Readit News logoReadit News
cataflam commented on FFmpeg to Google: Fund us or stop sending bugs   thenewstack.io/ffmpeg-to-... · Posted by u/CrankyBear
adastra22 · a month ago
Yes. But they don’t upstream. Why would they?
cataflam commented on Date bug in Rust-based coreutils affects Ubuntu 25.10 automatic updates   lwn.net/Articles/1043103/... · Posted by u/blueflow
gpm · 2 months ago
It... doesn't though: https://uutils.github.io/coreutils/docs/test_coverage.html

Neither this issue, which doesn't appear to be a bug at all but merely an unimplemented feature, nor the fact that uutils doesn't (yet) pass the entire testsuite, seem to me to at all be an indictment of the uutils project, merely a sign that it is incomplete. Which is hardly surprising when I get the impression it's primarily been a hobby project for a bunch of different developers. It does make me wonder about the wisdom of Ubuntu moving to it.

cataflam · 2 months ago
Wow. Maybe I'm missing something but it seems really weird to replace a tool with a rewrite that doesn't pass the test suite!
cataflam commented on Date bug in Rust-based coreutils affects Ubuntu 25.10 automatic updates   lwn.net/Articles/1043103/... · Posted by u/blueflow
jey · 2 months ago
Anyone have a link to the patch in uutils? Curious to see that the problem and solution were.
cataflam · 2 months ago
This comment[0] explains it.

The core bug seems to be that support for `date -r <file>` wasn't implemented at the time ubuntu integrated it [1, 2].

And the command silently accepted -r before and did nothing (!)

0: https://lwn.net/Articles/1043123/

1: https://github.com/uutils/coreutils/issues/8621

2: https://github.com/uutils/coreutils/pull/8630

cataflam commented on Microsoft PowerToys   learn.microsoft.com/en-us... · Posted by u/akudlacek
cataflam · 3 months ago
Amazing they are still alive and kicking. Started using them with Windows 95 (different specific ones, same general concept)

These and Sysinternals (bought by Microsoft around 2006) were must have when I was still using Windows.

https://learn.microsoft.com/en-us/sysinternals/

cataflam commented on We all dodged a bullet   xeiaso.net/notes/2025/we-... · Posted by u/WhyNotHugo
n8cpdx · 3 months ago
I agree that #1 is correct, and I try to practice this; and always for anything security related (update your password, update your 2FA, etc).

Still, I don’t understand how npmjs.help doesn’t immediately trigger red flags… it’s the perfect stereotype of an obvious scam domain. Maybe falling just short of npmjshelp.nigerianprince.net.

cataflam · 3 months ago
> update your password, update your 2FA

should practice it for ENTER your password, ENTER your 2FA ;)

> Still, I don’t understand how npmjs.help doesn’t immediately trigger red flags

1. it probably did for quite a few recipients, but that's never going to be 100% 2. not helped by the current practices of the industry in general, many domains in use, hard sometimes to know if it's legit or not (some actors are worse in this regard than others)

Either way, someone somewhere won't pay enough attention because they're tired, or stressed out, or they are just going through 100 emails, etc.

cataflam commented on We all dodged a bullet   xeiaso.net/notes/2025/we-... · Posted by u/WhyNotHugo
zahlman · 3 months ago
> U2F/Webauthn key as second factor is phishing-proof. TOTP is not.

Last I checked, we're still in a world where the large majority of people with important online accounts (like, say, at their bank, where they might not have the option to disable online banking entirely) wouldn't be able to tell you what any of those things are, and don't have the option to use anything but SMS-based TOTP for most online services and maybe "app"-based (maybe even a desktop program in rare cases!) TOTP for most of the rest. If they even have 2FA at all.

cataflam · 3 months ago
Indeed.

At least the crowd here should _know_ that TOTP doesn't do anything against phishing, and most of the critical infrastructure for code and other things support U2F so people should use it.

cataflam commented on We all dodged a bullet   xeiaso.net/notes/2025/we-... · Posted by u/WhyNotHugo
dang · 3 months ago
Please don't copy-paste comments on HN. It strictly lowers the signal/noise ratio.
cataflam · 3 months ago
My apologies, somehow after all these years, I didn't know that (and first time I've done it)!
cataflam commented on We all dodged a bullet   xeiaso.net/notes/2025/we-... · Posted by u/WhyNotHugo
x0x0 · 3 months ago
I watched a presentation from Stripe internal eng that was given I forget where.

An internal engineer there who did a bunch of security work phished like half of her own company (testing, obviously). Her conclusion, in a really well-done talk, was that it was impossible. No human measures will reduce it given her success at a very disciplined, highly security conscious place.

The only thing that works is yubikeys which prevent this type of credential + 2fa theft phishing attack.

edit:

karla burnette / talk https://www.youtube.com/watch?v=Z20XNp-luNA

cataflam · 3 months ago
Yes! Here is the whitepaper (from 2017 I think), I read that and used it, it's excellent

https://karla.io/files/ichthyology-wp.pdf

> At Stripe, rather than focusing on mitigating more basic attacks with phishing training, we decided to invest our time in preventing credential phishing entirely. We did this using a combination of Single Sign On (SSO), SSL client certificates, and Universal Second Factor (U2F)

cataflam commented on We all dodged a bullet   xeiaso.net/notes/2025/we-... · Posted by u/WhyNotHugo
finaard · 3 months ago
Most mail providers have something like plus addressing. Properly used that already eliminates a lot of phishing attempts: If I get a mail I need to reset something for foobar, but it is not addressed to me-foobar (or me+foobar) I already know it is fraudulent. That covers roughly 99% of phishing attempts for me.

The rest is handled by preferring plain text over HTML, and if some moron only sends HTML mails to carefully dissect it first. Allowing HTML mails was one of the biggest mistakes for HTML we've ever made - zero benefits with huge attack surface.

cataflam · 3 months ago
Still would have done nothing in this case, as they pulled the correct email address he uses for npm from another source (public API I think?).

That's exactly why I said all the other "helpful" recommendations and warning signs people are using are never foolproof, and thus mostly useless given the scale at which phishing campaigns operate.

Great if it helps you in the general case, terrible if it lulls you into a sense of confidence when it's actually a phishing email using the right email address.

cataflam commented on We all dodged a bullet   xeiaso.net/notes/2025/we-... · Posted by u/WhyNotHugo
macintux · 3 months ago
> 1. NEVER EVER login from an email link.

I receive Google Doc links periodically via email; fortunately they're almost never important enough for me to actually log in and see what's behind them.

My point, though, is that there's no real alternative when someone sends you a doc link. Either you follow the link or you have to reach out to them and ask for some alternative distribution channel.

(Or, I suppose, leave yourself logged into the platform all the time, but I try to avoid being logged into Google.)

I don't know what to do about that situation in general.

cataflam · 3 months ago
As for any of these cases, we do receive legitimate emails that require being logged in, Google or otherwise

The answer is simple: use your bookmarks/password manager/... to login yourself with a URL you control in another tab and come back to the email to click it

(and if it still asks for a login then, of course still don't do it)

u/cataflam

KarmaCake day764January 19, 2012View Original