GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Royce Williams (tychotithonus@infosec.exchange), page 2

  1. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 18-Jan-2025 02:07:29 JST Royce Williams Royce Williams
    in reply to
    • Bill
    • Ryan Castellucci :nonbinary_flag:

    @ryanc @Sempf I mean, I get that, but in the meantime the blowback still hits the innocent non-sender. As a troubleshooter, I 100% hated silent discard, but as a spam fighter from back in the day, never doing that produced a whole bunch of busy work and harm that was impossible to work around otherwise. (Rejecting early in the connection was of course ideal!). But I've been out of this game for more than a decade ...

    In conversation about 4 months ago from gnusocial.jp permalink
  2. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 18-Jan-2025 02:02:38 JST Royce Williams Royce Williams
    in reply to
    • Bill
    • Ryan Castellucci :nonbinary_flag:

    @ryanc @Sempf That works fine when there are only two SMTP servers involved, but what happens when it is multi-hop?

    In conversation about 4 months ago from infosec.exchange permalink
  3. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 18-Jan-2025 02:02:11 JST Royce Williams Royce Williams
    in reply to
    • Bill
    • Ryan Castellucci :nonbinary_flag:

    @Sempf @ryanc
    It's been awhile since I was in the daily email game, but I assume blowback is still a non-trivial problem, such that silent discard, despite non-compliance, might sometimes be preferable to innocent bystanders receiving blowback? But deciding when to do that must be complicated ...

    In conversation about 4 months ago from infosec.exchange permalink
  4. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 11-Jan-2025 13:03:27 JST Royce Williams Royce Williams

    Recently, I learned that Western Digital has decided to only partially implement the ATA Secure Erase featureset for initial price points for some storage products.

    https://www.westerndigital.com/en-us/solutions/data-security/data-protection

    Specifically, they are withholding the near-instantaneous "Crypto Erase" option (encrypt the entire drive with a strong key, and then discard the key) from some products, offering only "Sanitize Block Erase" (overwrite everything) at the entry-level price point.

    Technically, Block Erase does comply with NIST 800-88 "Purge" level for SSDs, per Table A-8. But it wastes [size-of-drive] writes. And on modern drives, it can take a looong time to overwrite an entire HDD.

    I understand the need to stratify pricing. But just like the "SSO tax" ... making security harder is never better for the ecosystem.

    And by the time most people realize they wanted the better option ... the purchases will have been made (maybe years before), and the folks making the purchasing decision will likely be far removed (in time, org structure, and technical awareness) from the personnel suffering the consequences.

    Bad form.

    In conversation about 5 months ago from infosec.exchange permalink
  5. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 10-Jan-2025 01:52:58 JST Royce Williams Royce Williams
    • Infoseepage

    @Infoseepage Totally. Independent email with phishing-resistant MFA is the only defense -- and you have to be savvy enough to set it up in advance, before you get victimized.

    In conversation about 5 months ago from infosec.exchange permalink
  6. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 10-Jan-2025 01:42:16 JST Royce Williams Royce Williams

    Add Verizon to the list of companies that doesn't make sure that someone controls an email address ... before letting them apply it to their account.

    I am not a Verizon customer.

    Companies are rarely set up to get feedback about required account changes from non-customers.

    (Yes, I'm aware of the other things you can do when this happens)

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/799/356/588/590/476/original/7393ab31ed2898dc.png
  7. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Wednesday, 08-Jan-2025 14:20:13 JST Royce Williams Royce Williams

    I swear every time Mark Zuckerberg ends up in the news and there's a new photo of him ... it looks like it's some different Mark from a different timeline.

    Maybe they have some kind of timeshare agreement across the multiverse.

    In conversation about 5 months ago from infosec.exchange permalink
  8. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Wednesday, 25-Dec-2024 02:07:47 JST Royce Williams Royce Williams
    • Chris Petrilli

    @petrillic Ahahah, indeed - or, maybe even worse, the obligatory:

    https://xkcd.com/979/

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/704/395/901/198/514/original/2950d9438b1cdb3d.png
  9. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Monday, 16-Dec-2024 10:26:25 JST Royce Williams Royce Williams

    There's a special place in Hades reserved for orgs with websites that, when the user uses the browser's "back" button, not only does it damage app state, but also destroys the user's current authentication session, requiring them to log back in.

    In conversation about 6 months ago from infosec.exchange permalink
  10. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 13-Dec-2024 03:32:39 JST Royce Williams Royce Williams

    There are five people at my day job that have the same first and last names.

    TIL they have a permanent / dedicated email-deconfliction chat channel. :mind_blown:

    In conversation about 6 months ago from infosec.exchange permalink
  11. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 10-Dec-2024 07:55:45 JST Royce Williams Royce Williams
    • Michał "rysiek" Woźniak · 🇺🇦

    @rysiek Either way, looks like we'll need a new edition.

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/625/324/617/007/242/original/42d34fed789815cc.jpeg
  12. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Wednesday, 27-Nov-2024 17:25:40 JST Royce Williams Royce Williams
    in reply to
    • Soatok Dreamseeker
    • Jeremy

    @mischif

    (Specifically, bcrypt is better with high user counts, where users can't tolerate high authentication latency. If you have only a few users, and/or they can tolerate authentication lag above a thousand milliseconds ... and you can handle a thundering herd of those ... Argon2, tuned higher, becomes better.)

    @soatok

    In conversation about 6 months ago from infosec.exchange permalink
  13. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 26-Nov-2024 07:36:18 JST Royce Williams Royce Williams

    Potentially unpopular take:

    Attribution is a distraction.

    Most orgs are not mature enough for attribution to actually differentiate response (just like honeypots).

    Layer 8 is obsessed with attribution -- perhaps to make things more dramatic / urgent? -- so it persists.

    So such things get chased, to the detriment of the basics.

    In conversation about 6 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/545/932/598/911/611/original/ae975377af846d8c.png

  14. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 16-Nov-2024 06:51:20 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Bless, curse me now with your fierce tears, I pray.

    In conversation about 7 months ago from infosec.exchange permalink
  15. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 14-Nov-2024 15:55:48 JST Royce Williams Royce Williams

    Since folks seem to be weighing in:

    I'm not interested in Bluesky. I'm interested in building a durable community on its own terms.

    Fool me once.

    In conversation about 7 months ago from infosec.exchange permalink
  16. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Wednesday, 13-Nov-2024 02:59:23 JST Royce Williams Royce Williams

    "Ross Anderson had agreed with his publisher, Wiley, that he would be able to make all chapters of the 3rd edition of his book Security Engineering available freely for download from his website. These PDFs are now available there." 🎉 💔

    https://www.cl.cam.ac.uk/archive/rja14/book.html

    (As noted at: https://www.lightbluetouchpaper.org/2024/11/12/sev3-download/ )

    In conversation about 7 months ago from infosec.exchange permalink

    Attachments


    1. No result found on File_thumbnail lookup.
      3rd edition of Ross Anderson’s Security Engineering now freely available for download
      from Markus Kuhn
  17. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Sunday, 03-Nov-2024 01:29:24 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Oh, definitely! An interesting experimental middle ground would be a modified Xerox PARC / Bell Labs model:

    • everyone has a private office
    • multiple types of communal space
    • everyone lives a short distance from work
    • people know when not to schedule in-person meetings
    In conversation about 7 months ago from gnusocial.jp permalink
  18. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 02-Nov-2024 01:08:02 JST Royce Williams Royce Williams
    in reply to

    @ryanc @JetlagJen

    Accelerated by gender differences in socialization expectations

    In conversation about 7 months ago from infosec.exchange permalink
  19. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 18-Oct-2024 03:53:56 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Levenshtein wardialing in 3 ... 2 ... 1...

    In conversation about 7 months ago from infosec.exchange permalink
  20. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Monday, 07-Oct-2024 22:13:21 JST Royce Williams Royce Williams
    in reply to
    • Patrick C Miller :donor:

    @patrickcmiller Counterpoint:

    https://infosec.exchange/@tychotithonus/113251427429978042

    In conversation about 8 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Royce Williams (@tychotithonus@infosec.exchange)
      from Royce Williams
      I'm ambivalent about the article title and intro (**not** the research) here: https://www.theregister.com/2024/10/02/rpki_immaturity_study/ The scare words initially imply a "moving from no BGP security to some BGP security is problematic because BGP security implementations have bugs" position. No one is making a "moving from HTTP to HTTPS is problematic because HTTPS implementations have bugs" argument. Only in the last paragraph do we get to what the authors actually say: "Did the White House push for the adoption of an immature technology, potentially doing more harm than good?" ... ["probably not" statements] ... "The roadmap of the White House is a huge leap for RPKI, and therefore also for internet routing, to truly mature and meet the expectations of security, reliability, and scalability for production-level deployments across the global internet." Was it a good question to ask? Yes. Did El Reg frame it that way? No. Was this probably for clicks? Yeah. Did it make a bunch of people temporarily confused about RPKI? Probably. 😐
  • After
  • Before

User actions

    Royce Williams

    Royce Williams

    Just doing my undue diligence.ISP vet, password cracker (Team Hashcat), security demi-boffin, YubiKey stan, public-interest technologist, AK license plate geek. Husband to a philosopher, father to a llama fanatic. Views his.Day job: Enterprise Security Architect for an Alaskan ISP.Obsessed with security keys:techsolvency.com/mfa/security-keysMy 2017 #BSidesLV talk "Password Cracking 201: Beyond the Basics":youtube.com/watch?v=-uiMQGICeQY&t=20260sFollowed you out of the blue = probably stole you from follows of someone I respect.Blocked inadvertently? Ask!Am I following a dirtbag? Tell me!Photo: White 50-ish man w/big forehead, short beard, & glasses, grinning in front of a display of Alaskan license plates.Boosts not about security ... usually are.Banner: 5 rows of security keys in a wall case.#NonAIContent#hashcat #Alaska #YubiKeys #LicensePlatesP.S. I hate advance-fee scammers with the heat of 400B suns❤️:⚛👨👩👧🛡🙊🌻🗽💻✏🎥🍦🌶?

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          92920
          Member since
          29 Jan 2023
          Notices
          106
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.