|
Lutha Mahtin posted:i guess i don't know how the security community operates. I guess you don't know how the security community operates.
|
# ¿ Jan 4, 2019 10:59 |
|
|
# ¿ May 9, 2024 05:28 |
|
Volmarias posted:This is definitely some kind of gently caress up I wonder if the "researcher's" mother is still in jail.
|
# ¿ Feb 7, 2019 00:25 |
|
Just lol at text messages being stolen by a government entity. When I worked for a large telco I had access to a database with every text message they'd processed in the last week. We used it to debug delivery issues for large clients. There is no way that a government level actor would be needed for this sort of thing.
|
# ¿ Feb 8, 2019 09:53 |
|
abigserve posted:Show me a "process aware" firewall that works accurately. Little Snitch my man! Or alternately windows firewall. Whatever works for you.
|
# ¿ Mar 26, 2019 08:54 |
|
Wiggly Wayne DDS posted:those really aren't the same... The question was about process aware firewalls that work. They do work, I'm not aware of any enterprise level solutions (for anything) that work though. The tech exists however. abigserve posted:I meant network firewalls, I should have clarified. EDR's like carbonblack also offer some pretty impressive network flow collection which tie network traffic to processes, users, etc. Absolutely fair, I don't know that there are any network firewalls that properly do anything close to that. If there were they'd need to be heavily dependent on host based reporting anyway. yoloer420 fucked around with this message at 23:05 on Mar 26, 2019 |
# ¿ Mar 26, 2019 23:03 |
|
goddamnedtwisto posted:there are devices that are basically passive taps for usb, the idea is you plug it into an actual replica of your target system (down to the hardware, no virtual machine or anything) and analyse what it does, not what's on it. that's probably a level of paranoia too high for your typical corporate "usb key found in the car park" situation, but you'd have thought the secret service and the fbi would have at least thought about this a little bit... USB bus analysers are crazy expensive, or were last time I purchased one. I can't imagine any agency would be able to justify the cost of testing every USB device they process on something like that. Even if they did, a 10 minute delay on the hub becoming active would defeat it. Good idea, but I have no idea how you could scale it to the needs of an investigative body.
|
# ¿ Apr 9, 2019 09:47 |
|
|
# ¿ May 9, 2024 05:28 |
|
fishmech posted:well its not like there's much point to stealing your getaway car months in advance or anything In Australia we have permanent fixed cameras in various places that automatically run plates and issue fines for vehicles with expired registration. I'd expect they could harvest that data to hunt stolen cars too.
|
# ¿ Apr 19, 2019 04:48 |