GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Royce Williams (tychotithonus@infosec.exchange), page 3

  1. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 03-Oct-2024 15:47:42 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Erk - sorry!

    In conversation about 8 months ago from infosec.exchange permalink
  2. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Wednesday, 02-Oct-2024 23:11:32 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc massscan may be useful reference code:

    https://github.com/robertdavidgraham/masscan

    In conversation about 8 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
      GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
      TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. - GitHub - robertdavidgraham/masscan: TCP port scanner, spews SYN packets asynchronously, scanning e...
  3. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 27-Sep-2024 02:46:08 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Here I'm just referring to everyday "I want to delete just this one message" interaction

    In conversation about 8 months ago from gnusocial.jp permalink
  4. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 27-Sep-2024 02:45:38 JST Royce Williams Royce Williams

    As a:

    Gmail user

    I want to:

    be allowed to still interact with the UI to perform deletes on messages while the list of message is actively being refreshed

    so that:

    the email list shifts just as I'm clicking, deleting the wrong email, but then the results vanishing so quickly that I may not even notice that I deleted the wrong one

    In conversation about 8 months ago from infosec.exchange permalink
  5. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 26-Sep-2024 22:52:09 JST Royce Williams Royce Williams

    Could be a feature: less itchy ... and a new look!

    In conversation about 8 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/204/170/690/736/830/original/5652e224c3ae4ad0.png
  6. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 26-Sep-2024 04:57:58 JST Royce Williams Royce Williams
    in reply to
    • lapo
    • Ryan Castellucci :nonbinary_flag:

    @lapo @ryanc Very reasonable for the what3words use case ... but may get tricky as the target keyspace gets larger. Short wordlist for something like passwords turns into 7 or more words to get enough keyspace. And the "humans can keep 5 to 9 things in short-term memory" means that rehearsal of 5 things to try to commit it from short-term to long-term keeps memorization manageable for a greater number of users.

    In conversation about 8 months ago from infosec.exchange permalink
  7. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 26-Sep-2024 03:54:09 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc I see your point - though personally, I'd rather ask them to learn a couple of new words, than ask them to remember 7 words to approach equivalent keyspace.

    In conversation about 8 months ago from gnusocial.jp permalink
  8. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 26-Sep-2024 03:51:25 JST Royce Williams Royce Williams

    (To be clear, we're talking about truly "must be memorized" secrets: the "initial" passwords to your password manager, your AD / VPN login, etc.)

    These NIST principles:

    • "length is more important that complexity"

    • "forced rotation is bad"

    ... are a start, but they are all outdated proxies for the only true password principle:

    • "uniqueness is more important than anything"

    This uniqueness s not terribly hard. A five-word random passphrase from a 20K+ dictionary, with no other requirements:

    • is globally unique for most practical purposes
    • is longer than every platform's minimum
    • is infeasible to crack for most threat models¹
    • can be memorized without a ton of effort

    And if you're dealing with a system that enforces other complexity, just apply the same complexity every time. This is safe because the strength of the password comes from the number of combinations. Capitalizing the first word, and appending 1 and an underscore is what I do to meet naive complexity. And I'm totally fine sharing that with the world because that's not what makes my passwords strong.

    And if the platform has a length maximum, it's usually not one that requires memorization, and the password can just be set to random 15 ASCII chars and stored in your password manager.

    tl;dr Give your users a password manager, and teach them to make random passphrases for their must-be-memorized secrets. Anything else is wasting time, teaching them things that are already outdated.

    ¹This is 3x1021 combinations. Worried about nation states or aliens? Use a bigger wordlist ... or just add one more word. Instantly makes it 20K+ times harder to crack (6x1025).

    In conversation about 8 months ago from infosec.exchange permalink

    Attachments


  9. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 19-Sep-2024 02:44:08 JST Royce Williams Royce Williams

    Odd that Gmail doesn't have a "warn when link text uses a domain that doesn't match the link" feature. This seems trivial to implement?

    In conversation about 9 months ago from infosec.exchange permalink
  10. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 19-Sep-2024 02:44:07 JST Royce Williams Royce Williams
    in reply to
    • baloo

    @baloo Fair point. Sure wish the click-tracking frameworks all had an easy "BYO subdomain" feature so that small shops could easily make in-domain redirects easy.

    In conversation about 9 months ago from infosec.exchange permalink
  11. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Wednesday, 18-Sep-2024 03:52:18 JST Royce Williams Royce Williams
    in reply to
    • Wendy Nather
    • Patrick C Miller :donor:

    @patrickcmiller This was really good @wendynather - so articulate and practical!

    In conversation about 9 months ago from infosec.exchange permalink
  12. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Monday, 09-Sep-2024 06:41:15 JST Royce Williams Royce Williams

    In a world where adversarial reconstruction of social/influence network propagation is likely, I imagine things like "demure/mindful" are like radioactive dye -- added to trace where it goes.

    Or maybe a flex - to prove to others where it can go.

    In conversation about 9 months ago from infosec.exchange permalink
  13. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Monday, 09-Sep-2024 03:07:31 JST Royce Williams Royce Williams
    • Thomas 🔭🕹️

    @thomasfuchs Wow, I had no idea.

    https://www.reddit.com/r/8BitGuy/comments/qr7edg/comment/jl2u9gq/

    In conversation about 9 months ago from infosec.exchange permalink
  14. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 05-Sep-2024 08:02:30 JST Royce Williams Royce Williams
    in reply to
    • 🆘Bill Cole 🇺🇦

    @grumpybozo Part of the less-ethical sales-pressure API is to push social/guilt buttons to incent giving in. You very likely did nothing to trigger it (other than saying no). I wouldn't give it another thought.

    In conversation about 9 months ago from gnusocial.jp permalink
  15. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 03-Sep-2024 07:59:38 JST Royce Williams Royce Williams
    in reply to
    • Richard "mtfnpy" Harman (he/him)

    @xabean No immediate hits - permuted case and leet for both 'Yealink' and 'YealinkPhone', and appended and prepended all sorts of stuff (all possible 4-char suffixes, etc.) ... nothing so far

    In conversation about 9 months ago from infosec.exchange permalink
  16. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 03-Sep-2024 07:59:38 JST Royce Williams Royce Williams
    in reply to
    • Richard "mtfnpy" Harman (he/him)

    @xabean Depending on sensitivity, Hashes.com has a bounty / escrow system (free). Or you could upload it as a 'user list' to HashMob. Or you could let me take a ... crack at it (2x 4090s). :D

    Edit: a third option, if you know hashcat and Docker, is to just rent a chunk of GPUs through vast.ai or similar.

    In conversation about 9 months ago from infosec.exchange permalink

    Attachments

    1. Decrypt MD5, SHA1, MySQL, NTLM, SHA256, MD5 Email, SHA256 Email, SHA512, Wordpress, Bcrypt hashes for free online
      Decrypt and crack your MD5, SHA1, SHA256, MySQL, MD5 Email, SHA256 Email, and NTLM hashes for free online. We also support Bcrypt, SHA512, Wordpress and many more.
    2. Domain not in remote thumbnail source whitelist: vast.ai
      Rent GPUs | Vast.ai
      from @vast_ai
      Reduce your cloud compute costs by 3-5X with the best cloud GPU rentals. Vast.ai's simple search interface allows fair comparison of GPU rentals from all providers.
  17. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 03-Sep-2024 07:59:37 JST Royce Williams Royce Williams
    in reply to
    • Richard "mtfnpy" Harman (he/him)

    @xabean What's in the other /etc/shadow?

    In conversation about 9 months ago from infosec.exchange permalink
  18. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 31-Aug-2024 14:13:49 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc If I have, I've totally spaced it and it will be as fun as the first time? Link me!

    In conversation about 9 months ago from gnusocial.jp permalink
  19. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 30-Aug-2024 13:24:17 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Looks great! Subtitles are a nice touch!

    In conversation about 9 months ago from infosec.exchange permalink
  20. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 27-Aug-2024 21:49:06 JST Royce Williams Royce Williams
    in reply to
    • Will Dormann

    @wdormann I even opened a ticket for too-narrow grabbable window edges on the Linux side. The response I got was "we're not changing that, there's a workaround -- hold down the ALT key and right click when you're dragging near that edge". So now I have to remember which OS I'm on every time I need to do this. It's just so ... unnecessary.

    In conversation about 9 months ago from infosec.exchange permalink
  • After
  • Before

User actions

    Royce Williams

    Royce Williams

    Just doing my undue diligence.ISP vet, password cracker (Team Hashcat), security demi-boffin, YubiKey stan, public-interest technologist, AK license plate geek. Husband to a philosopher, father to a llama fanatic. Views his.Day job: Enterprise Security Architect for an Alaskan ISP.Obsessed with security keys:techsolvency.com/mfa/security-keysMy 2017 #BSidesLV talk "Password Cracking 201: Beyond the Basics":youtube.com/watch?v=-uiMQGICeQY&t=20260sFollowed you out of the blue = probably stole you from follows of someone I respect.Blocked inadvertently? Ask!Am I following a dirtbag? Tell me!Photo: White 50-ish man w/big forehead, short beard, & glasses, grinning in front of a display of Alaskan license plates.Boosts not about security ... usually are.Banner: 5 rows of security keys in a wall case.#NonAIContent#hashcat #Alaska #YubiKeys #LicensePlatesP.S. I hate advance-fee scammers with the heat of 400B suns❤️:⚛👨👩👧🛡🙊🌻🗽💻✏🎥🍦🌶?

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          92920
          Member since
          29 Jan 2023
          Notices
          106
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.