GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Royce Williams (tychotithonus@infosec.exchange), page 4

  1. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 24-Aug-2024 05:10:11 JST Royce Williams Royce Williams
    in reply to
    • Aaron Toponce ⚛️:debian:
    • Ryan Castellucci :nonbinary_flag:

    @atoponce Yes, exactly! ...for sufficiently obscure and esoteric values of "solve".😅 Most people have never even heard of them.

    If they had been universally used from the beginning, CSV wouldn't even be a thing, and plenty of things we do to avoid CSV would also not be things ...

    @ryanc

    In conversation about 10 months ago from gnusocial.jp permalink
  2. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 24-Aug-2024 02:08:42 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Yeah, Definitely pro TSV! When I say CSV out loud, I actually mean TSV in my head. I need to watch that ...

    I'll also have to dig up the post where I grieve for the alternate future where we actually used the actual dedicated field and record separator characters built into ASCII. So much avoidable pain.

    In conversation about 10 months ago from gnusocial.jp permalink
  3. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 24-Aug-2024 01:52:20 JST Royce Williams Royce Williams

    I know this dates me, but ... 80% of the problems I'm solving with jq are caused by using JSON at all ... when a simpler format would have been fine.

    Repeating every verbose field name in each record, when the schema is flat, is often premature "schema might need to be variable someday" optimization.

    When the Rapid7 DNS data was freely available, it was distributed as a one-line-per-stanza JSON file. The first thing I'd do after downloading it was convert it to CSV ... which cut its size by 60%.

    It's like buying a ten-pound box of individually wrapped grains of rice.

    In conversation about 10 months ago from infosec.exchange permalink
  4. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 23-Aug-2024 22:10:07 JST Royce Williams Royce Williams

    Did you that there's a thing called the "Automatic Billing Update" program (ABU), that enables merchants to get notified of your replacement payment card number before it even shows up in your mailbox?

    https://globalnews.ca/news/9763295/little-known-credit-card-program-companies-information/

    Yep, you can guess what the bad guys are doing. They're registering as a merchant and then involuntarily signing people up for nonexistent "subscriptions" ... that their support path mysteriously refuses to let you unsubscribe from:

    https://malwaretips.com/blogs/vigor-vita-cbd-gummies/

    But if you naively report these to your issuer as simply 'fraud', they will just ... issue you a new card. And then the "subscription" will be charged again.

    Many issuer support teams seem be totally unaware of this fraud type. You have to explicitly tell them it's a subscription scam, and ask them block that merchant from using ABU to get your new card number. (That card is lost, but at least the evil merchant won't get the next one).

    (I found this out the hard way, helping some elderly friends, whose cards kept getting mysteriously "compromised". When I realized that an unexpected charge happened before they had even received the new card ... I knew it wasn't just ordinary skimming or phishing.)

    tl;dr When you detect unauthorized charges, ask your issuer to check for ABU and block the entire merchant. Otherwise, you'll be caught in an unending cycle of useless reissuance!

    #ABU #fraud

    In conversation about 10 months ago from infosec.exchange permalink
  5. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 06-Aug-2024 10:09:29 JST Royce Williams Royce Williams
    in reply to
    • jbaggs
    • Dan Goodin
    • Ryan Castellucci :nonbinary_flag:

    @ryanc @jbaggs @dangoodin
    hell hath no fury like a geek scorned ("yeah, but that's not much of a problem in the real world, you're just fearmongering" "oh yeah? let me show you")

    In conversation about 10 months ago from gnusocial.jp permalink
  6. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 01-Aug-2024 02:18:32 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Also your Levenshtein neighbor! :D

    In conversation about 10 months ago from infosec.exchange permalink
  7. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 20-Jul-2024 03:47:16 JST Royce Williams Royce Williams
    in reply to
    • Patrick C Miller :donor:

    @patrickcmiller It's unclear from the article how they're linked - did the bad Crowdstrike push directly cause the Azure outage? Didn't the Azzure issue show up quite a few hours before the Crowdstrike one started visibly hitting orgs?

    In conversation about 11 months ago from infosec.exchange permalink
  8. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Monday, 08-Jul-2024 11:47:45 JST Royce Williams Royce Williams
    in reply to
    • Patrick C Miller :donor:

    @patrickcmiller Huh - the lede is buried in paragraph five:

    "Amazon said it would refund customers $2,350 and give them a $300 Amazon credit. It also said it would refund unused, prepaid subscription fees."

    In conversation about a year ago from infosec.exchange permalink
  9. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Saturday, 06-Jul-2024 08:15:57 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc There's also the house-shoes option, though that's obviously not for everyone!

    In conversation about a year ago from infosec.exchange permalink
  10. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Wednesday, 03-Jul-2024 01:51:41 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Everybody's a literary critic.

    https://en.wikipedia.org/wiki/Purple_prose

    In conversation about a year ago from infosec.exchange permalink
  11. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 25-Jun-2024 03:33:33 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc That's tricky. It's a function both of time, and of the "pressure" of disclosure - the juicier the surprise, the more likely it is to have leaked out into popular culture.

    Miraculously, I managed to avoid spoiling The Crying Game for a decade. Ditto Citizen Kane (to Garret's point). But I think that would have been impossible for The Empire Strikes Back, due to the cultural saturation.

    In the fediverse, CWs are cheap enough that it's relatively easy to have no time limit on spoiler coverage.

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      saturation.in - このウェブサイトは販売用です! - saturation リソースおよび情報
      このウェブサイトは販売用です! saturation.in は、あなたがお探しの情報の全ての最新かつ最適なソースです。一般トピックからここから検索できる内容は、saturation.inが全てとなります。あなたがお探しの内容が見つかることを願っています!
  12. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 20-Jun-2024 23:36:34 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Ah, interesting - I somehow managed to miss out on this phenomenon!

    In conversation about a year ago from infosec.exchange permalink
  13. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 20-Jun-2024 17:00:22 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc I think it must have gone over my head, heh 😅

    In conversation about a year ago from infosec.exchange permalink
  14. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 20-Jun-2024 14:28:47 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Honestly not sure - I use the multiciloumn format exclusively on desktop so I've never tried to solve that one!

    In conversation about a year ago from infosec.exchange permalink
  15. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 20-Jun-2024 07:37:18 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc +5, Isnightful

    In conversation about a year ago from infosec.exchange permalink
  16. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Friday, 26-Apr-2024 01:26:17 JST Royce Williams Royce Williams
    in reply to
    • Patrick C Miller :donor:

    @patrickcmiller I have multiple issues with that article, and with Hive's coverage of password best practices generally:

    https://infosec.exchange/@tychotithonus/112329332902658519

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Royce Williams (@tychotithonus@infosec.exchange)
      from Royce Williams
      @campuscodi@mastodon.social Generally good advice to use passphrases, but that wasn't my take-away from the Hive post. Nothing they present supports that conclusion. First, no one uses bcrypt cost 32 facing a general userbase - it would take more than a day to authenticate! https://gist.github.com/roycewilliams/d231a65288de688b1c0fa27a1822ce53 (Edit: if they mean 32 *iterations* as in bcrypt cost 5 (as @womble suggests), that's at the other end of the spectrum - it's only one factor higher than the minimum allowed by the spec, and is not the default for any implementations - cost 5 is relatively rare, with less than 10% of all bcrypt leaks on Hashmob are cost 5, 75% are cost 10, and 90% are cost 8 or higher). It *is* hashcat's benchmark default, but that in no way qualifies it as the best representative real-world attack target) Further, even if your password has been leaked, even with a hundred GPUs, I can't crack a bcrypt of it "instantly" (even if it's a single hash - and usually it's many hashes being attacked at once, and attack speed increases with each hash!)... unless it's in the top 10 or 100 passwords. Even with my bcrypt-optimized FPGA rig, it'll take *days* for me to even try the first million passwords, let alone the *billions* that have been leaked. The "Password table if your password has been previously stolen, uses dictionary words, or if you reuse it between websites" chart is 100% invalid. Third, rainbow tables are *useless* against bcrypt (or almost any other salted hash, except maaaybe descrypt in some limited forms, because its salt is too small). Also, the statement "the xkcd password is not a randomly generated password" is factually incorrect, amd means that Hive doesn't actually understand the fundamental point of the comic. Also, a general peeve: Hive *refuses* to put the word "random" on the chart itself, despite pleas from the community. Every year, this causes a flood of user confusion - it's *not* going to take a billion years to crack "ImTheProblemItsM3!" They bury this under "Limitations" ("These metrics assume that passwords are randomly generated"), but most users only ever see the graphic. It's irresponsible public comms. Edit: And finally, while argon2 and yescrypt are more parallelization unfriendly, as far as raw bcrypt attack speed is concerned, there is a simple solution for those who need time to migrate to something better: increase bcrypt's work factor. Each increment *doubles* the work necessary. It was built for this.
  17. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Monday, 15-Apr-2024 06:23:52 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc Sure! Adjust visibility to taste (if needed), and lemme know as much context as you've got

    In conversation about a year ago from infosec.exchange permalink
  18. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Thursday, 11-Apr-2024 00:00:20 JST Royce Williams Royce Williams
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc I was getting this for ListUtil.c recently. I don't think I fixed it yet.

    In conversation about a year ago from infosec.exchange permalink
  19. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Tuesday, 02-Apr-2024 07:21:00 JST Royce Williams Royce Williams
    in reply to
    • Sophie Schmieg
    • Ryan Castellucci :nonbinary_flag:

    @ryanc @sophieschmieg

    Yeah, that's funky - if the last byte is always ends in 03, that sounds non-standard / artificial - static salt? Or is the obvious salting separate from that? Could be someone playing with truncation. Are you at liberty to share a few samples (under separate cover if needed)?

    In conversation about a year ago from infosec.exchange permalink
  20. Embed this notice
    Royce Williams (tychotithonus@infosec.exchange)'s status on Wednesday, 20-Mar-2024 23:16:46 JST Royce Williams Royce Williams
    in reply to
    • Krypt3ia
    • Patrick C Miller :donor:

    @krypt3ia @patrickcmiller Have you seen anything on how these attacks are different from previous? This sounds like something spammers have been doing for decades.

    In conversation about a year ago from infosec.exchange permalink
  • After
  • Before

User actions

    Royce Williams

    Royce Williams

    Just doing my undue diligence.ISP vet, password cracker (Team Hashcat), security demi-boffin, YubiKey stan, public-interest technologist, AK license plate geek. Husband to a philosopher, father to a llama fanatic. Views his.Day job: Enterprise Security Architect for an Alaskan ISP.Obsessed with security keys:techsolvency.com/mfa/security-keysMy 2017 #BSidesLV talk "Password Cracking 201: Beyond the Basics":youtube.com/watch?v=-uiMQGICeQY&t=20260sFollowed you out of the blue = probably stole you from follows of someone I respect.Blocked inadvertently? Ask!Am I following a dirtbag? Tell me!Photo: White 50-ish man w/big forehead, short beard, & glasses, grinning in front of a display of Alaskan license plates.Boosts not about security ... usually are.Banner: 5 rows of security keys in a wall case.#NonAIContent#hashcat #Alaska #YubiKeys #LicensePlatesP.S. I hate advance-fee scammers with the heat of 400B suns❤️:⚛👨👩👧🛡🙊🌻🗽💻✏🎥🍦🌶?

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          92920
          Member since
          29 Jan 2023
          Notices
          106
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.