Doug Wilson 

196 Followers
303 Following
741 Posts

Washington DC area InfoSec person.

Cyberpunk is here, it's just not evenly distributed.

Mad respect to badge designers for #defcon this year. GB emulator and furry pcb makes me want to hack around after the con like no other official badge has in years past with injecting my own pixel art, GB Studio projects and play with making my own raccoon shell to encase the pcb
Another Brick in the Wall Pt.2 during #linecon - kind of fits #defcon #defcon32

That was quick #defcon #defcon32

(Honestly, it just could be a hardware problem with the machine, but timing. . . 🤷🤷‍♀️)

I did a bunch of interviews today and something really stuck with me - being told that a lot of politicians are trying to decide if climate change or infrastructure cybersecurity is more pressing.

Climate change deeply impacts geopolitics and military policy. Therefore it is a cybersecurity issue. The DoD has always understood this. You can’t look at the “APTs” and terrorist orgs we deal with and not consider how climate impacts will continue to motivate them.

🎯🎯🎯
The xz discovery - tied to a small (to a human) variation in sshd response times - reminds me of Clifford Stoll’s 25c accounting discrepancy in the Cuckoo’s Egg…
We undervalue expertise and attention to detail at our own peril.
Hoping @AndresFreundTec gets all the kudos he deserves.

Here's a refresher on how to think about stories in the news from a "secure by design" standpoint. Many stories about compromises of consumer devices and apps are unfortunately overstated or outright hoaxes (what I call "hacklore"). Some sample questions that we should ask:

-Which operating systems, apps, etc. are affected? What versions?

-What did the software/hardware manufacturer say in response to the alleged vulnerability? Are they going to address it in a future version?

-How can users determine if the attackers successfully compromised them?

Questions like this can help us urge technology companies to improve the security of their products. Or, in some cases, it can reveal the alleged allegations as incredibly rare, or even as hoaxes.

Reporters should pay special attention to the full list of questions here:

https://www.cisa.gov/news-events/news/applying-secure-design-thinking-events-news

Now, it does become a bigger problem if the current spammers publish their source code and more join in.

There’s absolutely no effective controls to stop it - here is the Wild West still - so the elephant is the room is anybody can flip the table at present.

The good news is much of the anti spam and anti phish technologies over the years (Real time Block Lists etc) can be reworked for here. The bad news is that’s a long way off realistically.

The good news is that very few spams are getting through to infosec.exchange people now. The bad news is that's because I've implemented instance blocks/limits for most of the fediverse.

Introducing Citadel! Citadel is a tool for Mastodon admins that makes it quick and easy to find + suspend spammers in one click!

Eventually Citadel will have more tools, but I wanted to get this out ASAP to help server admins.

It's a client-side app, no server. Everything's all in your browser.

Give it a shot: https://citadel.samw.dev

View source: https://github.com/samwightt/citadel

(also note that after you log in you will ned to reload the page)

#MastoAdmin #FediBlock #FediBlockMeta #Admin #Spam

Citadel