In other words, to disagree well you must first understand well. You have to read deeply, listen carefully, watch closely. You need to grant your adversary moral respect; give him the intellectual benefit of doubt; have sympathy for his motives and participate empathically with his line of reasoning. And you need to allow for the possibility that you might yet be persuaded of what he has to say.
I need to desolder a usb connector off a teensy board. Any hints on how to do tihs best? I should probably get the hot air station from the fablab for this job...
I should upgrade this mailserver tonight...
The business squad: A boss, a project manager and the expert.
My other car is a well funded public transit system
And now: ☕️
Dear mainling list manager maintainers: it would be an awesome feature if you would include a 'permalink' to the mail archives if it exists to each mail, either in the footer or in an X-Header so I can link to it from my mail reader.
To be fair, while WPA2 being broken a bit does quite distract from the fact that after your router there is a rather hostile place called the internet where every spook and big corp of this planet is rather interested in your traffic.
Industry strength mitm proxies and DPI equipment kinda make the 'hacker in your home network' look like lil' bobby tables from next door who accidentally ran a little script he found on pastebin.
Even if there's no WPA2 flaw and you patched everything: use E2E!
I wonder how many years it will be before a majority of Android devices will be updated to fix the WPA2 key reinstallation flaw.
Periodic reminder of the absurdity of allowing vendors to distribute known trivially-exploitable software without being held to any level of liability: https://www.emptywheel.net/2017/09/14/software-is-a-long-con/
Gah schon wieder Reifen kaputt, nehmt doch die Hipster Räder neben meinem Schrottbike ey
gah I am a short attention span developer today...
@ckeen 1/2 I've been investigating on that. for the last two hours (procrastination, procrastination)
Seems you are exposed to this UDP vulnerability only if you use udp_recv() call with the MSG_PEEK flag.
After adb'ing my /system/bin phone directory and greping the source code of these binaries, I only found 1 potentially vulnarable software: dnsmasq ( https://github.com/guns/dnsmasq/blob/fe3d87f8ccd942f4478efdfbc3a7ca5aeedcc0d9/src/dhcp-common.c#L46 )
DNSMasq is alive only while tethering a connection (it is used as a DHCP server).
So I guess you are safe as long
I would appreciate a nice cup of coffee
I will probably need a dumb phone without wifi... or a linux kernel for that.