September 18, 2024
September 18, 2024
The actual details of the pager attack, as reported by Reuters, are more interesting than I speculated earlier. They boomdoored the pagers at the factory, not by interdicting the shipment.
https://www.reuters.com/world/middle-east/israel-planted-explosives-hezbollahs-taiwan-made-pagers-sources-say-2024-09-18/By the way, this is precisely the kind of a problem prevented with SBOMs. "Mossad-installed explosive payload" would readily stand out.
โ lcamtuf (@lcamtuf) September 17, 2024
๐ฉ๐ช prosecutors appear to be able to deanonymize Tor by tapping servers, for years (!) and doing "timing analysis". In one case โ Ricochet, related to CSAM โ they did this four times, ordered telco provider to identify customer connecting to entry nodehttps://t.co/CIKshiP4se
โ hakan (@hatr) September 18, 2024
Important story! Such traffic correlation attacks are known risk in Torโs threat model, but this is one area where machine learning technique may make these attacks more practical
โ Donncha ร Cearbhaill (@DonnchaC) September 18, 2024
Fortunately most regular Tor browser users should not have major risk. Ricochet runs a local onion service. An attacker with the onion service address can send active traffic to the target to create a recognisable traffic pattern
โ Donncha ร Cearbhaill (@DonnchaC) September 18, 2024
The ability to do active probing makes onion service guard discovery attacks much more practical and difficult to defend against than targeting browsing users. Tor is still, by far, the most secure tool for private browsing, but more efforts needed on timing and metadata analysis
โ Donncha ร Cearbhaill (@DonnchaC) September 18, 2024
Slides and recording from my "SLUB Internals for Exploit Developers" talk at @LinuxSecSummit yesterday ๐ฅณ
โ Andrey Konovalov (@andreyknvl) September 17, 2024
Slides: https://t.co/wleH6nJDeW
Slides PDF: https://t.co/1x5cvc6wjh
Recording: https://t.co/jjzxebiBOp https://t.co/8FXC0Wfkju pic.twitter.com/E0dB8nrDun
Read via open access ๐ our new piece '#Russian #Sabotage in the #Gig-Economy Era' w/ @kloosha, @magda_long & @PatrickBury in The RUSI Journal. Many ๐ to @RUSI_org for this opportunity!
โ Dr Daniela Richterova (@dRichterova) September 17, 2024
See more on what we argue ๐https://t.co/3gVokmt8S8
https://x.com/wvusoldiers/status/1836122393149837329
By the way, this is precisely the kind of a problem prevented with SBOMs. "Mossad-installed explosive payload" would readily stand out.
โ lcamtuf (@lcamtuf) September 17, 2024
While dusting off some old stuff, I came across some old logs and sample. Here's some live PCAP files from back in July 2010 when I was watching some Stuxnet implants across Iran, living their last days of life. Probably first ever public traffic samples?https://t.co/2PyW3MR3zL
โ Hamid Kashfi (@hkashfi) September 17, 2024
๐กChainalysis Successful Deanonymization Attack on Monerohttps://t.co/3eSUygIKzQ
โ Dark Web Informer (@DarkWebInformer) September 17, 2024
If youโre interested in getting started in cryptography, check out the crypto 101 course by Dr. Alfred Menezes from UWaterloo.https://t.co/cevF3j5OTb
โ Nick Sullivan (@grittygrease) September 17, 2024
Heโs planning on publishing the lectures from his Applied Cryptography course, which was my introduction to the field.
Exploding pagers via a potential supply chain attack is a new threat vector unseen at this scale before
โ rekdt (@rekdt) September 17, 2024
Also unseen at this scale and exploding is my strategy for B2B sales
๐งต๐
NOT EVERYONE WAS KUNG FU FIGHTING MOM SOME OF US WERE TRYING TO BREAK IT UP
โ Viktor Winetrout (@Cpin42) February 8, 2023
๐ฅIncredible story https://t.co/aH9VqPXmIP pic.twitter.com/vip7OAfOQG
โ Noga Tarnopolsky ื ืื ืืจื ืืคืืืกืงื ููุบุง ุชุฑููุจููุณูู (@NTarnopolsky) September 17, 2024
Exploding smartphones?
โ Mobile Hacker (@androidmalware2) September 18, 2024
In 2021, a GPS tracker implant was found in an iPhone in Russia. The iPhone was replaced with a smaller battery to create an extra space for the tracker, and reassembled back. This appears to be a specific case rather than a supply chain attack. pic.twitter.com/BPV55TuEuY
๐จ Our amazing #FUZZING'24 keynotes are online!
โ Yannic Noller (@yannicnoller) September 17, 2024
"Reasons for the Unreasonable Success of Fuzzing" by Thomas Dullien (@halvarflake) https://t.co/Q0tyqEiqv6
"Is 'AI' useful for fuzzing?" by Brendan Dolan-Gavitt (@moyix) https://t.co/EqdkWNxI8C
//@mboehme_, @lszekeres