 JST Zimmie Zimmie
    in reply to
    • Ryan Castellucci (they/them) :nonbinary_flag:

    @ryanc A fabric which stretches in one direction is said to have “two-way stretch”. A “two-way mirror” is only a mirror from one direction. Almost every instance of a term with “way” in it is mind-numbingly wrong.

    In conversation Sunday, 13-Oct-2024 07:52:44 JST from infosec.exchange permalink
  6. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 12-Oct-2024 04:34:28 JST Zimmie Zimmie
    in reply to
    • ../kajer/.
    • Ryan Castellucci (they/them) :nonbinary_flag:
    • David Mc Carthy

    @ryanc @kajer @davidmc @zesty In that case, if the fuse blows, there’s current.

    In conversation Saturday, 12-Oct-2024 04:34:28 JST from infosec.exchange permalink
  7. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 12-Oct-2024 03:38:45 JST Zimmie Zimmie
    in reply to
    • ../kajer/.
    • Ryan Castellucci (they/them) :nonbinary_flag:
    • David Mc Carthy

    @ryanc @kajer @davidmc @zesty It probably does, just not labeled that way. Current mode is low impedance. The downside is if your multimeter isn’t fused, measuring wall current with current mode will probably show ~15A for about five milliseconds, then your multimeter melts and/or explodes.

    This is the only real downside to the demise of incandescent bulbs. Loose sockets are cheap. You could stick one plus a switch on a board, hook the mystery wire to the switch, the other end of the switch to one terminal on the light socket, and neutral (or earth, if neutral isn’t available) to the other terminal of the socket.

    If the bulb doesn’t light, there’s voltage on the wire, but not much current. If the bulb lights, there’s current.

    In conversation Saturday, 12-Oct-2024 03:38:45 JST from infosec.exchange permalink
  8. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Wednesday, 25-Sep-2024 20:27:51 JST Zimmie Zimmie
    in reply to
    • Lukasz Olejnik
    • DelegateVoid

    @delegatevoid @LukaszOlejnik Upper limits on passphrase length are mostly about closing a possible resource exhaustion vector on the authenticating system. If you hash it all down to 64 bytes, there’s no point dealing with passphrases longer than 128 characters. Further characters don’t add any further entropy, but if you have no upper bound, some knucklehead is going to make your server hash the entirety of War and Peace over and over.

    In conversation Wednesday, 25-Sep-2024 20:27:51 JST from infosec.exchange permalink
  9. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Monday, 16-Sep-2024 16:28:47 JST Zimmie Zimmie
    • Les Orchard
    • Alexander Hamizdat for Harris
    • Jay
    • nex

    @lmorchard @WhiteCatTamer @nex @alexhammy It would be really challenging. For example, I have no idea how you would make the word “house” sound blue.

    In conversation Monday, 16-Sep-2024 16:28:47 JST from infosec.exchange permalink
  10. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Wednesday, 11-Sep-2024 08:06:07 JST Zimmie Zimmie
    in reply to
    • clacke
    • Thomas Depierre
    • Leszek
    • Richard Hendricks

    @Di4na @clacke @makdaam @hendric That doesn’t seem at all the case to me. The Therac-25 report had quite a few big lessons.

    • Data races can exist anywhere shared mutable state exists. This was poorly understood at the time. Language people have taken this to heart with copy-on-write data structures, static analysis for control flow, and more recently with proof-based data access validation as seen in Swift 6. This kind of issue is why those capabilities exist, and why you shouldn’t just turn them off to silence warnings.
    • Software interlocks are strictly worse than hardware interlocks. They have more opportunities to fail in non-obvious ways.
    • Safety-critical software has become a much more formalized discipline, finally matching the rigor of real engineering. For example, techniques were developed to prove a given program is free of bugs by proving it exactly matches the behaviors defined by its formal specification (no undefined behaviors, and no missing behaviors).
    • Reported issues should be treated as real until you can prove what happened. Part of the reason the Therac-25 hurt so many people is the company brushed off the early issue reports.

    A lot of the company-culture problems the incidents exposed are still major issues today. The company thought their software was perfect, and they didn’t include it in their analysis of potential failure modes. They didn’t have any independent review of their code. They shipped straight to production (the hardware and software were never tested together outside customer installations). They didn’t document error codes and didn’t differentiate between minor errors and safety-critical errors.

    In conversation Wednesday, 11-Sep-2024 08:06:07 JST from gnusocial.jp permalink
  11. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Sunday, 01-Sep-2024 23:57:19 JST Zimmie Zimmie
    in reply to
    • Jerry 🦙💝🦙
    • SunTzuCyber

    @jerry @SunTzuCyber

    In conversation Sunday, 01-Sep-2024 23:57:19 JST from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/057/934/680/096/985/original/a3d276d495ccd4a7.jpeg
  12. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Sunday, 25-Feb-2024 00:51:42 JST Zimmie Zimmie
    in reply to
    • Ryan Castellucci (they/them) :nonbinary_flag:

    @ryanc IPv4 numbers are really poorly specified. I personally use notations other than dotted decimal (especially hex integer) much more than I use dotted decimal because it’s so much easier to do math with them. For example, they greatly simplify matching expressions like this. They also help when dealing with networks which aren’t byte-aligned.

    In conversation Sunday, 25-Feb-2024 00:51:42 JST from infosec.exchange permalink
  13. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Tuesday, 09-Jan-2024 04:05:09 JST Zimmie Zimmie
    in reply to
    • AdmFord
    • Oneironaut

    @Oneironaut @admford The visible antenna is either Bluetooth or WiFi. There could be a cell radio we can’t see, but it’s common for these to connect to a separate cell phone hidden a short distance away. That minimizes the risk the skimmer contains information which could be tracked back to the criminal, making it effectively disposable.

    In conversation Tuesday, 09-Jan-2024 04:05:09 JST from infosec.exchange permalink
  14. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 06-Jan-2024 09:06:05 JST Zimmie Zimmie
    in reply to
    • Ryan Castellucci (they/them) :nonbinary_flag:

    @ryanc I’m a fan of FreeBSD, so I’ll point to the Juniper EX2300-24p. 24x1g copper ports with 370W PoE budget, 4x10g SFP+ ports. $100 used.

    In conversation Saturday, 06-Jan-2024 09:06:05 JST from infosec.exchange permalink
  15. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Monday, 11-Dec-2023 08:25:01 JST Zimmie Zimmie
    in reply to
    • mcv

    @mcv I had to fight that fight when Spectre/Meltdown were the shiny new flaws. “We need you to prove the firewalls and routers aren’t vulnerable to Spectre/Meltdown!”

    That whole class of flaw requires the ability to run code on the target system. If somebody who isn’t on my team can run *any* code on our firewalls and routers, we have much bigger problems.

    In conversation Monday, 11-Dec-2023 08:25:01 JST from infosec.exchange permalink
  16. Embed this notice
    Zimmie (bob_zim@infosec.exchange)'s status on Wednesday, 06-Dec-2023 13:21:43 JST Zimmie Zimmie
    • Thomas 🔭🕹️

    @thomasfuchs Gets even more interesting. In the terms of service, they say you must opt out by emailing arbitrationoptout@23andme.com, and if you don’t, you agree to arbitration. They could argue writing only to legal@ (which is the what the “notify us” link does) is not enough.

    In conversation Wednesday, 06-Dec-2023 13:21:43 JST from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.23andme.com
      DNA Genetic Testing For Ancestry & Traits - 23andMe International
      from 23andMe
      23andMe is a saliva-based DNA service. We provide genetic reports on your ancestry, family history and help you connect with your DNA relatives.
  • After

User actions

    Zimmie

    Zimmie

    Dan Kaminsky once said I know how computers work.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          190801
          Member since
          13 Oct 2023
          Notices
          36
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.