1,048 Matching Annotations
  1. Nov 2023
    1. Implement restrictive defaults (potentially allowing an explicit bypass) I understand that easy usability and rich out-of-the-box functionality is likely essential to this library's appeal to its users. Nevertheless I'd like to propose making the authorization properties ransackable_[attributes/associations/etc.] empty sets by default, forcing the developer to explicitly define whitelists for their use case. To soften the usability blow, a new ransack_unsafe(params[:q]) or ransack_explicit(params[:q], ransackable_attributes='*', ransackable_associations=(:post, :comment)) method could be introduced to offer developers a shorthand to bypass or override the whitelists for specific queries (after they've had to read a warning about why these methods can be dangerous).
  2. Oct 2023
    1. Openai is looking to predict performance and safety because models are too big to be evaluated directly. To me this implies a high probability that people start to replace their own capabilities with models not enough safe and relevant. It could cause misalignment between people and their environment, or worse their perception of their environment.

  3. Sep 2023
    1. Apparently, Google uses some additional heuristics to decide whether the link should be displayed or not. The List-Unsubscribe header could be abused by spammers to validate that their target got the message, and thus, GMail only shows the unsubscribe link if the source of the message has accumulated sufficient trust.

      Shouldn't it be controllable by the end user, in the same way that they can press a button to show all images if images are blocked by default for security/privacy reasons??

  4. Aug 2023
    1. The US report, released in 2021, warned: “Intensifying physical effects will exacerbate geopolitical flashpoints, particularly after 2030, and key countries and regions will face increasing risks of instability and need for humanitarian assistance

      Die australischen Grünen wollen die Labour-Regierung zwingen, einen bisher ih wichtigen Teilen geheimgehaltenen Sicherheitsbericht vollständig zu publizieren. Sie gehen davon aus, dass die Regierung explosive Informationen über Sicherheitsrisiken durch die globale Erhitzung vor der Bevölkerung verbirgt. https://www.theguardian.com/australia-news/2023/aug/04/declassified-climate-crisis-report-greens-labor-albanese

  5. Jul 2023
    1. Veränderungen des Jetstreams durch die globale Erhitzung können gleichzeitige Missernten in mehreren Regionen bewirken, die für die Weilternährung entscheidend sind. George Monbiot prangert die mangelnde mediale Aufmerksamkeit für eine Studie an, der zufolge das Risiko globaler Ernährungskrise weit größer ist als angenommen. Die politische Macht einer kleinen Gruppe extrem Reicher sei die Ursache für das dramatisch anwachsende Risiko weltweiter Hungerkatastrophen. https://www.theguardian.com/commentisfree/2023/jul/15/food-systems-collapse-plutocrats-life-on-earth-climate-breakdowntopic: crop fail

    1. The threat is that you're posting a secret key to a third party which violates a dozen of security best practices, nullifies the assumption of the key being "secret" and most likely violates your organization's security policy. In authentication all the remaining information can be guessed or derived from other sources - for example Referrer header in case of Google - and this is precisely why secrets should be, well, secret.
  6. Jun 2023
    1. Platform engineering is trying to deliver the self-service tools teams want to consume to rapidly deploy all components of software. While it may sound like a TypeScript developer would feel more empowered by writing their infrastructure in TypeScript, the reality is that it’s a significant undertaking to learn to use these tools properly when all one wants to do is create or modify a few resources for their project. This is also a common source of technical debt and fragility. Most users will probably learn the minimal amount they need to in order to make progress in their project, and oftentimes this may not be the best solution for the longevity of a codebase. These tools are straddling an awkward line that is optimized for no-one. Traditional DevOps are not software engineers and software engineers are not DevOps. By making infrastructure a software engineering problem, it puts all parties in an unfamiliar position. I am not saying no-one is capable of using these tools well. The DevOps and software engineers I’ve worked with are more than capable. This is a matter of attention. If you look at what a DevOps engineer has to deal with day-in and day-out, the nuances of TypeScript or Go will take a backseat. And conversely, the nuances of, for example, a VPC will take a backseat to a software engineer delivering a new feature. The gap that the AWS CDK and Pulumi try to bridge is not optimized for anyone and this is how we get bugs, and more dangerously, security holes.
    1. PARIS — Europe’s top human rights court condemned the French government on Wednesday over its refusal to bring home the families of two Islamic State fighters, a landmark ruling that may push France and other European countries to speed up the repatriation of nationals held for years in squalid detention camps in northeastern Syria.

      Could such EU wide actions or decision result in fostering seed of anger among individual EU nations, eventually prompting them to leave EU? Is there no power among individual nations to make their own decisions when it comes to national security?

  7. May 2023
  8. Apr 2023
    1. There are three types of authentication: something you know, something you have, and something you are.↳Do with that knowledge as you wish.

      身份验证分为三种类型:您知道的东西、您拥有的东西和您的身份。

      随心所欲地使用这些知识。

    1. Seeing how powerful AI can be for cracking passwords is a good reminder to not only make sure you‘re using strong passwords but also check:↳ You‘re using 2FA/MFA (non-SMS-based whenever possible) You‘re not re-using passwords across accounts Use auto-generated passwords when possible Update passwords regularly, especially for sensitive accounts Refrain from using public WiFi, especially for banking and similar accounts

      看到人工智能在破解密码方面有多么强大,这很好地提醒了我们,不仅要确保你在使用强密码,还要检查:

      • 你正在使用 2FA/MFA(尽可能不使用基于短信的)。

      • 你没有在不同的账户间重复使用密码

      • 尽可能使用自动生成的密码

      • 定期更新密码,特别是敏感账户的密码

      • 避免使用公共WiFi,尤其是银行和类似账户

    2. Now Home Security Heroes has published a study showing how scary powerful the latest generative AI is at cracking passwords. The company used the new password cracker PassGAN (password generative adversarial network) to process a list of over 15,000,000 credentials from the Rockyou dataset and the results were wild. 51% of all common passwords were cracked in less than one minute, 65% in less than an hour, 71% in less than a day, and 81% in less than a month.
  9. Mar 2023
    1. If you can unlink your address from a locked out account and then link it to a new account and add new 2FA factors to new account, and basically set it up again to be a replacement nearly identical to the original... how is that any different / more secure than just using a "reset account" feature that resets the original account (removes 2FA)?

      We're still back to the recurring original problem with account security where the security of your account comes down to the security of your linked e-mail account.

    1. I assume anyone interested in this topic already knows how phishing works, so I’ll spare you the introduction. If a phishing attack successfully collects a victim's credentials, then the user must have incorrectly concluded that the site they’re using is authentic.
    1. This is risky because JSON.stringify() will blindly turn any data you give it into a string (so long as it is valid JSON) which will be rendered in the page. If { data } has fields that un-trusted users can edit like usernames or bios, they can inject something like this:

      json { username: "pwned", bio: "</script><script>alert('XSS Vulnerability!')</script>" }

  10. Feb 2023
  11. Jan 2023
    1. I choć może brzmi to abstrakcyjnie, pamiętajmy, że wiele z tych podłączonych do Internetu urządzeń wyposażonych jest w kamerki i mikrofony.

      Zdaje się że nie wszyscy producenci informują o tym wprost, chwaląc tylko funkcjonalność, a nie wspominając o sposobie jej uzyskania (przez wykorzystanie kamerek)

    1. The code above is somewhat simplified and missing some checks that I would advise implementing in a serious production application. For example:The request contains a Date header. Compare it with current date and time within a reasonable time window to prevent replay attacks.It is advisable that requests with payloads in the body also send a Digest header, and that header be signed along in the signature. If it’s present, it should be checked as another special case within the comparison string: Instead of taking the digest value from the received header, recompute it from the received body.While this proves the request comes from an actor, what if the payload contains an attribution to someone else? In reality you’d want to check that both are the same, otherwise one actor could forge messages from other people.
  12. Dec 2022
    1. This is a terrible idea. At least if there's no way to opt out of it! And esp. if it doesn't auto log out the original user after some timeout.

      Why? Because I may no longer remember which device/connection I used originally or may no longer have access to that device or connection.

      What if that computer dies? I can't use my new computer to connect to admin UI without doing a factory reset of router?? Or I have to clone MAC address?

      In my case, I originally set up via ethernet cable, but after I disconnected and connected to wifi, the same device could not log in, getting this error instead! (because different interface has different mac address)

  13. Nov 2022
    1. But what about a Refresh Token flow? When using a refresh token, confidential clients also have to authenticate. Public clients, such as browser-based applications, do not authenticate during the Refresh Token flow. So in a typical frontend application, refresh tokens issued to frontend web applications are bearer tokens.   In practice, this means that if an attacker manages to steal a refresh token from a frontend application, they can use that token in a Refresh Token flow. To counter such attacks, the OAuth 2.0 specifications mandate that browser-based applications apply a security measure known as refresh token rotation.
    1. Please note - any callback URL that you use with the POST oauth/request_token endpoint will have to be configured within your developer App's settings in the app details page of developer portal.
    1. It would be nice if we could get some official word on whether this repository is affect by the catastrophic CVE-2021-44228 that is currently affecting a considerable percentage of softwares around the globe. From my limited understanding and looking at the refreshingly concise list of dependencies in the pom.xml, I would think this project is not affected, but I and probably others who are not familiar with the projects internals would appreciate an official word.
    2. I understand that typically, it wouldn't make much sense to comment on every CVE that doesn't affect a product, but considering the severity and pervasiveness of this particular issue, maybe an exception is warranted.
    1. DHS’s mission to fight disinformation, stemming from concerns around Russian influence in the 2016 presidential election, began taking shape during the 2020 election and over efforts to shape discussions around vaccine policy during the coronavirus pandemic. Documents collected by The Intercept from a variety of sources, including current officials and publicly available reports, reveal the evolution of more active measures by DHS. According to a draft copy of DHS’s Quadrennial Homeland Security Review, DHS’s capstone report outlining the department’s strategy and priorities in the coming years, the department plans to target “inaccurate information” on a wide range of topics, including “the origins of the COVID-19 pandemic and the efficacy of COVID-19 vaccines, racial justice, U.S. withdrawal from Afghanistan, and the nature of U.S. support to Ukraine.”

      DHS pivots as "war on terror" winds down

      The U.S. Department of Homeland Security pivots from externally-focused terrorism to domestic social media monitoring.

  14. Oct 2022
    1. How safe are investors’ assets on the KuCoin exchange? At KuCoin, we’re very much vigilant of security and cyber threats, and we ensure that our exchange is safe for trading. KuCoin allows you to trade with confidence, knowing that your digital assets are safe on the exchange. Micro-withdrawal wallets, industry-level multilayer encryption, and dynamic multi-factor authentication are a few of the levels of protection that we employ. KuCoin offers 24/7 customer support via live chat and online ticket on its help center. The supporting staff are very responsive and patient. Also, KuCoin has established about 23 local communities in Europe, SEA and other regions, providing users with highly localized service and support.
    1. BTCM: User funds security has been the Achilles heel of the digital asset industry since its inception. Can you share how KuCoin handles its security infrastructure? Johnny Lyu: As a global exchange, security is one of our top priorities. We developed all the infrastructure and systems on our own to ensure its stability and security. We have plenty of security mechanisms to protect the crypto assets of our users and we are working with many third parties like Chainalysis and white-hats to improve the level of security. It is worth mentioning that we recently reached a strategic cooperation with Onchain Custodian, Singapore’s crypto asset custody platform. Onchain Custodian offers a custody service for the safekeeping of KuCoin crypto assets. The custodial funds are backed by Lockton, the world’s largest private insurance brokerage company, which means users’ assets on KuCoin will be double secured.
    1. "I thought WSL ran as root in Windows" ... ABSOLUTELY NOT! Do you think we're crazy? ;) When opened normally, your Bash instances are launched with standard Windows user rights. If you want to edit your Windows hosts file, you must do so from an elevated Bash instance ... though only do this with enormous care - any other script you run in the same elevated Bash Console will also get admin rights to the rest of your machine!!
  15. Sep 2022
    1. To truly alleviate poverty on a large scale, we must fix a system in which normallife experiences such as childbirth can translate into economic insecurity. Mostof the poor are not unexplainable anomalies in an otherwise well-functioningsociety. Instead, they are the normal consequence of structural arrangementsguaranteed to produce economic insecurity.

      This sort of institutionalized economic insecurity seems bound up in institutionalized racism and may have a relationship with recent abortion bans. Can we tease out the ways these ideas are tied together or compounded?

      How can alleviating the perceptions of these effects help create societal changes and greater flexibility and more resiliency?

      These are potential national security issues were the country to come to war with other major powers.

  16. Aug 2022
    1. let's start giving a bit of a recap of all these vulnerabilities that I talked about and be basically aligned to what we defined as intercept for example

      5 areas of vulnerabilities

      1. Intercept calls and texts
      2. Impersonate user identity
      3. Track users
      4. Conduct fraud
      5. DoS users or network

      For each of these types of attacks, vulnerabilities were found in RCS to exploit them.

    1. How do I turn off the requirement to have a lock screen?Today, I'm suddenly unable to use any Google related apps on my phone, because I am now REQUIRED to set up a lock screen on my phone. I get that you want to be super-secure for businesses using enterprise devices. I am not a business. I'm some guy who just happens to have a domain name. My only "employee" is me. I have a two email addresses: My real first name, and the shorter version that most people call me. I do NOT want a lock screen on my phone. I don't want to be forced to give myself permission to use apps on my phone. Why am I now required to add all this bull$%^? Nobody is hacking my interwebs. Give me a f#$%^& break! I don't need a lock screen. I've been using this account for everything (gmail, youtube, etc) for over five years now. I'm not interested in deleting it and going back to my gmail.com account. I'm also not interested in being forced to click multiple times just to use my phone. Let me disable it.So, how do I turn this garbage off?
    1. In a clickjacking attack, the attacker creates a malicious website in which it loads the authorization server URL in a transparent iframe above the attacker’s web page. The attacker’s web page is stacked below the iframe, and has some innocuous-looking buttons or links, placed very carefully to be directly under the authorization server’s confirmation button. When the user clicks the misleading visible button, they are actually clicking the invisible button on the authorization page, thereby granting access to the attacker’s application. This allows the attacker to trick the user into granting access without their knowledge.

      Maybe browsers should prevent transparent iframes?! Most people would never suspect this is even possible.

  17. Jul 2022
    1. Something has shifted online: We’ve arrived at a new era of anonymity, in which it feels natural to be inscrutable and confusing—forget the burden of crafting a coherent, persistent personal brand. There just isn’t any good reason to use your real name anymore. “In the mid 2010s, ambiguity died online—not of natural causes, it was hunted and killed,” the writer and podcast host Biz Sherbert observed recently. Now young people are trying to bring it back. I find this sort of exciting, but also unnerving. What are they going to do with their newfound freedom?
    1. If your security locks you out of your own home just because you changed your trousers, that would be shockingly bad security.If your security permanently locks you out of your accounts because you restored your Chrome settings from backup, how is that any better?
  18. Jun 2022
  19. May 2022
    1. An Introduction to PLAN E Grand Strategy for the Twenty-First-Century Era of Entangled Security and Hyperthreats

      Planetary Boundary / Doughnut Economic Main Category: SOCIO-ECONOMIC: Culture, Education

      Although culture and education are chosen as the main categories, Plan E applies to all planetary boundaries and all socio-economic categories as it is dealing with whole system change.

      Visit Stop Reset Go on Indyweb for detailed context graph and to begin or engage in discussion on this topic. (Coming soon)

    2. The HRF design intends to operationalize entangled security (figure 8). It provides orchestration logic at ecoregional, nation-state, and local levels and is expected to vary  according to context. It comprises four main task groups: HRF support; planetary security; human security; and state security.

      These are umbrella categories that can allow for the classification of vast numbers of existing transition projects. With the use of disaggregated planetary boundaries, doughnut economics framework, Inner and Outer transformation, and Bend-the-Curve gamification, the impacts of each type of operation can be measured.

    3. The hyperthreat can be outmaneuvered by humans reconfiguring their activities in two ways: security by design and security by dispersal. National security in the Anthropocene is increasingly achieved by designing systems and settlements so that enhanced security is incorporated from the start. For example, it can be imagined that each time a person refuels a car with petrol, this action empowers the hyperthreat. This leads to global warming, which creates ocean acidification and in turn reduced fish stocks, while also creating pressures for resource wars, thereby influencing whether a soldier or civilian dies and how much taxpayer resources are required for material security missions. In contrast, zero-emission transportation technologies can “design out” the slow violence and threats associated with a fossil-fuel-intensive lifestyle. This is similar for plastic use, in which case the “threat” is embodied in the high polluting design of consumable products and lifestyle activities. Likewise, other health threats and longer-term costs are embodied in hidden toxins or sugars in food products. Accordingly, peace, health, and a different form of national prosperity can be created through design, which requires a longer-term and mesh-intervention viewpoint. OP VAK has a role to play in achieving security and safety by design by linking apparently benign activities with their devastating impacts.    

      Linking these many fragmented and long causal chains and tracing them back to the hyperthreat can be a polwerful visualization that brings the hyperthreat to life.