Artis3n

@artis3n@infosec.exchange
27 Followers
64 Following
417 Posts

Just heard AOC say:

"If there are no more good people in the world, then I want to be the last one."

I think I'll go to sleep for the night on that one.

New blog/whitepaper release:

Shostack + Associates is pleased to release our latest whitepaper, Understanding the Four Question Framework for Threat Modeling! It’s free as part of our Black Friday sale, and uhhh, because we like sharing knowledge it’ll remain free.

I wrote this paper because someone once called the questions “surprisingly nuanced,” which I thought was kind, and because I saw even collaborators varying the words. And as I write in the introduction:

People commonly make the mistake of rephrasing the questions. They don’t realize that there are reasons to use the specific framework questions. There’s nuance and intent in the questions, which are meant to be answerable in many ways. Rephrasings often lose nuance, flexibility, or both. Further, consistency in how we say things contributes to consistency in how we do them.

If this isn’t more fun than listening to your Uncle Jack expound on football on Thanksgiving, double your money back!

https://shostack.org/whitepapers/?utm_source=mastodon&utm_medium=posts&utm_campaign=four-question-whitepaper&utm_id=4qframe

Threat Modeling Whitepapers from Shostack + Associates

"On behalf of the WordPress security team, ..." and then many mentions of "fixing a security issue" without specifying what it is. (The patch is, presumably, public since the plugin is OSS and PHP?)

https://wordpress.org/news/2024/10/secure-custom-fields/

I don't have an opinion on the broader Wordpress situation, but seeing a security exception used to wield power in a broader controversy is extremely worrying.

Open source communities trust security teams with exceptional powers, and weakening that trust damages everyone.

Secure Custom Fields – WordPress News

Cars are increasingly surveillance systems on wheels. They spy relentlessly not just on the driver --why are people comfortable with this, or do they not know it's happening? -- but also on the surroundings. Tesla is the worst offender as it keeps trying, unsuccessfully, to do self-driving.

If you own one is these, you are helping make the surveillance state much more pervasive.

Congress and state lawmakers obviously are in favor of all this spying, because they do nothing to stop it.

Microsoft will try the data-scraping Windows Recall feature again in October

Initial Recall preview was lambasted for obvious privacy and security failures.

https://arstechnica.com/gadgets/2024/08/microsoft-will-try-the-data-scraping-windows-recall-feature-again-in-october/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

Microsoft will try the data-scraping Windows Recall feature again in October

Initial Recall preview was lambasted for obvious privacy and security failures.

Ars Technica
Expecting data brokers to care about securing the data they so casually collect, buy, collate and otherwise acquire is pointless. None of them really do, and almost every breach involving a data broker shows this. By definition, their businesses largely rely on collecting records that they already view as public and that this entitles them to collect, resell, etc said data. If that is the fundamental organizing idea of your business model, how much are you going to care about protecting it from mass theft?
Our driving habits are sold by car companies to data brokers for pennies, ranging from a mere 26 cents per car up to 61 cents per car. https://www.eff.org/deeplinks/2024/07/senators-expose-car-companies-terrible-data-privacy-practices
Senators Expose Car Companies’ Terrible Data Privacy Practices

In a letter to the Federal Trade Commission (FTC) last week, Senators Ron Wyden and Edward Markey urged the FTC to investigate several car companies caught selling and sharing customer information without clear consent. Alongside details previously gathered from reporting by The New York Times, the...

Electronic Frontier Foundation
"And then we pushed an update that triggered the consequences of our prior fuckup in failing to bounds check, failing to lint configurations, failing to understand that a config file could be corrupted or wrong and providing an error handling mechanism, and failing to actually test our shit"

A new report finds Boeing’s rockets are built with an unqualified work force

NASA declines to penalize Boeing for the deficiencies.

https://arstechnica.com/space/2024/08/a-new-report-finds-boeings-rockets-are-built-with-an-unqualified-work-force/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

A new report finds Boeing’s rockets are built with an unqualified work force

NASA declines to penalize Boeing for the deficiencies.

Ars Technica
×

So, see, what this -looks- like they're saying is that they've got third parties in to review the code and process.

But those are two separate clauses.

They have two third-parties in to review the -sensor code-

-and-

They are conducting a review of process.

But they are not actually -saying- that the third parties are involved in the process review at all - only the code review.

Perhaps someone ought to ask them to clear that the fuck up.

It's that sticky "we" there, y'see?

"We" -could- be implied to mean the set of crowdstrike, vendor 1, and vendor 2.

But "we" can also refer to crowdstrike the company, or to the personnel of that company.

"We" is one of those words that has -very- tricky scope to it, and can be used to lie to you right to your face.

This whole technical details section is exec-pandering crap.

-this- little fucker is funny tho, 'cuz it implies that if you have an input that cannot be parsed with regular expressions, clownstrike can't handle it.

The next part appears to be an extract from some guy at MS's blog about this shit -

https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/

whiiiich pads out the last half of the document and since it isn't clownstrike's work, but just shit they lifted from someone else's blog, doesn't matter

Windows Security best practices for integrating and managing security tools | Microsoft Security Blog

We examine the recent CrowdStrike outage and provide a technical overview of the root cause.

Microsoft Security Blog

So yeah, only the first six pages have any content on them; two of the findings are duplicates and are just there to pad for length; they -missed- a bunch of other findings; they are committed to a known-broken sensor operations regime and have no clear plans to fix the underlying architectural issues exposed -by- this; and they don't have anyone left in the place who can fucking write worth a damn.

Complete fucking clownshoes. If I were their customer I would be calling for their literal, heart-ripped-from-chest, blood for this.

Also:

Who the everliving fuck -audited- this pile of shit?

Who signed off that -this- was suitable for deployment to federal computers?

Who the fuck did their audit and why the fuck did they not catch -any- of this?

That "compile time" thing earlier is still bugging the shit out of me, especially because the para following doesn't talk about compilation at all.

........y'all.

I -really- suspect that this document was an LLM summary of some collation of internal documents that got some light editing.

Y'all, they didn't even respect us the fuck enough to have an actual human write this out for us.
Not to mention half the fucking document is -someone else's work-

......who has a very uncomfortable looking smile on his blog profile, damn. That must hurt to make that expression.

......there's nothing on here about licensing; anyone know if MS lets you just, like, steal half a blogpost to crap into your document to fill out space?

.....yeah, looking back, that fixation on defining why "channel 291" was pertinent?

A person wouldn't keep referring to it by number, but would use a pronoun phrase. "the updated channel" or similar.

And then with that mishmash in that other para with the whole 20 vs 21 thing.....

Yeah, that's not how a person would write that at all. Certainly not someone who actually understood what was going on.

Yeah.

This is not a professional report in any sense.

None of this has been handled according to professional standards.

The level of negligent disrespect evinced by Crowdstrike utterly beggars belief, and I seriously question why they have the certifications they do, given the flagrant and obvious process violations this report makes evident.

And I seriously question who signed off on certifying them, because this goes well beyond the normal vagaries of corporate incompetence; even for an industry that assumes bad behavior, lack of compliance, and failure, this is a standout.

This goes into levels of negligence akin to civil war era profiteers, who similarly got paid wagonloads of cash for providing a shoddy - literally, that's what the word was coined to reference - defective product for government use.

@munin So it's the very basic, age-old programming adage "sanitize your inputs" not taught anymore? Or is it just that they're all terrible programmers that think they're so good they don't need too worry about things like that?

@StarkRG

this is even more fundamental than that.

This is at the level where "actually check your -whole- work" needs to be fixed first before we can get to such innovative concepts as discussing what an input is.

@munin I guess I interpret "input" to also mean the input to functions. Even in a single-developer project, to just assume that you definitely have never and will never make a mistake in your code seems arrogant, to say the least. And this definitely isn't a single dev, so they're assuming that *nobody* would ever make any mistakes and that technology always functions perfectly. (no verification of data downloaded of the internet?)

Thank you for the breakdown of this clusterfuck.

@StarkRG

np. I was in the mood to tear into something today and that happened to be a fun chewtoy.

Saving this for later perusal, and for passing to people who really ought to know about it (including me).

Thank you.

Calling @Chartodon Spine ...

@munin @StarkRG

@ColinTheMathmo

Your chart is ready, and can be found here:

https://www.solipsys.co.uk/Chartodon/112920897187312739.svg

Things may have changed since I started compiling that, and some things may have been inaccessible.

In particular, the very nature of the fediverse means some toots may never have made it to my instance, in which case I can't see them, and can't include them.

The chart will eventually be deleted, so if you'd like to keep it, make sure you download a copy.

My recent hosting migration has made the upload process fail ... Stand by, I'll fix it as soon as I can.
@munin definitely agree that this report is pretty dang sloppy and unclear, but not sure if the particular quirks you've highlighted are necessarily LLM output? our brain reads it as just "engineering notes hastily compiled into a report by a non-tech writer"

@r

and what's the heavily advertised and pushed in the 'writing' space tool that's being pushed as a way for people to collate and summarize large amounts of data for their personal comprehension?

@munin yeah fair, being funemployed for a bit means that we haven't really seen the LLM hype cycle take off "from the inside"

to us the thing that *really* sticks out the most is that there's a totally different and inconsistent "vibe" as you go through the sections, esp. since this is something we personally explicitly know to watch out for when compiling reports as a team

@r

The more coherent ones read like they're written by a committee.

A lot of them read like they're being written by a -profoundly- traumatized and -acutely- stressed plural system that's gotten absolutely shattered.

Having been involved in supporting those situations in the past, it's a -deeply- upsetting vibe for me, and a lot of llm-generated stuff becomes really acutely stressful to read.

@munin I have audited things knowing full well that they’re just gonna accept-risk as-designed bla-bla-bla all of it and then tell people they had it audited

@0xabad1dea

.......starting to have this creeping feeling that the standards I've held myself to in this area are way the fuck higher than ......standard.

@munin we have two different kinds of customers, those who genuinely want to shake the bugs out of their products before they ship and those who want to legally say “it was audited”. I really hate the latter but I don’t have much control over it
@0xabad1dea @munin yup. that pattern hasn't changed in the past decade and I don't expect it to change in the next decade either. on the one hand I'm glad compliance driven security makes them at least do the bare minimum with some sort of SLA on critical findings, but on the other hand it's deeply frustrating that the bar is so low.
@0xabad1dea @munin even within the same company I have the two same types of internal customers. Some are noncollaborative and will delay sending you material, source code/cleartext firmware or credentials to make your work more difficult.