Ahh the joy of moving...

On the plus side, I found an old VHS recording of one of the benefit shows did while in college.

Here's a snippet of a guitar solo (circa 1989-1992) with prog-metal band Raymaker at Berklee College, benefiting the Pine Street Inn homeless shelter.

From 12am to 5-6am I would be at MIT hacking in the Athena clusters... the rest of the time shedding (practicing/studying).

Nowadays I actually need sleep!

youtu.be/M_wGstWn45o

Mudge boosted

Here's the Debian Project's statement about the arrest of Dmitry Bogatov, a Debian Maintainer who worked in the Debian Haskell group and currently maintains several packages for command line and system tools. He was arrested by Russian authorities, and Debian has removed his keys from their servers in case they're compromised. debian.org/News/2017/20170417

Fascinating to consider North Korea's missile efforts aimed at delivering a nuclear EMP rather than traditional nuclear ordnance.

Explode high in the air w/o requiring the precision or re-entry capability of traditional ICBMs.

Changes whole flavor of the aperiodic missile launches from NK into Sea of Japan.

Interesting writeup / sources:

israelnationalnews.com/News/Ne

Great Frank Rieger writeup:

medium.com/@frank_rieger/some-

Have fun planting virus signatures in strange places that touch remote disks somehow/somewhere.

Example:

Change your mail sig to:
X5O!P%@ap[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Or send it in a browser var, as a password (quickly find the sites that don't encrypt passwords), send to open syslogs, etc.

The some AV actually delete/quarantine the file (weblogs, mailspool, {u,w}tmp etc.)!

What are your ideas?

Inspired by: sec.cs.tu-bs.de/pubs/2017-asia

Off topic for infosec... but...

Gonna miss my BJJ friends and family in Boston.

Here's the serious photo they took with me... and then here's the one right afterwards where they jumped me and choked me out. It was all fun and games but notice that Andy (bjj black belt behind me) actually has a serious choke in place, hence how red in the face I'm getting. It was only a few more moments before... thud!

Love my friends :)

BTW - if you're into exploit/RE, I honestly encourage trying some BJJ!

Mudge boosted

Brilliant <thing on other network we don't talk about> by @Mudge:

twitter.com/dotmudge/status/85

"This is a brilliant tactic. There are so many others like this because the AV community keeps thinking this is a one-move game... Kudos!"

That definition of the strategy of the AV community is absolutely perfect. Depth: zero.

Mudge boosted

So, we are currently invading mastodon.social on two fronts - French social media, and the migration of from twitter :P

We should probably make @Gargron 's life easier and help the guy out; patreon.com/user?u=619786

Please boost! (it's the new RT, right?)

I really appreciate the work of the Broadcom exploit by P0 (cool that Halvar gets a shoutout)!

Constructive observation:

I wish people writing exploit-reports would start with the reveal or outcome and *then* show how they got there.

Too often the author takes the reader on the full journey from the the start. The problem is that the author already has end-result context but the reader does not.

The reader, at the end, is forced to re-parse earlier elements when they get the final context.

Mastodon

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!