Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Cocoa Crispies
Jul 20, 2001

Vehicular Manslaughter!

Pillbug

flakeloaf posted:

baseball: a sport where looking in a certain direction is cheating if you look without your eyes

what kind of sam neill rear end motherfucker looks without eyes

Adbot
ADBOT LOVES YOU

ate shit on live tv
Feb 15, 2004

by Azathoth

BangersInMyKnickers posted:

The emergency 5x power button click to disable biometrics on iOS 11 is designed to help with that though it doesn't help if you're getting ganked instead of pulled over with a slow process. Forces all auth back to pin

Interesting. So you basically hit the button on the side 5x, and it disables fingerprints?

Also what do people think about a keypad with randomized nmber locations? Instead of it looking like 1, 2, 3, etc. It's 0-9 in a random location on the screen. Then after every number input, or maybe every 2 numbers, idk, all the numbers randomize again and you put the rest of the PIN in.

Way back in the 80's or so when the first LED keypads were a thing, some DoE keypads were designed that way. The passcode would be 1,2,3,4 but looking at someone putting in that keycode from far away their hand would have to move all over the keypad to put in the code. Seems like that would eliminate shoulder surfing, at the expense of taking longer to unlock the phone.

Not sure if that would be an acceptable trade off for usability or not.

apseudonym
Feb 25, 2011

ate poo poo on live tv posted:

Interesting. So you basically hit the button on the side 5x, and it disables fingerprints?

Also what do people think about a keypad with randomized nmber locations? Instead of it looking like 1, 2, 3, etc. It's 0-9 in a random location on the screen. Then after every number input, or maybe every 2 numbers, idk, all the numbers randomize again and you put the rest of the PIN in.

Way back in the 80's or so when the first LED keypads were a thing, some DoE keypads were designed that way. The passcode would be 1,2,3,4 but looking at someone putting in that keycode from far away their hand would have to move all over the keypad to put in the code. Seems like that would eliminate shoulder surfing, at the expense of taking longer to unlock the phone.

Not sure if that would be an acceptable trade off for usability or not.

Means you type in your pin a lot slower and I worry about that increasing the risk of screen surfing not decrease it since you have to think so long, you'll probably also make your pin shorter as a result of it sucking rear end

Zero One
Dec 30, 2004

HAIL TO THE VICTORS!

Trabisnikof posted:

Does that still delete the saved fingerprints or did I imagine that?

in ios11 you can turn fingerprints off for unlocking the phone but keep it for Apple pay or app store. so you can save your prints and re-enable the unlock whenever.

redleader
Aug 18, 2005

Engage according to operational parameters

ate poo poo on live tv posted:

Interesting. So you basically hit the button on the side 5x, and it disables fingerprints?

Also what do people think about a keypad with randomized nmber locations? Instead of it looking like 1, 2, 3, etc. It's 0-9 in a random location on the screen. Then after every number input, or maybe every 2 numbers, idk, all the numbers randomize again and you put the rest of the PIN in.

Way back in the 80's or so when the first LED keypads were a thing, some DoE keypads were designed that way. The passcode would be 1,2,3,4 but looking at someone putting in that keycode from far away their hand would have to move all over the keypad to put in the code. Seems like that would eliminate shoulder surfing, at the expense of taking longer to unlock the phone.

Not sure if that would be an acceptable trade off for usability or not.

we're going to be doing a digital version of this soon to some sites for ~pci compliance~ reasons lol

Midjack
Dec 24, 2007



ate poo poo on live tv posted:

Way back in the 80's or so when the first LED keypads were a thing, some DoE keypads were designed that way. The passcode would be 1,2,3,4 but looking at someone putting in that keycode from far away their hand would have to move all over the keypad to put in the code. Seems like that would eliminate shoulder surfing, at the expense of taking longer to unlock the phone.

they're referred to as "scramble pads" and are uncommon even in government installations. they randomize on powerup and every retry rather than every digit, though.

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.
oh, so basically the inspiration for the office 2003 ui?

vOv
Feb 8, 2014

Zero One posted:

in ios11 you can turn fingerprints off for unlocking the phone but keep it for Apple pay or app store. so you can save your prints and re-enable the unlock whenever.

this isn't new in ios 11, it's what i have set up on my phone

spankmeister
Jun 15, 2008






ate poo poo on live tv posted:

Interesting. So you basically hit the button on the side 5x, and it disables fingerprints?

Also what do people think about a keypad with randomized nmber locations? Instead of it looking like 1, 2, 3, etc. It's 0-9 in a random location on the screen. Then after every number input, or maybe every 2 numbers, idk, all the numbers randomize again and you put the rest of the PIN in.

Way back in the 80's or so when the first LED keypads were a thing, some DoE keypads were designed that way. The passcode would be 1,2,3,4 but looking at someone putting in that keycode from far away their hand would have to move all over the keypad to put in the code. Seems like that would eliminate shoulder surfing, at the expense of taking longer to unlock the phone.

Not sure if that would be an acceptable trade off for usability or not.

This is done on certain crypto gear as well but iirc it is mostly so that the pin pad gets even wear on all the buttons, not so much for shoulder surfing.

Partycat
Oct 25, 2004

Midjack posted:

they're referred to as "scramble pads" and are uncommon even in government installations. they randomize on powerup and every retry rather than every digit, though.

I've used these ( in an arts building of all places ) and they :

- make a loud rear end computer blipping sound whenever you start a new entry or touch it

- have the led keys shrouded in a way that you can't see the numbers if you're not right in front of it

They're pretty cool and reasonably effective when they are controlling mag locked doors or things you couldn't otherwise easily open. Until they can make phone displays which can shift pixels or something for privacy they are still pretty unique.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Zero One posted:

in ios11 you can turn fingerprints off for unlocking the phone but keep it for Apple pay or app store. so you can save your prints and re-enable the unlock whenever.

this has been an option for a long time, I'm doing that right now on iOS 10

Jimmy Carter
Nov 3, 2005

THIS MOTHERDUCKER
FLIES IN STYLE
just grab at your stuff from outside your pants. Y'all should be experience with this by now.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Info on neutering the Intel ME. Apparently this functionality is included and undocumented at the behest of government spec

http://blog.ptsecurity.com/2017/08/disabling-intel-me.html

Zero One
Dec 30, 2004

HAIL TO THE VICTORS!

BangersInMyKnickers posted:

this has been an option for a long time, I'm doing that right now on iOS 10

i only have ios11 now so I couldn't confirm if it was on older versions but it sounds like good news for all

maskenfreiheit
Dec 30, 2004
Remember Superfish?

The Federal Trade Commission Remembers...




FTC slaps Lenovo on the wrist for selling computers with secret adware

quote:

Companies need user "affirmative consent" to preinstall MITM adware, FTC says.

The FTC said Tuesday that it cannot stop computer makers from selling computers that inject ads into webpages to US consumers. The statement covers Lenovo's practice of having sold computers pre-installed with the so-called VisualDiscovery adware developed by a company called Superfish. This adware, which was installed on computers without consumers' knowledge, hijacked encrypted Web sessions that made users vulnerable to HTTPS man-in-the-middle attacks and shared user browsing data with third parties.

I'm pleasantly surprised HN seems to agree with the headline.

Wiggly Wayne DDS
Sep 11, 2010



why would you ever touch hn

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

loving superfish

Wiggly Wayne DDS
Sep 11, 2010



project zero seem to have turned their attention to tor https://bugs.chromium.org/p/project-zero/issues/detail?id=1293

Tor: Linux sandbox breakout via X11 posted:

From inside the Linux sandbox described in
<https://blog.torproject.org/blog/tor-browser-70-released>, it is
still possible to talk to the X server without any restrictions.
This means that a compromised browser can e.g. use the
XTEST X protocol extension
(<https://www.x.org/releases/X11R7.7/doc/xextproto/xtest.html>) to
fake arbitrary keyboard and mouse events, directed at arbitrary
windows. This permits a sandbox breakout, e.g. by injecting keypresses
into a background window.

<https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/Sandbox/Linux#HowdoIprotectmyselffromXexploits>
mentions that the X server is reachable, but it sounds like the author
didn't realize that a normal connection to the X server permits
sandbox breakouts by design.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

Wiggly Wayne DDS posted:

project zero seem to have turned their attention to tor https://bugs.chromium.org/p/project-zero/issues/detail?id=1293

if you want to attack tor, just start memory dumping the tor daemon while you're acting as an hsdir

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano

Lain Iwakura posted:

if you want to attack tor, just start memory dumping the tor daemon while you're acting as an hsdir

you're conflating attacks on end users with attacks on onion services

with the way hidden service descriptors currently work you can, at best, knock them offline (this is fixed in prop 224)

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

ate poo poo on live tv posted:

Interesting. So you basically hit the button on the side 5x, and it disables fingerprints?

Also what do people think about a keypad with randomized nmber locations? Instead of it looking like 1, 2, 3, etc. It's 0-9 in a random location on the screen. Then after every number input, or maybe every 2 numbers, idk, all the numbers randomize again and you put the rest of the PIN in.

Way back in the 80's or so when the first LED keypads were a thing, some DoE keypads were designed that way. The passcode would be 1,2,3,4 but looking at someone putting in that keycode from far away their hand would have to move all over the keypad to put in the code. Seems like that would eliminate shoulder surfing, at the expense of taking longer to unlock the phone.

Not sure if that would be an acceptable trade off for usability or not.

:rip: your muscle memory and your users' interest with it

Shaggar
Apr 26, 2006

ate poo poo on live tv posted:

Interesting. So you basically hit the button on the side 5x, and it disables fingerprints?

Also what do people think about a keypad with randomized nmber locations? Instead of it looking like 1, 2, 3, etc. It's 0-9 in a random location on the screen. Then after every number input, or maybe every 2 numbers, idk, all the numbers randomize again and you put the rest of the PIN in.

Way back in the 80's or so when the first LED keypads were a thing, some DoE keypads were designed that way. The passcode would be 1,2,3,4 but looking at someone putting in that keycode from far away their hand would have to move all over the keypad to put in the code. Seems like that would eliminate shoulder surfing, at the expense of taking longer to unlock the phone.

Not sure if that would be an acceptable trade off for usability or not.

certainly adding it as an available option is easily doable, but options are not apples thing.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

apple hates the freedom to do dumb, lovely things to your phone

Harik
Sep 9, 2001

From the hard streets of Moscow
First dog to touch the stars


Plaster Town Cop

Wiggly Wayne DDS posted:

project zero seem to have turned their attention to tor https://bugs.chromium.org/p/project-zero/issues/detail?id=1293

<effortpost>

this isn't that surprising, i played around with linux-based isolation and it comes down to x (and posix, for that matter) being a relic of a simpler time. that philosophy infects everything desktop related, like sound because for some reason linux still can't do a kernel-based mixer in 2017 so we need 15 competing userspace programs to do it instead.

torpedo demonstrates the most trivial avenue of attack is to code-inject into the browser to do a native socketcall and wander out to the real web outside the proxy configuration. it's embarassing that it even worked, when the most minimal amount of isolation could restrict the browser process to connecting to the tor proxy socket.

as the p0 bug report notes, the next attacks are also obvious - x + pulse are enormous surface areas that are trivial to break out of. this was some "competent security person looks at it, immediately escapes sandbox" level of trivial. pacondom probably needs to be written - looks like pulse daemon, but only passes specific whitelisted controls through.

even with that, you're left with hostile code running in a container of some sort. even with a perfect vm, you're still left with the attacker having full access to everything you've done in tor. browser history, downloads, unsent documents, emails, etc. you can either automatedly exfil interesting things via tor, or just pipe a shell through for more personal inspection. most people will give themselves away at that point, by having something that links their real identity inside their "safe" sandbox.

that's a problem outside tor too, app isolation would prevent the email attachment->cryptolocker or malware in ad network->browser->cryptlocker poo poo you get on the clearweb all the time.

hackbunny
Jul 22, 2007

I haven't been on SA for years but the person who gave me my previous av as a joke felt guilty for doing so and decided to get me a non-shitty av
use tor whonix

Phobeste
Apr 9, 2006

never, like, count out Touchdown Tom, man
also one big threat with the facial recognition stuff for people who absolutely have pictures of you is your parent who thinks you're gay or your partner who thinks you're cheating or whatever. those are just as valid threats as mugging.

hackbunny
Jul 22, 2007

I haven't been on SA for years but the person who gave me my previous av as a joke felt guilty for doing so and decided to get me a non-shitty av

Phobeste posted:

also one big threat with the facial recognition stuff for people who absolutely have pictures of you is your parent who thinks you're gay or your partner who thinks you're cheating or whatever. those are just as valid threats as mugging.

for all the talk of "have a threat model" some people sure love to throw up their hands and jump to the "blackbagged to cia black site" scenario

Shame Boy
Mar 2, 2010

Phobeste posted:

also one big threat with the facial recognition stuff for people who absolutely have pictures of you is your parent who thinks you're gay or your partner who thinks you're cheating or whatever. those are just as valid threats as mugging.

thanks for teaching facebook what i look like and a bunch of information about me despite me not even having an account, mom

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

hackbunny posted:

for all the talk of "have a threat model" some people sure love to throw up their hands and jump to the "blackbagged to cia black site" scenario

If that's a euphemism for "my girlfriend is screaming and crying about how I cheated on her in a dream she had and I long for a CIA kill team to end me" I guess that makes sense.

A Pinball Wizard
Mar 23, 2005

I know every trick, no freak's gonna beat my hands

College Slice
bitches be trippin amirite

Shame Boy
Mar 2, 2010

ha ha ha, women ! ! !

hackbunny
Jul 22, 2007

I haven't been on SA for years but the person who gave me my previous av as a joke felt guilty for doing so and decided to get me a non-shitty av

Volmarias posted:

If that's a euphemism for "my girlfriend is screaming and crying about how I cheated on her in a dream she had and I long for a CIA kill team to end me" I guess that makes sense.

I mean that "phsyical access is game over :smug:" was and is used as a debate ender by people who really should know better

surebet
Jan 10, 2013

avatar
specialist


https://twitter.com/_grendan/status/905844826771476480

Kuvo
Oct 27, 2008

Blame it on the misfortune of your bark!
Fun Shoe

:trumppop:

A Pinball Wizard
Mar 23, 2005

I know every trick, no freak's gonna beat my hands

College Slice

yeah but Hillary probably broke them

Meat Beat Agent
Aug 5, 2007

felonious assault with a sproinging boner
they're not very breit, are they

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
someone should make a 'bannon cannon' that breaks ads

Zikan
Feb 29, 2004

https://twitter.com/cnbcnow/status/905892104999755776

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

oh wonderful

Adbot
ADBOT LOVES YOU

Trabisnikof
Dec 24, 2005

I really want to know what the website application vulnerability was

quote:

Criminals exploited a U.S. website application vulnerability to gain access to certain files. Based on the company’s investigation, the unauthorized access occurred from mid-May through July 2017. The company has found no evidence of unauthorized activity on Equifax’s core consumer or commercial credit reporting databases.

The information accessed primarily includes names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. In addition, credit card numbers for approximately 209,000 U.S. consumers, and certain dispute documents with personal identifying information for approximately 182,000 U.S. consumers, were accessed.

  • Locked thread