Seer of the tapes! Knower of the episodes!

  • 0 Posts
  • 57 Comments
Joined 1 year ago
cake
Cake day: July 3rd, 2023

help-circle








  • “If lawmakers want to rein in the harms of social-media platforms, targeting just one under the guise of national security ignores an entire industry predicated on surveillance capitalism. Like all popular platforms — including those that Meta and Google own — TikTok collects far too much user data. But banning a single platform will not address the privacy problem that’s rotting the core of the entire tech industry.

    If domestic social media is collecting dangerous amounts of personal info about Americans, then foreign social media under who are subject to the laws of adversarial nation-states should be seriously concerning.

    The matter of domestic social media will have to be addressed by a completely different law because it cannot be addressed by a law similar to this new one. People who bring up domestic social media in discussions of this law are completely missing the point.






  • Even the researcher who reported this doesn’t go as far as this headline.

    “I am an admin, should I drop everything and fix this?”

    Probably not.

    The attack requires an active Man-in-the-Middle attacker that can intercept and modify the connection’s traffic at the TCP/IP layer. Additionally, we require the negotiation of either ChaCha20-Poly1305, or any CBC cipher in combination with Encrypt-then-MAC as the connection’s encryption mode.

    […]

    “So how practical is the attack?”

    The Terrapin attack requires an active Man-in-the-Middle attacker, that means some way for an attacker to intercept and modify the data sent from the client or server to the remote peer. This is difficult on the Internet, but can be a plausible attacker model on the local network.

    https://terrapin-attack.com/







  • As its name suggests, LogoFAIL involves logos, specifically those of the hardware seller that are displayed on the device screen early in the boot process, while the UEFI is still running. Image parsers in UEFIs from all three major IBVs are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now. By replacing the legitimate logo images with identical-looking ones that have been specially crafted to exploit these bugs, LogoFAIL makes it possible to execute malicious code at the most sensitive stage of the boot process, which is known as DXE, short for Driver Execution Environment.

    So, does disabling the boot logo prevent the attack, or would it only make the attack obvious?