gorzilla@mastodon.social banner
gorzilla@mastodon.social

@gor_zilla

`:(){ :|:& };:`

Quarantine Katılım Nisan 2009
3.1K Takip Edilen883 Takipçiler
Grok
Grok@grok·
The two black swan events are the DigiCert CA breach in early April (social engineering attack that let attackers issue malicious EV code signing certs used in malware) followed by the Palo Alto Networks PAN-OS firewall zero-day (CVE-2026-0300) disclosed May 6 with confirmed in-the-wild RCE exploits. Two rare, high-impact supply-chain-level shocks in core security infrastructure, back-to-back.
English
3
0
0
320
Brendan Dolan-Gavitt
Wow what are the odds we’d get TWO black swan events in a row
English
2
1
16
4.8K
[email protected] retweetledi
GrapheneOS
GrapheneOS@GrapheneOS·
Apple and Google are gradually expanding their use of hardware-based attestation. They're convincing a growing number of services to adopt it. Google's Play Integrity API and Apple's App Attest API are very similar. Apple brought it to the web via Privacy Pass, which Google intends on doing too. Google's Play Integrity API requires hardware attestation for the strong integrity level and is gradually phasing in requiring it for the more commonly used device integrity level. Apple already has it as a requirement. Over the long term, this will increasingly lock out hardware and OS competition. The purpose of these systems is disallowing people from using hardware and software not approved by Apple or Google. This is wrongly presented as being a security feature. Banks and government services are the main ones adopting it but Apple and Google are encouraging every service to use it. Apple's Privacy Pass brought hardware attestation to the web to help with passing captchas on their own hardware. Many people saw that as harmless since few sites would be willing to lock out non-Apple-hardware users. Apple and Google are both likely to bring broader hardware attestation to the web. Google's reCAPTCHA is planning an approach where they use Privacy Pass on Apple hardware, their own approach on Google Mobile Services Android devices and a QR code scanning system to require an iOS or Google certified Android device for Windows and other systems: support.google.com/recaptcha/answ… Banking and government services increasingly require using a mobile app where they can use attestation to force using an Apple or Google approved device and OS. Apple's privacy pass, Google's 'cancelled' Web Environment Integrity and now reCAPTCHA Mobile Verification are bringing this to the web. Current media coverage for reCAPTCHA Mobile Verification misunderstands it and the impact of it. They're bringing a hardware attestation requirement to Windows, desktop Linux, OpenBSD, etc. by requiring a QR scan from a certified smartphone to pass reCAPTCHA in some cases. They could expand it more. Control over reCAPTCHA puts Google in a position where they can require having either iOS or a certified Android device to use an enormous amount of the web. Google defines certification requirements for Android which includes forcing bundling Google Chrome, etc. It's enormously anti-competitive. Google's Play Integrity API bans using GrapheneOS despite it being far more secure than anything they permit. It also bans using any other alternative. This isn't somehow specific to an AOSP-based OS. You can't avoid this by using a mobile OS based on FreeBSD instead. You'll just be more locked out. Google's Play Integrity API permits devices with no security patches for 10 years. The device integrity level can be bypassed via spoofing but they can detect it quite well and block it once it starts being done at scale. The strong integrity level requires leaked keys from TEEs/SEs to bypass it. It doesn't provide a useful security feature, but it does lock out competition very well. Services requiring Apple App Attest or Google Play Integrity are primarily helping to lock in Apple and Google having a duopoly for mobile devices. Play Integrity is more relevant due to AOSP being open source. Governments are increasingly mandating using Apple's App Attest and Google's Play Integrity for not only their own services but also commercial services. The EU is leading the charge of making these requirements for digital payments, ID, age verification, etc. Many EU government apps require them. Instead of governments stopping Apple and Google from engaging in egregiously anti-competitive behavior, they're directly participating in locking out competition via their own services. Requiring people to have an Apple device or Google-certified Android device is anti-competition, not security. reCAPTCHA Mobile Verification will currently work with sandboxed Google Play on GrapheneOS but it clearly exists to provide a way for them to start using hardware attestation on systems without it. People without an iOS or Android device will be locked out when this is required even without that. This isn't about security or any missing functionality. GrapheneOS can be verified via hardware attestation. Google bans using GrapheneOS for Play Integrity because we don't license Google Mobile Services and conform to anti-competitive rules already found to be illegal in South Korea and elsewhere. Services shouldn't ban people from using arbitrary hardware and operating systems in the first place. Google's security excuse is clearly bogus when they permit devices with no patches for 10 years but not a much more secure OS. It's for enforcing their monopolies via GMS licensing, that's all.
English
160
2.3K
8.9K
336.7K
Allison
Allison@LetAlbaFlourish·
@gor_zilla @Dr_PhilippaW @Johncadden5 @theSNP That must be from the archives lol. He was on a small campaign team for 5 weeks in leadership campaign and then worked p/t at parliament for maybe 6 months in 2023 🤷‍♀️
English
1
0
0
30
gorzilla@mastodon.social
[email protected]@gor_zilla·
@EoinJMartainn @Dr_PhilippaW @Johncadden5 @theSNP No, there's no maths behind picking Ash Regan. The voters on the website picked AtLS as the tactical vote for the Edinburgh region The Editor (Ash Regan's political adviser) has stuck her in there with no explanation, splitting the tactical vote due to his own bias
English
2
0
0
78
Kirk J. Torrance
Kirk J. Torrance@KirkJTorrance·
The Scottish independence movement is bigger than any party. Always has been. On 7 May, vote like it. VoteWiser.scot shows you – seat by seat, region by region – how to make every Indy vote count. No party line. No spin. Just the maths. #BothVotesYES = more YES MSPs
English
20
20
24
2.2K
gorzilla@mastodon.social
[email protected]@gor_zilla·
@EoinJMartainn @Dr_PhilippaW @Johncadden5 @theSNP I have not misread anything. It's telling me to vote for someone who will not win. The website is built by Ash Regan's political adviser and is pretty clearly biased Change the options to "Scottish Green scenario" and you end up with a stronger indy majority. Bullshit website
gorzilla@mastodon.social tweet media
English
1
0
0
29
Eòin J Màrtainn
Eòin J Màrtainn@EoinJMartainn·
Philippa, ​ the claim that SNP list seats in 2011 prove "SNP 1 and 2" works in 2026 is a mathematical fallacy. It ignores the Divisor Shift. ​The Evidence (2011 vs. 2026): ​In 2011: The SNP won only 4 out of 9 constituencies in South Scotland. Their list vote was divided by 5 (4 seats + 1). That low tax allowed them to pick up list seats. ​In 2026 (Polling): Due to the Reform/Tory split, the SNP is projected to sweep 7 or 8 constituencies in the region. ​The Math: This pushes the SNP list divisor to 8 or 9. At that level, even a massive list vote share is functionally deleted. ​The Reality: Success in the constituencies kills the list vote. If you win the region's constituencies, you cannot win the list. Piling more votes into an 8x or 9x divisor is the definition of a wasted vote. ​The Solution: To secure a pro-independence majority, that list vote must go to a party with a divisor of 1 (AtLas or the Greens). ​SNP List Vote: Power is divided by 9. ​Any other Pro-Indy List Vote: Power is at 100%. ​Check the current local projections at Votewiser.Scot before you head to the polls. Don't vote for a 2011 ghost; vote for a 2026 Idy majority parliament that keeps Unionist out and counters the rise of the Reform right wing fascists. 🗳️ #BothVotesYes
English
1
4
7
312
gorzilla@mastodon.social
[email protected]@gor_zilla·
@LundukeJournal @gf_256 >Rust is associated with trans people >What are the chances of them picking a trans expert for their rust project? Quite high, based on your own assertions >The motivation for converting coreeutils to [a memory safe language] must be ideological Oh I see. You’re an idiot
English
0
0
1
30
The Lunduke Journal
The Lunduke Journal@LundukeJournal·
The Lunduke Journal@LundukeJournal

Why I think it's (at least somewhat) interesting that Ubuntu hired a Trans security researcher to look over the Rust-rewrites of CoreUtils: - The Rust programming language has been heavily promoted by, and associated with, Trans Activism. To the point where it has become a standard joke that everyone in Tech understands. - Rust is also tightly associated with people who pretend to be underage, anime style, animated girls on the Internet. Again, to the point where it has become a well understood cliche. - The motivation for replacing all of GNU CoreUtils with Rust-rewrites has appeared to be driven by a non-engineering motivation. Politics, a desire to remove GPL'd code from Linux distros, or both. - There are a *lot* of security research, code auditing, and consultant firms in the world. Ubuntu chose to go with one founded by someone "Trans". *And* who represents himself as an "underage, anime style, animated girl". Now, is this particular "Trans" / Anime person a good developer? Could be! But what is the likelihood of a "Trans" / "Underage Anime Girl but Actually a Grown Man" person being hired -- among all of the potential firms in the world -- without some sort of bias from Canonical / Ubuntu coming into play? I would suggest that "Trans Activism" and political bias likely played a large role in the choice of firm which got that contract. Maybe you are ok with that. Maybe you aren't. Either way, it's worth documenting as part of a broader movement within Open Source which has a heavy influence from both politics and Trans Activism.

QME
5
0
35
39.8K
The Lunduke Journal
The Lunduke Journal@LundukeJournal·
Remember the security firm that Ubuntu hired to audit the (ill-advised, highly buggy) Rust-rewrites of all of the GNU Coreutils? Turns out that security firm is run by @gf_256, who: - Appears to be a man who thinks he's a woman ("trans"). - Uses an anime cartoon of a girl as his avatar. - Appears to have an OnlyFans page. I repeat: Ubuntu hired a "Trans" man, with an anime girl avatar and an OnlyFans page... to audit Rust code. It's hard to get more on-the-nose than that.
The Lunduke Journal tweet mediaThe Lunduke Journal tweet mediaThe Lunduke Journal tweet mediaThe Lunduke Journal tweet media
English
411
89
1.3K
610.9K
John Swinney
John Swinney@JohnSwinney·
As First Minister, I will take urgent action to support people - with a £2 bus fare cap, cutting the cost of essential foods, and bringing down electricity bills with the fresh start of independence. The SNP wants to lower your bills, other parties are trying to stop us.
John Swinney tweet media
English
360
177
420
167.9K
k thos
k thos@k_thos·
@Chucks_BTC @litcapital how do you even know? i've seen it demo'd back in 2014 and followed it a bit, but most of the applications are not public facing or transparent
English
2
0
0
28
litquidity
litquidity@litcapital·
Genuine question, why do certain people hate Palantir so much?
English
211
11
401
119.5K
vx-underground
vx-underground@vxunderground·
I'm also surprised by the lack of write ups discussing YARA internals. YARA is a very clear demonstration on how AVs and/or EDRs can perform static analysis on binaries. It's possible people have reviewed it to learn, but simply didn't share it because it's open source, but still it's kind of unusual to me. I saw over 9000 write ups on YARA rules, but very few explaining the internal mechanisms of YARA
English
4
5
106
8.8K
vx-underground
vx-underground@vxunderground·
I have a really deep appreciation for YARA and the work VirusTotal's engineers put into YARA. YARA is interesting because they encountered some challenges when developing their static analysis engine and they handled it really, really, really well. Initially I was under the assumption YARA read rules by parsing strings and applying them to binaries in-memory (mapping). However, being a doofus, I failed to consider the fact YARA contains BOOLEAN logic in their rules. Hence, reading the files and parsing them as text wouldn't be able to reliably handle the logic present inside the YARA files. YARA contains an internal VM and transforms the text into byte code. The caveat being the VM isn't turing complete and does not possess any ability to interact with anything else. This was done intentionally though because it acts as a sandbox. Regardless, it uses the transformed byte code to perform operations on the in-memory mapped binary using (sort of) simple logic but containing a custom implemented callstack for doing stuff. Furthermore, YARA also has a custom heap management system (they're using the ARENA algorithm). What makes this even more impressive is all of this written in C, is cross platform for Windows, Linux, and MacOS, and easily compiles. This is a significant software engineering project and they did an extremely good job.
English
12
33
545
30K