Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Dex posted:

more of a gestalt entity, that pays for poo poo

Hey there, paying for poo poo buddy.

Adbot
ADBOT LOVES YOU

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Absurd Alhazred posted:

If it's the company I think it is then it does in fact stay installed, constantly "suggests" that you buy the full anti-virus, and finds problems like "this web browser you never use has some kind of edge-case vulnerability if you are dumb enough to use it, but if you want us to automatically fix it you'll need to buy our full suite."

To follow up here: this vendor's tool was installing itself and being obnoxious, so we have removed it from the program until they remedy that. We do not want to be recommending tools to our users that result in AV software being installed.

Thanks for the report, Absurd!

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

math + commonly used = heuristics

No?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

It is challenging to imagine a more dangerous bug. ring0 RCE, file opening not required...it's gorgeous. Easier and more powerful to exploit than anything malware might otherwise do to infect a machine.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

22 Eargesplitten posted:

TBH in that dude's situation and knowing how likely it would be to lead to the government deciding he was doing unauthorized pen tests, I'd be pretty tempted just to let it go and make it someone else's problem.

Same, and I could fight that suit better than most.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Good, maybe someone will go clear out all my unread notifications.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Cugel the Clever posted:

No--I entered my password on account creation and then it emailed it back to the address I provided. Isn't that particularly awful security policy?

Yes.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

online friend posted:

found your problem

FireEye sure didn't

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

I'd also like "persistent" and "transparent". Maybe "patented".

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

We're gonna need a bigger toxic chemical fire.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

And capture traffic on the target host so you can detect asymmetric blocks.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

PBS posted:

Realistically, what separates lastpass from any other company that I have to place a fair amount of trust in to keep my money/information/etc secure? (If anything beyond the obvious that it stores my passwords for all other services)

If PayPal or your bank get owned, they're going to eat the damages, not you. If LastPass gets owned you might get an apology email. (And as you say, the purpose of the basket is to hold all your eggs.)

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Sickening posted:

The bank doesn't eat anything. The sellers of whatever the unauthorized person bought eats them.

If your bank is breached to the extent that there are customer losses, I'm pretty sure they and their insurers are going to write some cheques.

But let's say they don't: does that somehow oppose the point I was making?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Thanks Ants posted:

You can always MITM your iPhone traffic and see what the app is doing if you require some confirmation that your passwords aren't being sent to some botnet in China.

As long as they're not trying to hide from that, which is not hard to do.

Basically you have to reverse the binary if you want confidence.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

It's much easier to get hostile content into a browser than into an app, and typically that hostile content operates in a more flexible environment (scripting, wide access to system APIs). Faked email, Twitter "viruses", compromised ad networks, takeover of non-https sites on public wifi, site hacking. Even if an app exposes a URL scheme, it tends to be quite narrow.

I think WebBT is fine and necessary, but it's definitely a different security landscape from BT-privileged apps.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

EVIL Gibson posted:

Apps are sort of the reverse. They are much more vulnerable to trusting the client too much/giving way more information than the client app actually needs or is providing.

If I am understanding you correctly, you are considering the web service endpoints that the app talks to as the URL scheme?

No, I'm talking about the way you can launch an fb:// URL on iOS or Android and trigger some action in the Facebook app.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Rufus Ping posted:

or use Signal, which uses exactly the same protocol as WhatsApp (and Google Allo's and Facebook Messenger's e2e modes), and is free, and is open source, and whose users aren't almost exclusively German

And as long as you build from source, you know that you're getting the right thing.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

FeloniousDrunk posted:

This PRNG looks reasonable, but under an MIT license. I'm aiming to keep the whole thing in one file.

So keep it in one file. MIT doesn't preclude that.

Then delete that file.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Rufus Ping posted:

I like to think I provided a decent amount of actual feedback and criticism before taking the piss out of him

Your wind-up was exemplary.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Maneki Neko posted:

You weren't issued a bottle of hard alcohol for your desk during orientation?

That was probably more than 10 days ago, so he or she is due for a refill.

I used to administer a high-visibility bug bounty program ~10 years ago, and I would have given my left pinky to throw the whole mess at HackerOne.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Mustache Ride posted:

I sat in a meeting today, as I have done for many months, asking that 2fa be put on O365. One of the development directors told me today that her team could make their own 2fa solution that could do what the parade of companies my team had brought on were offering.

I stood up, yelled "DON'T ROLL YOUR OWN CRYPTO" and walked out.

Can I drink with you guys too?

I'll buy the first round.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

apseudonym posted:

I get quoted in articles as a senior engineer that's kinda :yotj:

They just mean that you're old.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

What's the Yubi story for the new Macs? Will they do some pass through thing so you can still charge your laptop? Maybe there's a TouchID U2F thing?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Methylethylaldehyde posted:

Was it firewire that had the native impossible to fix DMA issue, or was that something people were afraid of with the new Thunderbolt stuff?

Wasn't Firewire, I'm pretty sure. Didn't VT-D block it entirely?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Can't you just cut the keyboard cable and get access to the USB traces electrically?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Same, but me logging into your account.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

scott/tiger

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

psydude posted:

CLAM DOWN made a good and accurate post.

Not the first time, and god willing not the last.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Every bank I've ever dealt with indemnified against losses from someone compromising your account anyway.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Some people hire folks who only know what you can learn at school, and then teach them on the job. Dozens, perhaps hundreds of new grads get jobs this way every year.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Internet Explorer posted:

I like my vShield agentless AV... works pretty well and doesn't seem to get in the way.

Don't.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Internet Explorer posted:

I know AV is a bit of a joke, but what do you guys do in your environment? No AV across the board? Not even for using-facing systems? I find that hard to believe.

That was the setup at my previous, large, actively-attacked employer.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Also internal segmentation, like requiring 2FA to transit from the corp network to development servers. That came in after someone burned a zero-day to target some of our developers, back when humans still ran Java.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Wiggly Wayne DDS posted:

hostile attacker someone or good red team someone

Not a red team. There was a forensics festival, my whole team was invited. (They were targeting my team specifically.)

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Common sense says you tell your users to always, always call IT for support, and make sure that number is routed to a human 24/7.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Internet Explorer posted:

Oh, tell my users to do something? Problem solved then!

It may not be sufficient, but it's a good idea.

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

flosofl posted:

Sure, but if I'm doing an internal audit or a risk analysis I can only include systems and solutions that are predictable in nature. People exercising common sense or following process would not be one of them.

Your risk analysis has to ignore people, as a class?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

flosofl posted:

Well, no. But I'm concerned with stopping them from being self-destructive idiots, not factoring them in as a layer of security.

So you can't have any process elements in the defense model, it all has to be physics and (bug-free) software?

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

flosofl posted:

I didn't say that, but I'm not relying on "common sense" anymore, am I? I'm constraining behavior through enforceable policy and processes. The people are still an identifiable risk.

But you said you couldn't include anything unpredictable in your analysis, which as you say very much includes people and IME often includes software.

So what is predictable enough to include?

Adbot
ADBOT LOVES YOU

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

flosofl posted:

You're right. You win. I'm done with this stupid argument. Rely on "common sense" if you want.

I'm not suggesting anyone rely on users practicing common sense. My advice was to IT staff, not users at all.

I'm just trying to understand what the components of your analysis are, because I'd always understood such analyses to be about identifying and bounding unpredictability.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply