jack daniel

18 Followers
90 Following
65 Posts

software engineer... Amazonian.. blue team security... And not really jack or daniel

Doing Masters in Infosec Management now

Didn't realize my wireless plan capped tethering speeds, but now it makes sense. When your phone gets ~10-15 mbps and your tethered computer gets .5 or .6 consistently, you know they're screwing w/ the service you paid for.

Welp, I'm ashamed it took me this long to realize, but changing the TTL on my computer seems to have released the throttling.

https://www.reddit.com/r/Android/comments/cmxp66/2019_bypass_verizon_hotspot_throttle_no_root/

2019: Bypass Verizon Hotspot Throttle (NO ROOT)

So this method is pretty straight forward and doesn't require root. After going thru my 15GB in a week while camping, Verizon throttled my...

reddit
@cirriustech do you have an updated link?
The rest of the world: 36 meters wide
Americans:
@Wrewdison @cinja congratulations and good luck on the new chapter!!
Happy #ProgrammersDay! Here, have this related Optipess comic. Credit https://www.optipess.com #programming #softwaredevelopment
Optipess – A webcomic. On the Internet.

TIL about McCumber cube. So everyone knows about the CIA triad. All of the info sec books talk about the CIA triad extensively. Now imagine making a 3D rubiks cube version off of the CIA triad. That's the McCumber cube.
It has 3 main dimensions which are further divided into 3 goals.

Dimension 1 - InfoSec properties - Confidentiality, Integrity, Availability
Dimension 2 - Data and its states - At rest, in processing, in transit
Dimension 3 - Security Measures - Policy/Procedure , Technology, Training/Education.

Ohkay but how do we use it ?
It helps to evaluate if the info sec program you are implementing is tackling all the different combinations of scenarios.
Example: Do you have a POLICY regarding data CONFIDENTIALITY for DATA AT REST? Here we are evaluating based on one property from each of the 3 dimensions.

Is there a visual representation for this:
https://ioc.pub/url/snake-goat-panda

More reading:
https://ioc.pub/pasta/sheep-pony

The McCumber Cube and CIA Triad | NCyTE Center

Many people are surprised to learn that weak cryptography systems (including any systems of any ostensible strength with mandated or other backdoors) are vastly more dangerous than using NO cryptography at all.

Why? Because if someone is lulled into complacency and passes their private information through a compromised system as defined above, it becomes vulnerable to criminal and/or illicit government abuse.

On the other hand, if you KNOW that a communications channel is not encrypted, you know what the limits are about what you should or should not pass through that channel.

Interesting, eh?

I was the victim of an extremely clever card fraud/social engineering hack.

Well, partly a victim since I managed to stop it.

I was called by my bank, as they wanted to “verify some suspect transactions on my account”.

Then things got weird…

🧵

@bbdd333 @SwiftOnSecurity this hits different!!