• 4 Posts
  • 538 Comments
Joined 3 years ago
cake
Cake day: June 7th, 2023

help-circle


  • They may not have seen a better option. I’m pretty sure this is the flight in question. Which, the linked video seems to be incorrect in stating that he problem occurred soon after take-off (total flight time is just over an hour). Guessing from the flight track, it looks like they turned east to go back towards the airstrip they took off out of. They were pretty well lined up with the runway, but didn’t have the altitude to make it. Granted, they should have been looking for places to set down as they went, and it may just be that the freeway looked like the best option at the time. There is a lot of residential housing in the area they were in and the open areas seems to have a lot of tree cover. The freeway probably looked like an oasis of open ground in a sea of houses and trees.

    EDIT: this is the source I used for the airplane’s tail number to look it up on flightradar24.



  • I really don’t see why there are so many people around saying “it’s probably fine”

    Because there is currently no direct evidence of anything amiss. From the linked article:

    Technically, the changes made so far have been reviewed by some people and no obvious malicious modifications have been found; F-Droid also builds the app reproducibly and verifies whether the published code matches the binaries

    Granted, someone could be playing a long game here. Get control, wait for the controversy to die down while playing nice, then do then rug pull when no one is watching anymore. That’s possible. It’s also quite possible that the previous maintainer got tired of doing a hard and thankless job for no pay and wanted to shed the whole thing. They found someone to hand it off to, and the new maintainer is just shit at open communications. That happens and is also possible. Whether or not it makes you change your usage of the package is down to your risk appetite. But, jumping at every shadow gets old quick and at some point you have to accept some risk. So, unless and until there is more evidence to backup the claim of foul play; or, if you have a really low risk appetite, this is one of those things which falls under “keep an ear open, but it’s probably fine”.





  • But if they did have a mutable VDI, they still wouldn’t be allowed to install software.

    The actual install isn’t really important for an attacker, just the user making the attempt. The payload will exists beside the software installer and will be launched by the user running some sort of “install” batch file or executable. It won’t install anything, it’ll dump files in places like %TEMP% and add something to the user’s RUN registry entry. It’s also why I mentioned a “laptop”. What the attacker is really after isn’t the Citrix server (that would be nice to pop, but it’s not necessary) it’s the user’s local system. That’s going to provide a beachhead on the network for the attacker to work out from. It will also provide a treasure trove of credentials the attacker can sell or use elsewhere to attack the environment (infostealers don’t need, or even ask for, local admin). Even just being able to sell access to one compromised laptop is a win for the attacker. Access brokers can sell that off to more advanced groups who will come back and try to move out from there.

    But wait, we have MFA everywhere! Are you sure, are you really, really sure you don’t have a dev team somewhere who decided to hang something out on a poorly documented corner of the network and they disabled MFA on the device for a test, and then forgot to shutdown the test equipment? Because ya, I’ve worked incidents where exactly that happened.


  • If you set stuff up properly

    A lot of heavy lifting going on in those words…

    Also, the malware which gets bundled with “free” versions of products usually doesn’t care if the install fails or succeeds, just that the user downloaded the package, unzipped it, and double-clicked on the ever-so-helpful “install.lnk”. Most of the current ransomware and infostealer malware doesn’t need local admin to do it’s damage. Plenty of Remote Access Toolkits (RATs) will run quite happily in user space. Users can edit their local RUN registry key and/or create scheduled tasks. And there are doubtless Privilege Escalation vulnerabilities sprinkled around the system like fairy dust when it gets to be time to dump the SAM hive or lsass memory space.

    Yes, locking down local admin gets you a lot, in terms of security. It’s far from a trump card though. Lots and lots of damage can happen in user land.




  • Ya, I knew better. I was even chastising myself for closing it up without testing while I was closing it up. I just got excited to see it work and testing it while open was kinda awkward. But ya, I really shouldn’t have done that.

    For the screws, I’m one of those folks who will lay the screws out to match their physical location. This usually gives me a pretty good map of where to put them back and greatly reduces the chance of having extras at the end. It takes up extra workspace, but it works well for me.






  • While this patch might stop some existing attacks, it’s not really a fix. First off, the type of people who might install a third party Windows patch are probably the exact same people who would be cautious about clicking on an LNK file embedded in a ZIP file. Second, even if this patch somehow became widespread, attackers would just shift their attacks into the 260 character limit. Sure, it would now be visible in the properties, people aren’t looking at the properties of LNK files.

    The problem is this “vulnerability” is essentially “as designed”. LNK files exist to allow both pointers to other files and a quick way to run complex commands. It’s like calling powershell.exe a vulnerability, because it can be used to get up to all sorts of malicious stuff. Both are powerful tools on Windows, but those tools can be abused.


  • While I don’t doubt that we will, at some point, have something like data centers in space, it kinda seems like a bad idea right now. Doing some searching, it looks like the cost to send something to orbit, using SpaceX’s Falcon Heavy is something around $1,500/kg. 1, 2 For a server which weighs 2-3 kg, that’s adding a significant cost on top of the expensive hardware costs already involved. Though, on the plus side, without the environmental impact and lawsuits from local opposition, this cost could balance out.

    Then they need to deal with cooling. Keeping data centers cool is already a challenge. One of the main reasons communities have been lining up against data centers is their water usage, which is used for cooling. In space, you can’t just tap into the nearest water supply. Radiative cooling sucks, sure you could just build a bigger radiator, but that’s more mass you need to send to orbit, more complexity and something else you need to worry about micro-meteors slamming into. The International Space Station already uses a large, complex system for cooling and it has nothing like the internal heating of hundreds of GPUs churning out furry porn.

    Lastly, maintenance is going to be a bitch. Granted, Microsoft has show that it is possible to run a lights-out data center effectively by dropping it in the ocean. Though, the fact that we don’t see more of that tells me that the economics of it likely don’t pencil out well compared to just paving over more farmland and ignoring the poors whining about things like fresh water.

    This really seems like one of those ideas where someone needs to tell Mr. Pichai to put the bong down for a bit.


  • While that is possible, I’d seriously doubt it happening. Wagner’s run at Moscow seemed like the best opportunity for that to happen, but it just stalled out. I’m still surprised Prighozin, stopped his push short of Moscow. I was not surprised afterwards when an airplane he was on suffered “technical difficulties”. But, between the failure of Wagner to remove Putin and them now being rolled into the Russian military, I think Putin has done a lot to consolidate his control over the armed forces, exactly to prevent that outcome.

    Ya, it could happen, I don’t believe it’s likely.


  • The big ones for me were a frequent, sudden, urgent need to pee and getting up multiple times a night to pee. I also drank a copious amount of water. Like, the whole “eight glasses a day” thing which used to be popular was confusing to me, as I’d drink that much in the first couple hours of the day. I finally went in to the doctor and got a blood test and my A1Cs were well over the “welcome to Diabetes Land” number. With diet, exercise and drugs I’m well controlled now and caught it early enough that I still have good feeling in my feet. Given my family history, and all the shit I ate in my younger days, it’s not really a surprise. I just have to be more careful now, but I have discovered an enjoyment of climbing because of it.

    Really, if you have any family history of diabetes, start visiting your doctor on an annual basis and getting a blood test. It’s simple, and catching it earlier is good for preventing problems with neuropathy in your feet.