Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
surebet
Jan 10, 2013

avatar
specialist


pseudorandom name posted:

interferes with your Right To Repair

also prevents TouchID MITM attacks

apples and oranges, imho

my expectations of repair-ability of a miniaturized consumer product versus a massive piece of industrial equipment worth more than a house is different

plus my security requirements would be higher on a device that i carry out in public

i would like to be able to repair my phone, but i would poo poo a kidney if i was stuck with a drm'ed critical piece of farm infrastructure

between john deer's bullshit and the horrible contracts doled out by food conglomerates it's a wonder farmers even bother anymore

Adbot
ADBOT LOVES YOU

surebet
Jan 10, 2013

avatar
specialist


ate all the Oreos posted:

sounds like you've been brainwashed by modern capitalism into just accepting $800 devices as disposable friend

nah, i cycled through every part for my previous phone at least once and i make my purchase decisions partly based on repair friendliness

electronics manufacturers are flaming shitbags for making their stuff hard to repair (apple is especially guilty here), but i can understand it to a point with space saving & miniaturization

actual industrial equipment should have some lockouts to prevent randoms from poking at everything, but there's no scenario in which i think it's acceptable to both force users to rely exclusively on you and then also refuse any liability

surebet
Jan 10, 2013

avatar
specialist


i'm sure it's not that simple, but why isn't lastpass checking the domain/url of the page it's on before barfing out creds?

surebet
Jan 10, 2013

avatar
specialist


Powaqoatse posted:

what the hell are you doing to your phones you maniac

i'm accident prone, and since i'm not always in an office environment means my gently caress-ups are usually around machinery or concrete floors

also up until recently i was running blackberries, and parts were hilariously cheap, like "cheaper to resurface my display rather than buy screen protectors" cheap

surebet
Jan 10, 2013

avatar
specialist


Chalks posted:

4th result down is entitled "Confidential credit cards and SSNs". Who even has files with titles like that.

every single employer i've have in the last decade has had a well-meaning secretary that didn't want to bother her boss with small purchases and other trivial auth stuff

every. single. one.

it's much easier to have a file with credit card numbers, personal data and what not than to create secondary accounts everywhere w/ power of attorney, issue an extra credit card for office purchases etc

it's always either stored as passwords.txt or in the more fancy outfits, passwords.docx, right on the network

surebet
Jan 10, 2013

avatar
specialist


Shifty Pony posted:

my (federal government) office has apparently been targeted by someone. a bunch of people have been getting phishing emails which are reasonably well disguised to look like they are from our IT department telling people to confirm their password strength (something our IT hammers on all the time) on a linked page.

one of my bosses just forwarded on a "hey tell your employees to not fall for this poo poo" email chain. and right there at the end of it is the offending phishing email with the malicious link still there, intact and (I expect) working.

depending on what it's hosted, either redirect the specific phishing url (or wildcard the domain) to a page under your control that both logs who lands there and displays something to the effect of "stop being idiots, idiots"

that might not help on unmanaged, out-of-network devices (cellphones etc) which do tend to be management (aka higher risk, higher threat) but it at least provides a teachable moment for your internal users

tracking who lands on the page is useful for one on one follow-up later, in my limited it manager experience people respond well to coaching if it's done in a non-blaming way, but ymmv

surebet
Jan 10, 2013

avatar
specialist


no joke i'd consider pissing in the sink instead of playing cocklooker pong

surebet
Jan 10, 2013

avatar
specialist


*groan* i'm having issues with cert issuance for a jira instance running on tomcat & windows server

my desired end result is a java key store file containing my crap

most tutorials or utilities expect linux or at least iis

to add insult to injury, i'm pretty much only able to do a manual validation via dns since letsencrypt can't see my well-known file via http (it 403s) despite it being available and visible

i did end up being able to pull down a cert via acmesharp but i wasn't able to package the crt file into a jks (via portecle) because it didn't know how to injest the crs pem i creted earlier

how the hell do i do this? i have the previously mentioned stuff on the server and i also have a linux vm

surebet
Jan 10, 2013

avatar
specialist


cheese-cube posted:

missed opportunity for triple-combo: 69.66.62.19

late, but fixed

surebet
Jan 10, 2013

avatar
specialist


https://www.youtube.com/watch?v=97biyPDXnto

surebet
Jan 10, 2013

avatar
specialist



ugh, this is going to be me next friday, my sister's clinic did an arguably good thing by allowing new clients to fill out the new patient questionnaire online (instead of having 15 minute bottlenecks at the office) but it's on a plain http wordpress site so it's sketching out people

i think i'm just going to suggest they replace that with a bunch of forms available as pdfs or something so people can fill stuff out at home, but then i'm sure people will start emailing the forms in and that's it's own issue

i guess i could add 10mb of bloat to make them un-emailable

surebet
Jan 10, 2013

avatar
specialist


Shaggar posted:

what your sister's clinic did is a hipaa violation and should be disabled immediately

yup, done as soon as i caught wind of it

although i think it's a pipeda violation, i'm not even sure we have a hipaa-like equivalent in this province

re: having people show up 15 minutes in advance, yeah that never works, so having people show up with their stuff ready to go is really the best possible workflow

they'll eventually spring for a proper forward facing system to have people fill in their info, but for now i'm pretty sure that having a link to a 26mb pdf in the welcome email is a ghetto as all hell but compliant solution

surebet
Jan 10, 2013

avatar
specialist


Punkbob posted:

or you could just wrap it up in ssl?

per the advice i got in this thread (and really, common sense) i'm not doing security related for them, including setting up a server

i'm game to throw in a recommendation here or there and help them understand concepts, but that's it

1) i'm doing this pro-bono to help my sister, but she's working in an established clinic with owners that should know better
2) lol @ the idea of taking on healthcare liability
3) i'm also a patient (gp, neurology) with a bunch of schedule ii stuff prescribed, so extra lol @ the idea of touching a network that has a computer able to issue any kind of prescriptions

that said, if you guys have suggestions of stacks they should look into, i'll gladly relay them

surebet
Jan 10, 2013

avatar
specialist


i should mention that previous recommendations included "do you really need off brand philips hue rgb lightbulbs in the kitchen" and "why oh god why are you straight up giving wifi network credentials to randoms in the waiting room"

surebet
Jan 10, 2013

avatar
specialist


OSI bean dip posted:

xn--e77hhaecegybmf7bpt0a.com

because i can register that domain

lol god drat it



good luck getting someone to type that, but i can see the risk in clickable link form

not sure what the crossover of "people who click on links in weird emails" and "people who have a font stack capable of rendering obscure unicode" is

surebet
Jan 10, 2013

avatar
specialist


Shaggar posted:

well I think the url would be presented as Unicode in the client so it wouldn't look fishy except for the font differences. but then you could probably find a similar font and make it all fit.

🇸🇴🇲🇪🇹🇭🇮🇳🇬🇦🇼🇫🇺🇱.com

surebet
Jan 10, 2013

avatar
specialist


i had to install a font that specialized in wide unicode support to render the text properly

the good news is that with ~120k glyphs it's impossible to have a single otf render everything

surebet
Jan 10, 2013

avatar
specialist


less gaudy version:

surebet
Jan 10, 2013

avatar
specialist


anthonypants posted:

gently caress whoever at microsoft thinks "paste as plain text" needs to be hidden in as many right-click submenus as possible

seconded, i paste a lot of stuff into excel and i hope whoever decided that the default option should be copying all the formatting (and not having a plain text shortcut) stubs their toe everyday

re: unicode domains, not that regex ever solves anything, but why isn't icann or whoever doing a check for visually similar characters? i mean i don't get why anyone should be able to buy googlé.com or googl𝗲.com and gently caress them if they think the proper mitigation is buying thousands of domains

surebet
Jan 10, 2013

avatar
specialist


Volmarias posted:

Not sure if it works on versions of Windows newer than 7 but PureText is a godsend for this kind of bullshit.

neat, i'll try it out, although i'm a bit concerned about stripping out tables and positional formatting

surebet
Jan 10, 2013

avatar
specialist



i'm surprisingly ok with this

surebet
Jan 10, 2013

avatar
specialist


Kuvo posted:

hahah what



confirming both the feature and the funniness

i had a look at my network logs, i can't seem to pinpoint which call returns the auth request, anyone mind enlightening me as to what is happening?

surebet
Jan 10, 2013

avatar
specialist


cinci zoo sniper posted:

looks like mirai's internet of poo poo is now mining buttcoins

i'm the botnet subsidizing itself on a nickel a day

surebet
Jan 10, 2013

avatar
specialist


security fuckup: the poop is trying to touch me edition

pretty sure i previously mentioned the lady that has a similar first name/same last name as me before that keeps using my x.yyyyyy@gmail.com address

over the years i received medical stuff, financial stuff, work stuff, email money transfers, teeth x-rays, privileged government documents, a will, crazy amounts of family pictures and an awesome spaghetti sauce recipe

i try to delete stuff without opening it when i recognize it (like from her alma matter) but screw you lady, we're in the same industry, apart from the divorce lawyer stuff i get the same emails from the same senders, so i'm bound to open some of them

i did reach out a couple times in the past to let her know about this, but since it's only getting worse, it's just easier to burn everything

to the point, she just added me on linkedin in the blind and on the one hand, i kinda feel like i should take her up on it since it'd only be fair she knows who i am at this point, and she'd actually be a relevant professional contact

on the other, i basically have had her complete medical, financial, legal and personal file go through my inbox and i'm concerned this could bite me in the rear end if she gets her identity stolen (by someone else)

what's the best practice here?

surebet
Jan 10, 2013

avatar
specialist


anthonypants posted:

if they're not going to acknowledge you then don't acknowledge them. they probably just mashed the "find linkedin contacts, here is my email address username and password" button and you're in there since you've emailed them.

not the same email, so either she's adding all of us with the same name (~25 in the region) or she connected the dots from our old conversations

like i said my first reflex is to add her, but i'm concerned about liability down the line

surebet
Jan 10, 2013

avatar
specialist


pretty sure it'll do that if requested, not sure if it still does that on it's own

also after reviewing my linkedin counterpart i figure out why i'm getting gov't docs, one of my twins is a freakin' minister so it's possible that i'm dealing with parallel idiocy here

e: i forget the details, but didn't linkedin use goog's sso and took the opportunity to request access to contacts or something?

surebet
Jan 10, 2013

avatar
specialist


Powaqoatse posted:

impersonate her and make some sick remixes for comedy gold

nah i got my identity stolen once (found out on a trip that my card was maxed out because i apparently purchased the services of quite a few escorts in russia)

the closest i came to touching the poop was accept an email money transfer into her bank account, since i knew both the answer to the secret question and where to point the cash, but that would be inviting issues into my life

surebet
Jan 10, 2013

avatar
specialist


Wiggly Wayne DDS posted:

the words "deterrence policy" just got spoken regarding a signed and soon to be released US executive order regarding 'cybersecurity'

that smells of kinetic strike responses

surebet
Jan 10, 2013

avatar
specialist


Midjack posted:

delete on receipt and don't initiate or acknowledge any further contact with her that isn't via your attorney. if she knows you, you are the first suspect when her pii is inevitably compromised

pretty much the plan i settled on, what bothers me is that she's apparently taken on a senior role at a university i'm considering, because of course she did. i guess that's an awkward conversation for down the line.

aaaaaaaaaaaa i guess my life is now inexorably linked to idiots with no opsec

surebet
Jan 10, 2013

avatar
specialist


Last Chance posted:

are you sure you don't have dissociative identity disorder and you actually own both email accounts?

man, i wish

surebet
Jan 10, 2013

avatar
specialist


84k hosts per the malwaretech map, 7 people paid



bitcoin remains the weak link in this whole ransomware thing

e: apparently it's using 3 addresses, so the success rate 28/84k or 0.000̅3%

https://blockchain.info/address/12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
https://blockchain.info/address/13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
https://blockchain.info/address/115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

surebet fucked around with this message at 00:47 on May 13, 2017

surebet
Jan 10, 2013

avatar
specialist


this whole thing apparently scarred a few non-technicals enough to reach out to me about backups, what's the current hotness in terms of archiving? last time i did anything related it was write once, read many lto

surebet
Jan 10, 2013

avatar
specialist


wcry monetization update:



180k detected hits as of right now against 60 transactions on the know addresses used. of those:
- 9 of them were literally idiots throwing cash at the addresses to track them (avg txval of $3.63 & lol avg txfee of $8.36)
- 1 of them was for $235, which is lower than the required $300 unlock bounty
- 35 were within the range of $300
- 15 were above the required bounty, which supposes multiple hits per owner (9x $600, 3x $900, 2x $1200 & 1x $3300) which i'm not sure helps since iirc each machine requires a unique unlock code

so we're looking at a conversion rate of 51/180k or 0.00028̅3%, with a return of about $25k (13˘ per infection), with the usual caveats of converting bitcoin into something useful.

e: how does the worm talk to it's c&c to generate the unlock key, is it via the sinkholed domain? not that i condone paying these idiots, but doesn't that screw the infected people out of the possibility of recovery?

surebet fucked around with this message at 19:50 on May 13, 2017

surebet
Jan 10, 2013

avatar
specialist


Chalks posted:

Yeah, but there have been some instances of "scam" ransomware that just encrypts your poo poo without bothering to have the whole unique key retrieval infrastructure.

Given their 0.000283% conversion rate I wonder how much the faith thing really matters. I mean how many people would pay up without researching whether it works?

I'm kinda surprised the rate is so low, but I guess that reflects the fact that vulnerable systems were mostly clients without any valuable data on them. In the UK reports say there was no data lost from NHS systems at least.

i'd wager it has more to do with the fact that a) good luck running a non-technical through the bitcoin buying and transmitting process and b) who in their mind would punch their credit card info into an exchange suggested by scammers, no matter how (relatively) trustworthy it is

imagining for a moment that they wouldn't get wrecked, if the requested payment was over paypal, i'm sure the conversion rate would be significantly higher. maybe they should try with amazon giftcards or something

surebet
Jan 10, 2013

avatar
specialist


i'm looking forward to the first report of a droidcar plowing into a building trying to catch a pokemans or videos of drivers getting arrested after playing flappy birds at highway speeds

surebet
Jan 10, 2013

avatar
specialist


https://www.youtube.com/watch?v=GB4YgKmKVZc

surebet
Jan 10, 2013

avatar
specialist


apparently some fuckers are trying to kill wcry's kill switch:
https://www.wired.com/2017/05/wannacry-ransomware-ddos-attack/

surebet
Jan 10, 2013

avatar
specialist





aaaaaaaaa there's a lot of commercial results in there too

akadajet posted:

tbf trello isn't really a great anything

it's a great tool to get people into the idea of project management for zero dollars, but you should be trying to move users to something less dumb asap

surebet
Jan 10, 2013

avatar
specialist


a few thoughts on the whole implanted device thing:

"if they're in the same room, they could stab you, therefore"
murdering someone in a more conventional fashion leaves behind clues that are generally well known and understood by forensic investigators. the first wave of murders-by-ssh will probably be understood as device malfunctions, especially if the device doesn't freeze it's state & firmware at the time of death.

this goes double for medical infrastructure that's subject to protest like clinics providing abortion services or hospitals run by/catering to certain groups.

"companies are probably really interested in not getting blamed/sued"
if the first wave is going to be misunderstood as failure, i'm legit concerned that further fuckery will be handled in the same way that auto manufacturer handled some incidents, where some mba geniuses cost benefited recall expenditures versus lawsuits and opted to hide risks from their customers.

if companies aren't held to the highest standards right off the bat, case law and revenue models will form in a way that supports the low security status quo.

i 100% that there are more pressing & systemic issues with healthcare security, but between the boomer cohort entering geriatric care and the proliferation of implantable devices, if manufacturers & providers aren't proactive about security concerns, we're heading towards a critical mass of problems in the next decade

Adbot
ADBOT LOVES YOU

surebet
Jan 10, 2013

avatar
specialist


if someone with a life sustaining implant drops dead today, is there anyone that does forensics on the devices? like i'm sure if dick cheney farted out right now without an obvious cause of death, maybe?

but if joe schmoe pacemaker dude with a couple trustfund kids bites it, is there anything that happens except for a tech that checks to see if the device still powers on?

random stats i pulled from fbi.gov says ~50% of murders committed are done by people who knew the victim, and half of those by immediate family. that's your proximity, and surely at least one of those geniuses are able to gently caress around with a btle stack or whatever.

  • Locked thread