Ten pills once is chump change
When I was a patient at the VA pain clinic for a couple years, I could fart ten pills on any given day.
Ten pills once is chump change
When I was a patient at the VA pain clinic for a couple years, I could fart ten pills on any given day.
Lighten up, Francis.
before tomorrow morning?
DoD contractor: Sure can, but it will cost you huge.
(Lies about the former, 100% accurate on the latter.)
valuable
Till he’s not, or worse, becomes a liability.
Once he’s washed up there, would be funny if they extradited him back to the US. Double whammy if he ever makes it back.
Turns out dope.af
is redirecting to andy.is
, til.
executing foreign JavaScript
This is a great point I try to convey to my less-technical friends and family. Looking at a webpage is not like changing the channel on a tv of old. Looking at a webpage pulls code from who knows where and executes it on your local machine.
These advertisers expect that I should blindly trust them to execute code on my cpu, in my memory, on my machine? Yeah fuck that, it’s a privilege. I don’t invite every hobo walking by to come into my house and take a shit in my toilet.
If they don’t like that not everyone executes their syphilis-ridden javascript, then they should put their shit behind a paywall. But they won’t, since they know they don’t have a product worth paying for.
“We regret what happened, it shouldn’t have happened,” Pangemanan said, insisting the soldiers’ actions were rogue, and not representative of the Indonesian military.
Plot twist: What he regrets having happened is those troops getting caught, not what hey did. The “rogue actions” were them taking personal cell phone videos and retaining them, making it easier to get caught and less easily denied.
Doesn’t it require a separate process to be using the cryptographic algorithm in the first place in order to fill the cache in question?
Yes, that’s my understanding. I haven’t looked at the code, but their high level explanation sounds like their app is making calls to an API which could result in the under-the-hood crypto “service” pulling the keys into the cache, and there’s an element of luck to whether they snag portions of the keys at that exact moment. So it seems like the crafted app doesn’t have the ability to manipulate the crypto service directly, which makes sense if this is only a user-land app without root privileges.
why wouldn’t the app just steal your password and avoid all of this in the first place?
I believe it would be due to the app not having root privileges, and so being constrained with going through layers of abstraction to get its crypto needs met. I do not know the exact software architecture of iOS/macOS, but I guarantee there’s a notion of needing to call an API for these types things. For instance, if your app needs to push/pull an object it owns in/out of iCloud, you’d call the API with a number of arguments to do so. You would not have the ability to access keys directly and perform the encrypt/decrypt all by yourself. Likewise with any passwords, you would likely instead make an API call and the backing code/service would have that isolated/controlled access.
Thanks for looking and not just zipping by. I’ll practice better restrain from feeding the trolls, I don’t want to make the mods lives any harder.
So it’s been a while since I had my OS and microcomputer architecture classes, but it really looks like GoFetch could be a real turd in the punch bowl. It appears like it could be on par with the intel vulns of recent years.
which would have this hardware issue but don’t have actual background processing
So I’ve read the same about iOS only allowing one user-space app in the foreground at a time, but… that still leaves the entirety of kernal-space processes allowed to run at anytime they want. So it’s not hard to imagine that a compromised app could be running in the foreground, all the the while running GoFetch trying to mine, while the OS might be shuffling crypto keys in the background on the same processor cluster.
The other thing I’d like to address, is you’re assuming this code would necessarily require physical access to compromise a machine. That is certainly one vector, but I’d posit there’s other simpler ways to do the same. The two that come to mind really quick, are (1) a compromised app via official channels like the app store, or even more scary, (2) malicious javascript hidden on compromised websites. The white paper indicates this code doesn’t need root, it only needs to be executed on the same cluster where the crypto keys keep passing through by chance; so either of these vectors seem like very real possibilities to me.
Edit to add:
I seem to recall reading a paper on the tiktok apps with stock installation were actually polyglot, in that the app would actually download a binary after installation, such that what’s executed on an end user’s machine is not what went through the app store scanners. I had read of the same for other apps using a similar technique for mini-upgrades, which is a useful way to not have to go through app store approval everytime you need to roll out a hotfix or that latest minor feature.
If these mechanisms haven’t already been smacked down by apple/google, or worse, aren’t detectable by apple/google, this could be a seriously valuable tool for state level actors able to pull off the feat of hiding it in plain sight. I wonder if this might be part of what congress was briefed about recently, and why it was a near unanimous vote to wipe out tiktok. “Hey congress people, all your iphones are about to be compromised… your tinder/grindr/onlyfans kinks are about to become blackmail fodder.”
and you’re not a mod or an instant admin
How do you know?
I bet I can keep you going all day.
I’m going to exhibit, the self-control of blocking you
So another lie. Also, you lose.
So let’s tally it up:
Extremely similar profile aesthetics, down to colors and style
Same exact account birthdays, 23 Aug 2023
Similar comment history, also confrontational, and many downvotes from the community
Both accounts reporting my exact comments, “hudson” sandwiched between your “gregorum” account
Each of my comments downvoted twice
It’s extremely delusional/insulting for you to expect anyone to believe all that’s coincidence. Oh the irony of you posting the NP when you can’t even come clean when caught in your own lies.
Have you changed your profile pics yet? Are you going to go back and edit your comments more to try and look better for when a mod gets around to your complaints? You are acting so see through right now, and it’s not a good look.
Enjoying it so much that you’re now reporting my comments as breaking rule 1 and 3, huh?
Also, might not want to brigade by reporting with your other account @hudson@sh.itjust.works. Did you forget to sign out on that one? Just needed a little more umph and downvoting in this thread? Pretty sure that’s against the rules too.
Pro tip: If you’re going to use a diff account to brigade, you might want to change the profile up a bit so they don’t all resemble each other.
Removed by mod
Removed by mod
Removed by mod
Removed by mod
Removed by mod
Saying one is wrong, or doesn’t know what they’re talking about, is not ad hominem. Maybe it’s a language thing, but to me saying someone is wrong is equivalent to saying their argument is wrong. And saying someone is out of their element/depth is the same as saying they’re wrong on the subject, aka their argument is wrong.
I do something similar, but I guess scorched earth edition:
Only use firefox, no chrome or chromium variants
Never signed in to my google account (only have it to keep a gmail forward going for old ass subscriptions)
Have firefox configured to only keep whitelisted sites’ cookies and data between restarts - google is not on that list
uBlock Origin
The last several months I started seeing that youtube screen “enable history to see recommendations” blank page when first landing, as if it was a punishment to me. It’s not. I remember all the channels I like, and it’s easy enough to keep checking back. So that blank screen is actually a nice bonus to me.