Pinned toot

On behalf of the community that has long been saying that is fundamentally incompatible with democracy and a graver national security threat than terrorism, I'd like to say:

We fucking told you so!

influence campaigns

family / culture wars

krypteia boosted

Credit where credit is due: yesterday Intel released the Firmware Support Package (FSP) for Coffee Lake generation of CPUs on github. After a request to change the license so it is no issue to distribute for coreboot etc they (Vincent Zimmer & Nathan Desimone) did! This is great news!

Repos on Github:

Coreboot mailing list thread:

I've been a big fan of the U2FZero, an open-source open-hardware U2F usb dongle for those that take "trust no one" seriously.

Anyway, looks like Conor Patrick (developer of the U2FZero) has finalized the design of the new generation key.

Looks like they're releasing it through a kickstarter campaign. I'd definitely wait until you can build and program your own, as the supply chain for these prebuilt devices will be anything but secure.

krypteia boosted

The #French can be a bit extreme with their reactions.

OK, a new #vulnerability has been found in #Intel's #CPU but naming a village #NoIntel to express their views is a bit too much. #Foreshadow

Speculative execution claims another scalp. Seems you can get into SGX (and basically read any L1 cache).

With a President that leans heavily towards Hitler, he's worried about the guy that leans heavily towards FDR. What a fucking schmuck.

krypteia boosted

We've developed a new attack on WPA/WPA2. There's no more complete 4-way handshake recording required. Here's all details and tools you need:

If you're feeling like our politics are hopelessly imbecile in the face of grave national threats, remember that Lincoln (a sitting president, during a Civil War) had to go before the Senate and personally testify that Mary Todd Lincoln wasn't a confederate spy.

This too shall pass.

krypteia boosted
krypteia boosted

Today's BGP hijack of Cloudflare's DNS service to an AS in China demonstrates how using a centralized DNS service is dangerous.

Running a recursive resolver, preferably with DNSSEC validation and enforcement, should help mitigate issues like what happened this morning.

Catching up on news.

, , more , vulnerabilities... Everything is as terrible as I remember.

attack to decrypt and exfiltrate pgp or s/mime encrypted email is pretty hilarious.

Intercept an encrypted email and modify the email to add an HTML image URL directed to your malicious domain. Leave the image tag open (without closed quotes) and paste in the encrypted email and then close the image tag. Most clients will decrypt the text and query the malicious domain looking for an image matching the decrypted text.

This is why we encrypt and authenticate kids.

Apparently declaring to be dead, just because your business model requires it, does not make it so.

Some things are only born posthumously.

krypteia boosted

Presenting Cryptopals Set 8 challenge 6: KEY RECOVERY ON BIASED ECDSA NONCES.

Every DSA signature needs a random nonce, but not every DSA signature truly has one. With even a _bias_ in the nonce, a little linear algebra recovers keys.

Cryptocurrency hot take Show more

krypteia boosted

Masto meta; etiquette Show more

krypteia boosted
krypteia boosted

roses are red
violets are blue
in surveillance capitalism
poem reads you

and shows you ads
for flower shops
and tracks your clicks
and never stops

it cares not about
if privacy's harmed
the money is green
when people are farmed

twitter is cyan
facebook is blue
your friends are the product
and so are you

krypteia boosted


I am toot. You click star, click boostybutton, author find out you exist. Might check you out.

Me bait, you fish.

Honest question for :

How practical is real-time voice synthesis (i.e. to reliably mimic a known target's voice and make it say what you want in a real conversation)? Assuming access to a large sample set (say a Skype scale dataset ;p), it seems like a much easier problem than real-time video fakes.

Anyway, it seems like there is an interesting class of exploits for such tech (from bypassing "your voice is your password" systems to social engineering).

I may do a patent search later.

US Politics Show more

Show more

Follow friends and discover new ones. Publish anything you want: links, pictures, text, video. This server is run by the main developers of the Mastodon project. Everyone is welcome as long as you follow our code of conduct!