19 Followers
369 Following
119 Posts

上得山多终遇虎

https://twitter.com/caspicat

@osxreverser have you seen this post? Would like to hear your thoughts

https://blog.mozilla.org/en/firefox/hardening-firefox-anthropic-red-team/

Yeah writing exploits is still hard and LLMs can't do it, but attackers can now find lots of bugs cheaply? On security engineering side, this should help to find and patch things in bulk too. Does anything change in the real world security though?

Hardening Firefox with Anthropic’s Red Team  | The Mozilla Blog

For more than two decades, Firefox has been one of the most scrutinized and security-hardened codebases on the web. Open source means our code is visible,

Love to hear from my readers.🙏
@cR0w I think you might enjoy this industry review article lol https://www.tp-link.com/us/landing/security-commitment/
TP-Link - Our Security Commitment

We carefully control our own supply chains to optimize value and security, implement rigorous secure product development and testing processes, and take timely and appropriate action to mitigate known vulnerabilities. We constantly assess potential security risks to our U.S. operations, customers, and supply chain.

TP-Link

Good morning. Starlink has now launched more than TEN THOUSAND satellites into orbit. Nearly 1400 have already been burned up in the atmosphere so far.

Here's a "lovely" image from my Kuiper Belt discovery program with dozens of satellite streaks in a 3 hour stacked exposure from CFHT. This was from 2022, when there were thousands fewer satellites... This is dumb.

Image credit: P. Cowan/W. Fraser/S. Lawler/CLASSY Survey Team

(The small streaks that are similar lengths are actually asteroids!)

So, why should businesses trust Google again lol? #google #GoogleWorkspace #googlecloud #security
omg @b0rk ‘s Wizard Zines are SO GORGEOUS IN PRINT. I’ve been enjoying them digitally but actually having them in your hand to flip through is next level. Useful and inspiring. I bought the full set and every one is a gem. 💎 wizardzines.com
Everyone makes a big deal about the people who designed and built Voyager 1 because it was supposed to last 4 years and it’s lasted for 47, but all that means is they spent money on reliability that could have been returned to shareholders in a stock buyback.

CVE-2024-32896 which is marked as being actively exploited in the wild in the June 2024 Pixel Update Bulletin is the 2nd part of the fix for CVE-2024-29748 vulnerability we described here:

https://grapheneos.social/@GrapheneOS/112204428984003954

As we explained there, none of this is actually Pixel specific.

Bulletin:

https://source.android.com/docs/security/bulletin/pixel/2024-06-01

Attribution to us:

https://source.android.com/docs/security/overview/acknowledgements

GrapheneOS (@[email protected])

April release of the Pixel boot chain firmware includes fixes for 2 vulnerabilities reported by GrapheneOS which are being actively exploited in the wild by forensic companies: https://source.android.com/docs/security/bulletin/pixel/2024-04-01 https://source.android.com/docs/security/overview/acknowledgements These are assigned CVE-2024-29745 and CVE-2024-29748.

GrapheneOS Mastodon

i got this Nokia N900 a couple of weeks ago! a very cool smartphone that (I think) feels more like a mini computer in some ways

i've had a lot of fun tinkering with this, exploring the original Maemo OS (with the older software that was ported to it in the repos), as well as installing postmarketOS. I'll definitely try out Maemo Leste (the updated community version of Maemo) as well at some point

#postmarketos

@jeromesegura @ericlaw Also worth noting is that any A/V engine that listens to the AMSI data stream will also be able to block the copy + pasted code before it runs. Most engines do this nowadays.

https://learn.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portal

Antimalware Scan Interface (AMSI) - Win32 apps

The Antimalware Scan Interface (AMSI) is a versatile interface standard that allows your applications and services to integrate with any antimalware product that's present on a machine.