95 Followers
136 Following
709 Posts
Nerd.
Ich mach gerne Dinge in diesem Internet; Oder auch gerne ausserhalb.
Hauptsache Spass am Gerät
githubhttps://github.com/spahan
Matrix@hanfi:milliways.info
CCC/GPN/etcDect 2622
Repeat after me: Separating username and password fields on separate (fucking responsive) page WILL NOT INCREASE A FUCKING SECURITY IN ANY WAY! IT WILL JUST MAKE THE PASSWORD MANAGERS TO WORK WORSE AND THUS IT WILL FUCKING DECREASE THE SECURITY!!!

Irgendwie fehlt mir ein simples umgangssprachliches Verb für *etwas mit KI generieren". Mir ist vor allem wichtig, dass dabei sprachlich die Verantwortung für das Ergebnis beim Menschen verortet ist.

Ich schlage vor: etwas aus der KI ziehen

Positiv verwendbar (wichtig, damit die Bereitschaft zur Transparenz steigt): "Guck mal, was ich aus der KI gezogen habe!"

Ablehnend verwendbar: "Hast du den Quatsch aus einer KI gezogen?"

Erklärend verwendbar: "Wenn du das nächste Mal etwas aus einer KI ziehst, musst du es prüfen, ehe du es glaubst/verbreitest/whatever."

Sometimes there is no why, only do

About 1.5 years ago my friend was (falsely) accused of terrorism.

All of their electronic devices were seized, plus my stash of hard drives (stored at their place for reasons).

Of course police didn’t find any evidence. Culprit that impersonated my friend (and many others) got arrested recently (article in Polish).

Police returned the hardware few months ago and I found that all of my drives are now e-waste thanks to their carelessness, which made me (understandably) furious. I even considered suing them.

Said very good friend of mine entrusted me with their personal phone and pattern to unlock it. I charged and booted it for the first time since February 2024 and were curious how it was pwned. I knew police used cellebrite on it.

My crime is that of curiosity

As it turns out, police forgot to clean after themselves (there was an attempt) and left payloads, logs, and backdoor intact.

Took a peek at the first-stage payload but it’s too complex for me to reverse-engineer on my own. It’s relatively well obfuscated, but I can tell it’s using RNDIS (likely spawning a server?) and TLS-encrypted connection to talk to Cellebrite box.

If you’re a security researcher (or just curious nerd with more spoons than me) and you would like to take a look - here you go.

Payload was uploaded onto the device on 2024-02-21. If you want to re-create the environment it was executed on, you will need a:

  • Samsung Z Flip3 5G (SM-F711B)
  • Android build SP2A_220305.013.F711BXXS2CVHF

Rough execution flow:

1. USB device plugged in (Cellebrite Cheetah) 2. USB controller switches to host mode 3. Gadget switching USB VID/PID to load kernel modules (hid_steam, hid_apple, hid_prodikeys, hid_logitech_hidpp, hid_magicmouse, hid_aksys and tries to exploit quirks) 4. Module 'hid_aksys' leaks memory 5. Screen unlocked 6. ADB key '82:E5:EA:F3:DC:D1:7D:CA:65:3C:D4:58:65:CD:81:8E' added to trusted keys on the device 7. First-stage payload '/data/local/tmp/falcon' copied onto the device. 8. Second-stage payload (seemingly) executed as root: - /data/local/tmp/chrome-command-line - /data/local/tmp/android-webview-command-line - /data/local/tmp/webview-command-line - /data/local/tmp/content-shell-command-line - /data/local/tmp/frida-server-16.1.4-android-arm64 - /data/local/tmp/init 9. Data extraction (photos, telegram, firefox, downloads)

Have fun!

Słynny bomber zatrzymany – ogromny sukces organów ścigania | Zaufana Trzecia Strona

Prokuratura Regionalna w Poznaniu oraz poznańskie CBZC ogłosiły właśnie wielki sukces - udało się znaleźć i zatrzymać sprawcę mnóstwa alarmów bombowych, który bezkarnie działał od…

Zaufana Trzecia Strona

Randall Munroe's #XKCD comic has the power to make you laugh, to make you think ... and sometimes to make you cry. For the right reasons.

Wishing another fifteen (and many more) to Randall Munroe, his wife (name unknown but it's not Megan), and everyone else. #FuckCancer

Two Years

xkcd
#deutschebahn wollt ihr keine Kunden? ich musste 3 Browser verwenden, weil ich in einen "du bist ein Bot" Fehler gerannt bin. Eure eigene App hielt mich für nen Bot! wie massiv kann man IT versagen? Deutsche Bahn so "Ja".
c3cat katzen for the win

The Python Software Foundation shows more spine than every single tech giant in just one single decision.

> Diversity, equity, and inclusion are core to the PSF’s values

https://pyfound.blogspot.com/2025/10/NSF-funding-statement.html

The PSF has withdrawn a $1.5 million proposal to US government grant program

In January 2025, the PSF submitted a proposal to the US government National Science Foundation under the Safety, Security, and Privacy of Op...

You know you're in a Big Company when you need VP approval to plug in a USB drive, but nobody blinks when you spin up an entire file server for "testing."
Ich trage diese Sticker seit Jahren mit mir. Und finally ist der Use-Case eingetreten. #prepared #sticker #hackthepromise