Hector Martin

@marcan42

If it ain't broke, I'll fix it! · 壊れてねぇのに直すぞ!日本語でもOK!

Tokyo, Japan
ಮೇ 2009 ಸಮಯದಲ್ಲಿ ಸೇರಿದ್ದಾರೆ

@marcan42 ತಡೆಹಿಡಿಯಲಾಗಿದೆ

ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್‌ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್‌ಗಳನ್ನು ನೋಡುವುದು @marcan42 ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.

  1. ಪಿನ್ ಮಾಡಿದ ಟ್ವೀಟ್
    ಫೆಬ್ರ 24

    This is how the SHA1 collision PDF format trick works (it's really an embedded JPEG format trick)

  2. 15 ಗಂಟೆಗಳ ಹಿಂದೆ

    btrfs isn't the "next-gen" Linux filesystem, it's the failed-gen. 10 years in and still not stable. Time to ditch it and try something new.

  3. ಫೆಬ್ರ 26

    Looks like fixed this shit in the past but it moved to a different config file. Filed bug #610950 to get it fixed again.

  4. ಫೆಬ್ರ 26

    Seriously, there is *no fucking reason* why an infrastructure package should be making outbound internet connections. The hell.

  5. ಫೆಬ್ರ 26

    What the fuck. Usage reporting by default, behind my back, when running an unrelated command after installing your package is *not* cool.

  6. ಫೆಬ್ರ 24

    You can still find random authentication cookies for sites affected by with a simple Google search... and they work. Scary.

  7. Hector Martin ಹಿಂಬಾಲಿಸಿದ್ದಾರೆ ಮತ್ತು
    • @lorenzoFB

      I write about hackers, information (cyber) security and digital rights . Past , Danger Room. Open DM | 📬 [email protected]

  8. Retweeted
    ಫೆಬ್ರ 23

    The sha1 collision blocks might have been a PDF header, but now we have them...

  9. Retweeted
    ಫೆಬ್ರ 23

    1/ define prefix 2/ compute collision, based on the prefix (it's an identical prefix collision) 3/ append data to make them both valid

  10. Retweeted
    ಫೆಬ್ರ 23

    Make your own colliding PDFs:

  11. ಫೆಬ್ರ 24

    Due to the way the prefix was crafted and the way the PDF format works, this allows you to make two PDF files with different contents.

  12. ಫೆಬ್ರ 24

    You can take the two sets of 320 bytes that were published, append *anything* to both sets, and they will still have the same hash.

  13. ಫೆಬ್ರ 24

    So many people are getting the SHA1 story wrong. With the collision that Google released, *anyone* can create colliding PDFs for *free*.

  14. Retweeted
    ಫೆಬ್ರ 24

    All the amazing crypto attacks in the world, and real security still comes down to someone screwing up memcpy().

  15. ಫೆಬ್ರ 24

    That also means that if you have any apps that use services behind CloudFlare, you need to revoke their authorizations and re-authorize them

  16. ಫೆಬ್ರ 24

    Your passwords only get sent to CloudFlare when you log in, but the tokens get sent *on every single request*.

  17. ಫೆಬ್ರ 24

    Well-designed sites will revoke existing auth tokens on password change, but some won't, and on those, you're screwed.

  18. ಫೆಬ್ರ 24

    If you're changing passwords due to CloudBleed, remember, it's not the passwords that matter, it's the auth *tokens*.

  19. Retweeted
    ಫೆಬ್ರ 24

    shared infrastructure. homogenous soup of resources. no boundaries. the cloud.

  20. Retweeted
    ಫೆಬ್ರ 23

    Cloudflare have been leaking customer HTTPS sessions for months. Uber, 1Password, FitBit, OKCupid, etc.

ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.

Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.

    ಇದನ್ನೂ ಸಹ ನೀವು ಇಷ್ಟಪಡಬಹುದು

    ·