@furicle

310 Followers
645 Following
6K Posts

typical SMB sysadmin geek, father of three, husband of one, he/him, trying to be a nicer weirdo

#sysadmin #linux #windows #bash #powershell #python #jackOfAllTrades
#curling #canoeing #motorcycles

githubhttps://github.com/furicle
bloghttps://www.furicle.org
How do you move to your conclusions?
Step
Walk
Run
Jump
Poll ends at .
@CoolBlenderKitten @sindarina somewhere between shambling and crawling maybe?
@falkheiland well, on that list it's under diagnostics... Which seems weird too. I could buy 'read' ?
Shrug. I'm just whining
@falkheiland I understand that. But the vast majority of commands in powershell use the get- verb for retrieving data, regardless of the mechanism or data source.
Ah, synonym rolls, just like grammar used to make.

why is it `resolve-dnsname` and not `get-dnsname` ?

I mean the oddball verb seems pointless to me

#powershell #justGrumbling

Progs have nerves of steel.

#gamedev

https://github.com/Nightmare-Eclipse/YellowKey

Now why would I say this is a backdoor ? The component that is responsible for this bug is not present anywhere (even in the internet) except inside WinRE image and what makes it raise suspicions is the fact that the exact same component is also present with the exact same name in a normal windows installation but without the functionalities that trigger the bitlocker bypass issue. Why ? I just can't come up with an explanation beside the fact that this was intentional. Also for whatever reason, only windows 11 (+Server 2022/2025) are affect, windows 10 is not.

GitHub - Nightmare-Eclipse/YellowKey: YellowKey Bitlocker Bypass Vulnerability

YellowKey Bitlocker Bypass Vulnerability. Contribute to Nightmare-Eclipse/YellowKey development by creating an account on GitHub.

GitHub
@K4_713 well that's certainly a hot take...