Yeah, that's funky - if the last byte is always ends in 03, that sounds non-standard / artificial - static salt? Or is the obvious salting separate from that? Could be someone playing with truncation. Are you at liberty to share a few samples (under separate cover if needed)?
@krypt3ia@patrickcmiller Have you seen anything on how these attacks are different from previous? This sounds like something spammers have been doing for decades.
TIL Gmail assumes any "From" email name of the form "String1, String2" means "Last, First".
So when it shows the "first names only" collapsed list of recipients, any "First M. Last, Title/Honorific" - such as "Trapper John, MD" - shows up as just "MD".
@whitequark Doesn't tarsnap provide the entire encryption layer out of the box, in such a way that not even the provider has access to your encryption keys?
(So if you're someone who can't roll their own encrypt-before-sync layer, tarsnap takes care of that for you)
@robertatcara As someone who personally discovered and fixed Y2K bugs that would have had significant real world impact, it is disturbing to hear someone propagate this myth [that it was a "big fuss about nothing"]. And it is a myth.
The testing methodology insured that these impacts were not hypothetical. At my company, the testing was performed by actually rolling the clock forward to test systems to see what would happen. For example, I discovered that every ATM in the state of Alaska operated by my company would have locked up until a PROM chip was swapped. Someone had to fly all over the state to proactively swap the chip beforehand, to avoid significant customer impact.
And that was just one story. I personally oversaw investigation and fixes for other hardware and software at that company that would have failed.
And that was just my company. I spoke with others in IT at that time with similar stories. And that was just the people I knew.
So no, it wasn't "a big fuss about nothing" - and saying so is both dangerously revisionist, and disrespectful of the work it took to prevent real impacts.
The hardest part about refuting Y2K disinfo is how many problems were fixed quietly, in part to mitigate risk of ligitation (negligence, etc.). People have stories they can't tell.
At this point, I think enough years have passed that a formal amnesty - to encourage companies to disclose just how bad some of the problems were - would be in our historical best interest.
SREs BORN IN THA 90'S THATS UNDER 25 CAN'T SCRIPT CAN'T DD THEY DON'T WANT TO ADMIN NOTHING. ADMINS THAT'S 31 & OVER GET IN RELATIONSHIPS WITH THEM & WONDER WHY PLATFORMS AIN'T WORKING THAT'S BECAUSE ALL YOUNG SREs WANT TO DO IS REDUCE TOIL, SMOKE WEED, EMBRACE RISK, MANAGE CHANGE, MERGE TO PROD, READ HOT CACHE, CHARGE THEY PCARDS, GET BLUEBLOCKER GLASSES TWERK, BE MULTI CLOUD, EAT BUDDHA BOWL'S, WASH THEY LANYARD IN THA SINK, CRY TAKE SELFIES AND POST S--T ON MASTO CUZ THEY TWITTER NEVER ON
Just doing my undue diligence.ISP vet, password cracker (Team Hashcat), security demi-boffin, YubiKey stan, public-interest technologist, AK license plate geek. Husband to a philosopher, father to a llama fanatic. Views his.Day job: Ent Sec Arch for a quad-play Alaskan ISP.Obsessed with security keys: techsolvency.com/mfa/security-keysMy 2017 #BSidesLV talk "Password Cracking 201: Beyond the Basics":youtube.com/watch?v=-uiMQGICeQY&t=20260sProfile photo: White 50-ish man with big forehead, short beard, and glasses, looking pleased in front of a display of Alaskan license plates.Banner photo: 5 rows of security keys in a wall case.Blocked inadvertently? Ask!Am I following a dirtbag? Tell me!Followed you out of the blue = probably stole you from follows of someone I respect.#NonAIContent#hashcat #Alaska #YubiKey #YubiKeys #WebAuthn #FIDO #LicensePlatesP.S. I hate lottery / advance-fee scammers with the heat of 400B suns.❤️:⚛👨👩👧🛡🙊🌻🗽💻✏🎥