Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
vOv
Feb 8, 2014

Volmarias posted:

You're just training the user to hit the enter key after doing an autofill without reading what it says.

uncheck them by default i guess? though that won't stop users from just blindly clicking everything

Adbot
ADBOT LOVES YOU

vOv
Feb 8, 2014


jtag over usb? what the actual hell

vOv
Feb 8, 2014

i was setting up my new ps4 and it took me like 4 tries to get the password right because it's a 15-character generated one and i couldn't see what i was typing in because of the password entry field

if you're gonna use dots for letters at least let the user unmask it like windows

vOv
Feb 8, 2014

so what happened to the thread, anyway

vOv
Feb 8, 2014

Loving Africa Chaps posted:

Epic troll of Assange Barry O, good job

https://twitter.com/wikileaks/status/819630102787059713

vOv
Feb 8, 2014

Ur Getting Fatter posted:

cloudy with a chance of occasional broadcast storms

a high of 802.11 degrees

vOv
Feb 8, 2014

ate all the Oreos posted:

the javascript and html files are accessing and modifying the registry directly somehow :shepface:

is this normal, do things do this bullshit now I haven't looked at installers in years

windows has a javascript dialect that's intended to be used for scripting and has APIs for loving with the registry. obviously it doesn't work from the browser

vOv
Feb 8, 2014

http://www.thelocal.at/20170128/hotel-ransomed-by-hackers-as-guests-locked-in-rooms

quote:

One of Europe's top hotels has admitted they had to pay thousands in Bitcoin ransom to wizardcriminals who managed to hack their electronic key system, locking hundreds of guests in or out of their rooms until the money was paid.

...

When the hackers got the money, they unlocked the key registry system and all other computers, making them all run as normal again.

Yet according to the hotel, the hackers left a back door open in the system, and tried to attack the systems again.

On the fourth attempt the hackers had however no chance because the computers had been replaced and the latest security standards integrated, and some networks had been decoupled.

The Seehotel Jaegerwirt, which has existed for 111 years, also has another, innovative, trick in store to keep the hackers out for good.

Brandstaetter said: "We are planning at the next room refurbishment for old-fashioned door locks with real keys. Just like 111 years ago at the time of our great-grandfathers."

vOv
Feb 8, 2014

it also doesn't work if someone invites a guest over, then gives the guest the key to have it copied. or just takes a high-res photograph of the key.

vOv
Feb 8, 2014

http://www.wrdw.com/content/news/Washington-Road-billboard-gets-hacked-shows-curse-words-to-describe-jewelry-412169543.html

https://twitter.com/le_keksec/status/825533000318275585

vOv
Feb 8, 2014

ate all the Oreos posted:

shame it seems to have been done by a terrible white nationalist 4channer, kinda taints the whole thing

oh ew

vOv
Feb 8, 2014

the dolphin emulator blog has a post about how they were able to get two games to work. turns out those games had anti-emulation features: they'd stomp all over important memory and then immediately flush the cache to prevent the writes from going through. but since emulators don't emulate CPU cache it'd just crash on Dolphin.

not super sec-related but i thought it was neat

vOv
Feb 8, 2014

Wheany posted:

keep rear end

vOv
Feb 8, 2014


i'm a bit surprised their PRNG is bad enough you can read the state off from a few dozen spins. wonder if they're using a Mersenne twister.

vOv
Feb 8, 2014

LeftistMuslimObama posted:

i mean, most slots players pretty much just robotically jab the spin button until they run out of credits or decide the machine is cold so as long as they can achieve the desired payout ratio the RNG probably doesn't need a ton of entropy assuming you can monitor the floor and catch people doing obviously shifty crap.

yeah that's true, it could be seeded from like time plus PID plus one or two other things

vOv
Feb 8, 2014

ymgve posted:

why are slot machines using PRNGs at all - just have a microphone, a temperature sensor or some optical sensor - the lower bits should provide entropy enough for the system, it's not like it needs more than a few byts of RNG for every spin anyway

if you're really paranoid, just throw the RNG module into a centralized server or something, the slot machines are probably networked anyway

I'm shocked any gambling commission would ever authorize a slot machine that uses any form of PRNG

yeah, way more secure to get all your random numbers over the network

vOv
Feb 8, 2014

OSI bean dip posted:

have been on hiatus from twitter as of late

https://twitter.com/afreak/status/829927734344249345

https://twitter.com/afreak/status/829926867499048966

here's some cool poo poo i did today

i'm the qqqqqqqqqqqqqqqqq

vOv
Feb 8, 2014

flakeloaf posted:

seriously though just log out of your poo poo and put the password in a password safe on dropbox, that's probalby good enough and it doesn't put you in a position where you need to lie to keep someone else from having your passwords to your angsty myspace poetry

would they then ask you for your dropbox creds and the safe password?

vOv
Feb 8, 2014

Volmarias posted:

This has the same problem that FDE systems with alternate passwords have: "no, i don't believe you, show me your real account" even though that's the only one.

the solution i heard once is where you have two alternate passwords, one of which has a bunch of stuff that's really embarrassing (fetish porn or whatever) but not actively compromising

vOv
Feb 8, 2014

ate all the Oreos posted:

lol i unplugged the loving thing and the dots didn't stop

my router has a progress bar that's just updated via setTimeout

vOv
Feb 8, 2014

dragon enthusiast posted:

only kind of a secfuck but somebody on my TL described it as "This transitions into a refrigerator magnet cache poisoning attack"
https://twitter.com/foldablehuman/status/835655192624300032

for those who aren't used to twitter's lovely ui you gotta click the datetime to see the entire thread, which is well worth reading

vOv
Feb 8, 2014

Truga posted:

the s in iot stands for security

vOv
Feb 8, 2014

https://twitter.com/eorden/status/823924775177322497

vOv
Feb 8, 2014

spankmeister posted:

Mine still does.

yeah it still does on android (though not ios because there's no api for that)

vOv
Feb 8, 2014

fishmech posted:

why would it

spankmeister posted:

It uses a security feature of Android, if you block screenshots that means other apps can't access the screen buffer either to potentially steal decrypted messages.

i guarantee you this person wasn't thinking about that

vOv
Feb 8, 2014

A Yolo Wizard posted:

cemu is workin on it (though its kinda a lovely emulator conceptually)

yeah i don't do filez anymore but even if i did i don't know if i'd support a closed-source emulator. though apparently they've said they'll release the source if they stop working on it?

vOv
Feb 8, 2014

the problem isn't how lastpass is detecting password fields. the problem is that the attack worked despite the fact that travis's exploit page was on a completely different domain.

vOv
Feb 8, 2014

hifi posted:

it's in an iframe though

yeah and you can't gently caress with other domains' iframes.

password fields don't have any special protection from JS, you can still get at their contents with .value(), so there has to be something else going on here.

vOv
Feb 8, 2014

pseudorandom name posted:

welp, if I wanted to be a career rapist, I now know who I'd want to be my Ph.D advisor

uh what

vOv
Feb 8, 2014


it's bothering me more than it should that it doesn't play the 'full' song

vOv
Feb 8, 2014

where would you even store signatures or checksums? iirc both storing them next to the data and storing them all off at the end somewhere both have problems

vOv
Feb 8, 2014

moonshine is...... posted:

Regarding the whole ISP's selling browsing history etc, I'm seeing a lot of people recommend a VPN as a solution. What keeps the ISP from just MITMing your traffic?

half the point of a VPN is that the traffic between you and the server is encrypted

vOv
Feb 8, 2014

of course the real question is how to find a VPN you can trust

vOv
Feb 8, 2014

ate all the Oreos posted:

they can see your IP addresses that you're connecting to which is just as good for basically all the sites that matter

e: oh you mean over the VPN? yeah generally you use a different DNS server than your ISP's if you're going over a VPN for that reason

i don't know the current state of dns encryption so it's also possible they could just read your DNS queries (unless you send those over your VPN)

vOv
Feb 8, 2014

is there any kind of signed package thing in place that would mitigate that? iirc debian distributes packages over plain http but they're signed so it doesn't matter

vOv
Feb 8, 2014


holy lol

vOv
Feb 8, 2014

Subjunctive posted:

that ssh-cache thing is a hoax, right?

tbh now that you mention it that's kind of high-quality video for 45 KBps

vOv
Feb 8, 2014

CrazyLittle posted:

yes because browser stores are notoriously insecure. Firefox used to store in clear text

how else would you store it without requiring a master password

vOv
Feb 8, 2014

Wheany posted:

the number 1 reason you're using randomly generated passwords and using a password manager is when a random site gets its login information leaked, all your logins everywhere are not immediately hosed.

if you have malware on your computer that can leak your browser's password database, you're already dead.

if your browser vendor's cloud sync platform gets popped, welp,

there could also just be an exploit that lets someone read arbitrary files as you but doesn't give them code execution or anything


someone post the warning ie6 displayed when you were connecting over https

Adbot
ADBOT LOVES YOU

vOv
Feb 8, 2014

atomicthumbs posted:

THE WORLD WONDERS

lol

  • Locked thread