Readit News logoReadit News
elnerd commented on Mobile carriers can get your GPS location   an.dywa.ng/carrier-gnss.h... · Posted by u/cbeuw
grepfru_it · 10 days ago
Great for small networks. Once bad actors find it, it will be attacked. See gnutella as the case study on unsupervised peer to peer networks
elnerd · 9 days ago
I just read gnutella page on Wikipedia, no mention of bad actors
elnerd commented on Vulnerable WhisperPair Devices – Hijack Bluetooth Accessories Using Fast Pair   whisperpair.eu/vulnerable... · Posted by u/gnabgib
miduil · 18 days ago
Previous discussion on ?a similar? vulnerability. That means there is yet another critical vulnerability from the same vendors, given the reporting date around ~August I hope this was addressed by Sony and Jabra around the same time.

https://news.ycombinator.com/item?id=46453204

   > Bluetooth Headphone Jacking: A Key to Your Phone [video]
   > 551 points
   > 223 comments
   > 21 days ago
I wonder if some people could find more affected versions or whether there is some tool to detect more models, as I would doubt this is being nearly complete given how many vendors rely on this supplier.

elnerd · 18 days ago
I have the impression this is not the same. In the linked video, they talked about unauthenticated functions in BLE if I recall correctly…
elnerd commented on Apple testing new App Store design that blurs the line between ads and results   9to5mac.com/2026/01/16/ip... · Posted by u/ksec
elnerd · 21 days ago
In related news, 10% of Meta ads are malicious, and they have Meta seems to have little incentive to stop it.

https://www.reuters.com/investigations/meta-is-earning-fortu...

elnerd commented on Kubernetes egress control with squid proxy   interlaye.red/kubernetes_... · Posted by u/fsmunoz
elnerd · a month ago
Would it be be trivial to have a init container to do CA injection? Maybe though mutating admission controller? Then some CNI magic to redirect outbound traffic to do transparent proxying?
elnerd commented on 10 Years of Let's Encrypt   letsencrypt.org/2025/12/0... · Posted by u/SGran
elnerd · 2 months ago
One domain parking actor is responsible for nearly 10% of all issued ssl certificates. 185.53.178.99. This is just one of many bad actors.
elnerd commented on Disrupting the first reported AI-orchestrated cyber espionage campaign   anthropic.com/news/disrup... · Posted by u/koakuma-chan
mschwaig · 3 months ago
I think as AI gets smarter, defenders should start assembling systems how NixOS does it.

Defenders should not have to engage in an costly and error-prone search of truth about what's actually deployed.

Systems should be composed from building blocks, the security of which can be audited largely independently, verifiably linking all of the source code, patches etc to some form of hardware attestation of the running system.

I think having an accurate, auditable and updatable description of systems in the field like that would be a significant and necessary improvement for defenders.

I'm working on automating software packaging with Nix as one missing piece of the puzzle to make that approach more accessible: https://github.com/mschwaig/vibenix

(I'm also looking for ways to get paid for working on that puzzle.)

elnerd · 3 months ago
We soon will have to implement paradoxes in our infrastructure.
elnerd commented on Samsung makes ads on smart fridges official with upcoming software update   arstechnica.com/gadgets/2... · Posted by u/stalfosknight
prawn · 3 months ago
Can't stand behaviour like this.

I pay for Spotify and the app now shows paid suggestions (cough ads), to paying users. When you tap the ellipsis and choose "Not interested", it doesn't respond with "OK, we'll stop" but something like 'We'll show less of this'.

No, don't show less, I want you to not show it at all.

elnerd · 3 months ago
I unsubscribed from Spotify for this very reason.
elnerd commented on Are these real CVEs? VulDB entries for dnsmasq rely on replacing config files   seclists.org/oss-sec/2025... · Posted by u/JawsofDeath
BobbyTables2 · 3 months ago
It gets blurry at times though.

Imagine a router has a web/cli interface for setting the DHCP server’s domain name. At some point the users’s data is forwarded to a process exiting the root-owned file.

Hypothetically, If a vulnerability in the parsing of such from the config could be exploited from the end-user, that would certainly matter.

And these things always seem to be one step away from bugs that allow arbitrary injection into the config file…

(I’m amazed at the hot messes exposed with HTTP and SMTP regarding difference in CR/CRLF/LF handling. Proxy servers and even “git” keep screwing this up…)

elnerd · 3 months ago
Just because you cannot see how a vulnerability can be exploited does not mean that others can. As you describe, people seem to assume that the only way the config file ends up on the server is «physically» editing it.

An anecdote: I have been struggling with exploiting a product that relies on MongoDb, I can replace the configuration file, but gaining RCE is not supported «functionality» in the embedded version as the __exec option came in a newer version.

A parser bug would be most welcome here.

elnerd commented on ./watch   dotslashwatch.com/... · Posted by u/shrx
elnerd · 4 months ago
What’s the emulator he used when designing the firmware?

u/elnerd

KarmaCake day12August 13, 2025View Original