Quote the block you’re referring to please. The lawyer wouldn’t be calling this a major setback if the plan was flawed (what you’re seemingly claiming) - in fact:

“The U.S. Bankruptcy Trustee, an arm of the Justice Department, argued that the bankruptcy law does not permit protecting the Sackler family from being sued. “

Which actually means the opposite of what I think you’re getting at. Even if they bankrupted, they could still be sued. Help me understand where/what you saw that lead to this rationale.

[-] stevedidwhat_infosec@infosec.pub 2 points 2 days ago* (last edited 2 days ago)

Not at all what I meant. The premise was that this wouldn’t happen if they were being paid fairly. Supply chain attacks happen with or without fair pay.

Look at what happened with the XZ backdoor. Whether or not they’re getting paid just means a different door is opened.

The root of the problem is that we blindly trust anyone based on name-brand and popularity. That has never in the existence of technology been a reliable nor an effective means of authentication.

If it’s not outright buying out companies it will be vulnerabilities/lack of appropriate management, if it’s not vulns it’ll be insider threat.

These are problems we’ve known about for at least a decade+ and we’ve done fuck all to address the root of the problem.

Never trust, always verify. Simple as that.

… he made plenty off the product and made additional when he sold. Devs ability to make money has nothing to do with companies coming in and injecting malware to the service.

Any threat actor group with sufficient funds from various campaigns, spyware, etc could use said funds to buy out a dev, owner, etc.

Not to mention state-sponsored threat actors. This is the perfect example of distracting from the fact of what happened.

Good catch! Missed that one

Because it exposes root and system internals. Biggest reason android devices get compromised/hacked and your fun, quirky android becomes a link in a bot net peddling god knows what including attacks against people and other illegal activities and media

[-] stevedidwhat_infosec@infosec.pub 26 points 3 days ago* (last edited 10 hours ago)

For anyone interested - I’d you are using umatrix to block shit you can punch these lines into a new text file and import as blocklist, then commit it with the tiny arrow that points left toward the permanent list to save it permanently:

* www[.]googie-anaiytics[.]com * block

* kuurza[.]com * block

* cdn[.]polyfill[.]io * block

* polyfill[.]io * block

* bootcss[.]com * block

* bootcdn[.]net * block

* staticfile[.]org * block

* polyfill[.]com * block

* staticfile[.]net * block

* unionadjs[.]com * block

* xhsbpza[.]com * block

* union[.]macoms[.]la * block

* newcrbpc[.]com * block

Remove the square brackets before saving the file - these are here to prevent hyperlinks and misclicks.

Edit: this is not a bulleted list, every line must start with an asterisk, just in case your instance doesn’t update edits made to comments quickly.

Edit2: added new IOCs

Edit3: MOAR IOCS FOR THE HOARDE

This has almost nothing to do with what you’re talking about.

A Chinese company bought the domain and the service in February and are attacking people in highly specific conditions. (Mobile devices at specific times)

This is an attack. Not negligence, not an uh oh oopsie woopsie fucky wucky. Attack.

Intuit uses pollyfill… and a lot of people use that service.

Cloudflare and fastly wouldn’t be setting up mirrors if it weren’t still being used, I can guarantee that.

[-] stevedidwhat_infosec@infosec.pub 1 points 3 days ago* (last edited 3 days ago)

Not quite!

Try:

mylist = [value for value in range(1,20)]

This says I want to make mylist be a list where each element of the list (called value here) comes from doing a for loop on range, given the parameters 1, and 20.

If you want to change how each element of this list is, you do it in the first bit on “value”

So you could do

mylist = [value*5 for value in range(1,20)] //5,10,15,…,95 (not 100, because ranges go up to the last item, not including it (non-inclusive))

Etc. Hope this makes sense!

Edit: MISSING CLOSING PARENTHESIS DOH

Considering they’re calling the negotiator an idiot, I doubt this is fake or false.

Thanks America. Too busy running fucking counter-vax psyops against the Chinese to be securing the nations security.

Fucking. Morons.

[-] stevedidwhat_infosec@infosec.pub 164 points 4 weeks ago* (last edited 4 weeks ago)

Please don’t fucking touch anything to do with Linux Musk. Please.

view more: ‹ prev next ›

stevedidwhat_infosec

joined 11 months ago