Alexander Nasonov is a user on mastodon.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

Alexander Nasonov @alnsn@mastodon.social

By combining ASLR, NOEXEC, CFI, SafeStack, and the other hardening techniques, #HardenedBSD provides a pretty hostile environment for exploit authors. That's not to say exploitation is impossible; rather, it becomes much more difficult and time consuming.

3/3

From Jasper and Theo:

"""> Thanks to Ben Gras of VUSec for sharing an early version the research paper
> with us. More details will be made public soon as 'tlbleed'.

Thanks for saying that Jasper. And thanks to Ben for getting the paper to us.

As demonstrated in the commit message, we hesitate to pass on more information. That remains Ben's thunder in Vegas.
"""

Blackhat, Aug 4-9.
blackhat.com/us-18/briefings/s

"Our TLBleed exploit successfully leaks a 256-bit EdDSA key from libgcrypt (used in e.g. GPG) with a
98% success rate after just a single observation of signing operation on a co-resident hyperthread and just 17 seconds of analysis time."

blackhat.com/us-18/briefings.h

“Why should any of us trust intel® after this” — Theo de Raadt

‼️
On June 20, an EU committee will vote on an internet-destroying copyright proposal that'll censor everything from Tinder profiles to Wikipedia: boingboing.net/2018/06/07/than

Folks in the EU: European Parliament Members need to hear from you! changecopyright.org

Todd Mortimer just landed his mitigation work (aka -fret-protector) into -current, and enabled by default.

marc.info/?l=openbsd-cvs&m=152

For the record, etsh-5.0.0 - etsh.io/src/ - is now available .. See also github.com/JNeitzel/v6shell/re .. #opensource #ancient #UNIX #cli #v6shell #etsh

Yes, it runs on your favourite #BSD too (or it should). I've only tested it on #OpenBSD and #NetBSD myself.

Matthew Dillon about spectre/meltdown: Show more

As 's de-facto wifi maintainer, I first learned about this WPA problem in June. A simple patch was provided which I could commit with slight modifications.

The original embargo was already 2 months long, and then extended again for 2 months.

The generall public (you) were left in the dark about this for at least 4 months.

This is a very sad state of affairs. It takes the industry much too long to apply a simple patch.

My tor relay is down because OneProvider doesn't bother to check why my server is faulty. I suspect bad RAM.

So, at Defcon there was a demo of a safecracking 'bot - neat little gizmo.

But that has spawned a few dismissive takes; amongst 'em, twitter.com/ncweaver/status/89

Mr. Weaver's kind of missing the point a bit with how this sort of thing works - yes, these consumer 'safes' are absolutely trivial to crack open with a crowbar or a hammer and cold chisel. But that's not the point here.

just switched the system compiler for amd64 and i386 to .

this includes the compiler used for ports.

(note: we still use the gnu ld. lld is a different step)

"for nearly a year, Google was hiding ProtonMail from search results for queries such as ‘secure email’ and ‘encrypted email’." protonmail.com/blog/search-ris #Linux #Google