Colin O'Brien

19.8K posts

Colin O'Brien

Colin O'Brien

@InsanityBit

Software Engineer @tines_hq Previously: SWE @Datadog CEO/ Founder of @graplsec SecEng @Dropbox SWE @Rapid7

New York Katılım Haziran 2012
494 Takip Edilen2.4K Takipçiler
TheRearAdmiral
TheRearAdmiral@TRA4669·
@ID_AA_Carmack I've been trying to make my first multiplayer game using QUIC. I just got interpolation, reconciliation, prediction, and lag comp working Do you think QUIC is problematic in a way that I should be using something else?
English
2
0
8
2.1K
John Carmack
John Carmack@ID_AA_Carmack·
It is a shame that the simple act of transferring a large block of data as fast as possible over the internet is not handled effectively by the primitive operating system calls. You either multiplex over parallel persistent TCP connections to combat head-of-line blocking and slow starts, or reinvent reliable delivery and flow control over UDP. QUIC has a lot going for it, but it is a large library (six figure LoC!) and conflates security and performance in a way I don’t love. There is also fundamental information about competition with other processes and link layer congestion that should be useful, but is unavailable to user libraries. You should be able to just write(really_big_buffer) and it is all taken care of for you.
English
122
113
2.6K
164.2K
Brad Spengler
Brad Spengler@spendergrsec·
"the Linux cryptographic subsystem is proactively dropping zero-copy functionality from AF_ALG due to growing security concerns."
Brad Spengler tweet media
English
4
9
91
7.8K
Colin O'Brien
Colin O'Brien@InsanityBit·
@tqbf an os where the maintainers care about security but no one uses it vs an os where the maintainers think security is dumb but everyone uses it
English
1
0
0
25
Colin O'Brien
Colin O'Brien@InsanityBit·
@tqbf neither is secure but at least linux had easy access to grsec at one point, idk that's the best I can come up with to even start a conversation on such a pointless topic lol
English
1
0
0
81
Thomas H. Ptacek
I think my basic thing is, if you have a reasoned, nuanced argument for why you think OpenBSD is more secure than Linux, I'll be like "ok we can just disagree". But if you come in "only 2 remote holes in the default base OS in a long time!" I'm just, like, no.
English
7
0
33
5.2K
Colin O'Brien
Colin O'Brien@InsanityBit·
@dinodaizovi Systems engineering was a more common skillset back then. You can't even subprocess out or sandbox in most common languages without inviting tons of weird bugs. So people don't.
English
0
0
1
209
Dino A. Dai Zovi
Dino A. Dai Zovi@dinodaizovi·
Sometimes it confuses me how the security field today fails to remember why things like least privilege and privilege separation were built into qmail, postfix, and SSH long ago. Then I remember that an astonishingly small percentage of the field today were around back then.
English
21
29
226
16K
Colin O'Brien
Colin O'Brien@InsanityBit·
@dinodaizovi Seems odd that removing read from all suid on a Linux would break anything. I haven't tried it but it feels like it should kinda "just work"?
English
0
0
0
89
Colin O'Brien
Colin O'Brien@InsanityBit·
People are counting the `unsafe` blocks in bun like it's a "gotcha" ("haha ai wrote unsafe") when it's the entire point. They can literally count the problem now.
English
0
0
3
398
Colin O'Brien
Colin O'Brien@InsanityBit·
@zeta_globin You're discrediting a massive, valid field because of a few pop scientists who have capitalized on hype.
English
0
0
4
414
Colin O'Brien retweetledi
Brad Spengler
Brad Spengler@spendergrsec·
Kinda funny that you can literally produce full-grown drinking age adults with master's degrees in the time it takes to improve upstream Linux security
English
0
4
44
3.1K
Colin O'Brien
Colin O'Brien@InsanityBit·
@abh1sek Ah yes, I haven't seen this in quite a while. Thanks for putting it back on my radar.
English
0
0
1
41
Colin O'Brien
Colin O'Brien@InsanityBit·
Can we get sandboxed package managers now??? lol
Aikido Security@AikidoSecurity

Update 5:05 PT: The attack has now expanded well beyond @TanStack and @Mistral. 373 malicious package-version entries across 169 npm package names, including @uipath, @squawk, @tallyui, @beproduct, and more. The malware propagates by stealing your CI credentials and using them to publish new compromised versions. Full IOCs, affected package list, and detection steps: aikido.dev/blog/mini-shai…

English
2
0
2
392
Rami McCarthy
Rami McCarthy@ramimacisabird·
Everyone is tweeting out "use pnpm & set a minimumReleaseAge of 7 days" but don't forget blockExoticSubdeps - which would also prevent the usage of a remote github reference here!
English
18
88
1.2K
162.6K
Colin O'Brien
Colin O'Brien@InsanityBit·
Honestly, this should extend to test harnesses too. I guess it'll take years to get into a good spot but it's very frustrating, none of this is new.
English
0
0
0
55
Colin O'Brien
Colin O'Brien@InsanityBit·
@scriptjunkie1 Weird because Firefox said that they were going to get rid of all of the vulns
English
0
0
0
440
Colin O'Brien
Colin O'Brien@InsanityBit·
@adamgordonbell I'm kinda skeptical tbh. I sort of assume that the dev is just not realizing something about that service, like that it's packing 128bits of specific data for locality reasons etc instead of, as they seem to assume, uuidv4
English
1
0
0
53
Colin O'Brien
Colin O'Brien@InsanityBit·
Everyone's really loving saying "Rust doesn't prevent TOCTOU" lately but uhhhhh, use cap-std? It's very easy to avoid TOCTOU vulns in Rust with almost no effort.
English
0
0
3
454
Colin O'Brien
Colin O'Brien@InsanityBit·
Interesting that claude is reaching right for Kani to verify my rust code. I gave zero indication that it should do that, or even to care about correctness.
English
0
0
1
199