Good catch! Missed that one

Because it exposes root and system internals. Biggest reason android devices get compromised/hacked and your fun, quirky android becomes a link in a bot net peddling god knows what including attacks against people and other illegal activities and media

[-] stevedidwhat_infosec@infosec.pub 9 points 9 hours ago* (last edited 2 hours ago)

For anyone interested - I’d you are using umatrix to block shit you can punch these lines into a new text file and import as blocklist, then commit it with the tiny arrow that points left toward the permanent list to save it permanently:

* www[.]googie-anaiytics[.]com * block

* kuurza[.]com * block

* cdn[.]polyfill[.]io * block

* polyfill[.]io * block

Remove the square brackets before saving the file - these are here to prevent hyperlinks and misclicks.

Edit: this is not a bulleted list, every line must start with an asterisk, just in case your instance doesn’t update edits made to comments quickly.

[-] stevedidwhat_infosec@infosec.pub 12 points 9 hours ago

This has almost nothing to do with what you’re talking about.

A Chinese company bought the domain and the service in February and are attacking people in highly specific conditions. (Mobile devices at specific times)

This is an attack. Not negligence, not an uh oh oopsie woopsie fucky wucky. Attack.

Intuit uses pollyfill… and a lot of people use that service.

Cloudflare and fastly wouldn’t be setting up mirrors if it weren’t still being used, I can guarantee that.

[-] stevedidwhat_infosec@infosec.pub 1 points 9 hours ago* (last edited 9 hours ago)

Not quite!

Try:

mylist = [value for value in range(1,20)]

This says I want to make mylist be a list where each element of the list (called value here) comes from doing a for loop on range, given the parameters 1, and 20.

If you want to change how each element of this list is, you do it in the first bit on “value”

So you could do

mylist = [value*5 for value in range(1,20)] //5,10,15,…,95 (not 100, because ranges go up to the last item, not including it (non-inclusive))

Etc. Hope this makes sense!

Edit: MISSING CLOSING PARENTHESIS DOH

[-] stevedidwhat_infosec@infosec.pub 2 points 16 hours ago

Considering they’re calling the negotiator an idiot, I doubt this is fake or false.

Thanks America. Too busy running fucking counter-vax psyops against the Chinese to be securing the nations security.

Fucking. Morons.

Bullies don’t make sense.

Actively working against your own species is fucking brain dead. Especially a species you share the fucking planet with.

The nice part about tolerance is it’s a contract. If you don’t agree to it, nobody who does agree to it has to be tolerant with you. It’s simple

Literal spaghetti logic- throw everything at the wall and see what sticks

Any republicans with brain cells left will likely still vote for rfk

I like this explanation most

Okay but here in the real world, those making the claim have the burden of proof.

This is a classic, literally text book example of the logical fallacy of ignorance.

Invisible unicorns exist, and because you can’t disprove it, we should build unicorn fences.

The logic doesn’t follow.

Big fucking yikes - wonder what the play is here?

Trying to get in front of the train instead of roped into it ?

Either way, more evidence of the psychopathy that is big business in the states, and a byproduct of late state capitalism

4

Hey all!

While investigating some malvertising campaigns today, I noticed that one of the sponsored google search results, upon hovering, appeared to be changing/resolving through rather than simply showing what link was being used by the result.

Any ideas as to how this hover url result works and if you can disable resolving/force top-level results upon hovering over anchor elements?

Malvertising is hot hot hot!

6

Hey all, got a quick question!

I want to receive, parse and store syslogs from various devices on my home network on my windows box. I know, I know, its a bit backwards but I'd like to proceed with this sort of setup if possible (not against discussion, of course).

I've looked and looked for options but it seems like everything has been bare bones and basically just receives, or is locked behind premium. Surely there's some sort of solution out there, no? I'd be willing to implement something in Python if I need to but I'm considerably more hesitant when compared to using an open source soln.

Thanks for your time, looking forward to discussing/learning more!

view more: next ›

stevedidwhat_infosec

joined 11 months ago