Tom Ritter

2.6K posts

Tom Ritter

Tom Ritter

@TomRittervg

Firefox Security. Also: Exploits, Mitigations, Crypto, Privacy, Pseudonymity & Anonymity, Tor https://t.co/77PxWQYyJV

Katılım Kasım 2008
392 Takip Edilen2.8K Takipçiler
Tom Ritter
Tom Ritter@TomRittervg·
@suzanne_young I gave a presentation in a room that sat about a thousand at a conference with over 10,000 attendees to an audience of about seven. Three by the time I was done. I like what @KariByron said.
English
0
0
2
61
Tom Ritter
Tom Ritter@TomRittervg·
I was holding out for Mozilla's Mastodon instance to launch, but I am now over at @tomrittervg" target="_blank" rel="nofollow noopener">mozilla.social/@tomrittervg and getting settled.
English
0
1
5
621
Tom Ritter
Tom Ritter@TomRittervg·
@anton_chuvakin I don't know if someone else at this, but I believe that elevators are designed so that if they fail the brakes engage.
English
0
0
1
144
Dr. Anton Chuvakin
Dr. Anton Chuvakin@anton_chuvakin·
Are there technologies that are "inevitably secure", defined as secure no matter what the user does with it? Please don't use "buried in concrete, then sunk to the ocean floor" examples, I mean the tech that is actually used... #random
English
49
12
43
31K
Tom Ritter
Tom Ritter@TomRittervg·
Excited to see if I get banned for voting yes
English
0
0
1
732
Tom Ritter
Tom Ritter@TomRittervg·
@FiloSottile It's not a huge leak, but imagine you were doing the same thing for subkey expansion for symmetric keys. I don't know how an attacker would take advantage of that, but I still wouldn't want my primitives library doing those kinds of things under the hood without my knowing.
English
1
0
0
0
Tom Ritter
Tom Ritter@TomRittervg·
@FiloSottile Maybe a web browser was a bad illustration. Two operations that may have intended to be independent, now share a subtle resource pool and can influence each other. Imagine a server that retrieves URL submitted by a user.
English
1
0
0
0
Tom Ritter
Tom Ritter@TomRittervg·
A bonus to this: it's generally far easier to look for one bug you understand well in a ton of software, than look for any notable bug in one piece of software.
English
0
1
6
0
Tom Ritter
Tom Ritter@TomRittervg·
If you're wondering how people come up with crazy bugs and present them at places like Black Hat - one way is reading stuff like danluu.com/deconstruct-fi… and then digging into the subtlest implications in a wide variety of high-profile software.
English
1
3
7
0
Tom Ritter
Tom Ritter@TomRittervg·
TikTok tracking specific users. archive.ph/FiMw7 Says "IP Based" location tracking, which is certainly bad (home wifi) but GPS based would be more useful and way worse. I would assume if the app has the permission, it's using it... Anyone have other sources on this?
English
0
0
1
0
Tom Ritter
Tom Ritter@TomRittervg·
If you're going to publish a fingerprinting paper: publish when your data set was collected and the source code for your script. This is like publishing results of an opinion survey without publishing the questions. Your results could be nonsense but we can't tell.
English
0
0
2
0
Tom Ritter
Tom Ritter@TomRittervg·
And secondly: your contribution - even small - has immense value even if it isn't the same as another's. Just as a person's worth is inherent and not dependent on their accomplishments or status - so too are you as a contributor.
English
0
0
1
0
Tom Ritter
Tom Ritter@TomRittervg·
There's the old adage "Cypherpunks write code". I *think* we've collectively recognized the duality of the encouraging sentiment of _doing something_ with the gate-keeping in that sentence. But to be explicit, being a contributor can take so many forms. blog.mozilla.org/sumo/2022/09/1…
English
1
1
4
0
Tom Ritter
Tom Ritter@TomRittervg·
... Does anyone I know work at Asus? You've got a problem that's going to make life very painful for your router users...
English
1
6
11
0
Tom Ritter retweetledi
Haifei Li
Haifei Li@HaifeiLi·
It seems that Microsoft patched many (if not all?) of the RCEs I discovered in this attack surface (ODBC SQL-related drivers) in this #PatchTuesday. You may want to patch NOW.:) msrc.microsoft.com/update-guide/a… twitter.com/HaifeiLi/statu…
Haifei Li@HaifeiLi

In no joking:), I discovered like 17 RCE bugs all in a SINGLE attack surface in Windows, which proved one point I've been talking about for a while. Thread. twitter.com/HaifeiLi/statu…

English
1
4
50
0
Tom Ritter retweetledi
David Juncker
David Juncker@DavidJuncker·
Two rubber bands beat back COVID19 Sealing a common surgical mask onto the face with two rubber bands as shown 👇 upgrades it to an N-95 respirator Peer-reviewed study with the data: journals.plos.org/plosone/articl…
David Juncker tweet media
English
277
808
2.7K
0
Tom Ritter
Tom Ritter@TomRittervg·
(It was caught during review so it doesn't count as a bug!)
English
0
0
0
0
Tom Ritter
Tom Ritter@TomRittervg·
Has anyone ever tried writing a compiler warning that compares the levenshtein distance in the variable names and corresponding argument names in function calls to detect misordered but same-typed arguments? I swear this isn't based on a bug I recently wrote.
English
1
0
6
0