Jean-Baptiste Maillet

26 Followers
49 Following
325 Posts
Hardcore embedded C/C++ caveman.
Supply chain cybersecurity, SBOM , vulnerability management.
#embedded #linux #oss #psirt
he/him
embedded
linux
oss
psirt
🚗 We traced a car’s life from China to Poland.
By analyzing a BYD Telematic Control Unit, Romain Marchand reconstructed its journey and identified a real-world event from GPS logs alone.
Embedded forensics + OSINT = real stories hidden in data.
👉 https://blog.quarkslab.com/tearing-down-a-car-telematic-unit-and-finding-an-accident-on-facebook.html

Once again, an important standard is behind a paywall: prEN 4709-02 from CENELEC. It matters for both security and safety, and could benefit everyone, yet access remains restricted.

@EUCommission do you plan to force CENELEC to publish and release publicly the standards?

#cenelec #paywall #drone #standard #openstandard

I'll be at the VulnCon next week (remotely that is, from Paris).
Maybe we'll met in the chats?
https://www.first.org/conference/vulncon26/
#vulncon26
CVE Program & FIRST VulnCon 2026

Save the Date: CVE/FIRST VulnCon 2026 & Annual CNA Summit - Scottsdale (US), April 13–16, 2026

FIRST — Forum of Incident Response and Security Teams

If your Open Source project sees a steep increase in number of high quality security reports (mostly done with AI) right now (#curl, Linux kernel, glibc confirmed) please tell me the name of this project.

(I'd like to make a little list for my coming talk on this.)

For hackathon.lu, I was initially unsure what my main project would be, but I ultimately decided to focus on implementing the future GCVE BCP-10.

GCVE-BCP-10: Improved Common Platform Enumeration for GCVE

The idea is combine it with the cpe-guesser and have a registry to facilitate the interaction with the CPE values to handle vendor and product references.

#gcve #cve #cpe #opensource #cybersecurity

🔗 Draft https://discourse.ossbase.org/t/gcve-bcp-10-improved-common-platform-enumeration-for-gcve/1042

🔗 Hackathon https://hackathon.lu/

🔗 https://github.com/vulnerability-lookup/cpe-guesser

GCVE-BCP-10 : Improved Common Platform Enumeration for GCVE

GCVE-BCP-10: Improved Common Platform Enumeration for GCVE Document ID: GCVE-BCP-10 Title: Improved Common Platform Enumeration for GCVE Status: Draft Category: Best Current Practice Updates: CPE-compatible naming and match semantics Author: GCVE.eu Intended use: Platform and product identification, applicability matching, vendor management, and synonym handling in the GCVE ecosystem Abstract This document specifies an improved platform enumeration format for GCVE. The format is intentionally ...

ossbase.org

„By Wednesday morning, Anthropic representatives had used a copyright takedown request to force the removal of more than 8,000 copies and adaptations of the raw Claude Code instructions—known as source code—that developers had shared on programming platform GitHub.“

Because if there’s one thing GenAI companies absolutely don’t take lightly, it’s copyright.

https://www.wsj.com/tech/ai/anthropic-races-to-contain-leak-of-code-behind-claude-ai-agent-4bc5acc7

Claude Code's source code has been leaked via a map file in their NPM registry https://xcancel.com/Fried_rice/status/2038894956459290963 😂

Guess what? Most of code is either slop or even old good regex like for detecting negative sentiment in users prompt which is then logged

https://github.com/chatgptprojects/claude-code/blob/642c7f944bbe5f7e57c05d756ab7fa7c9c5035cc/src/utils/userPromptKeywords.ts#L8

These tools are going to replace 80% of all dev jobs and their plugin is gonna maintain all security and banking code? đŸ€Ą

Chaofan Shou (@Fried_rice)

Claude code source code has been leaked via a map file in their npm registry! Code: https://pub-aea8527898604c1bbb12468b1581d95e.r2.dev/src.zip

Nitter

Vulnerability Research Is Cooked (sockpuppet.org)

https://lwn.net/Articles/1065586/ #LWN #Linux #security

Vulnerability Research Is Cooked (sockpuppet.org)

There is a blog post on sockpuppet.org arguing that we are not prepared for the upcoming flood [...]

LWN.net

If someone comes to me today preaching about “post-quantum” security issues, I’ll remind them of the current state of security: the npm ecosystem gets abused daily, CI pipelines run left and right with full access to cloud services, so-called security devices like F5 and Ivanti are exposed (and compromised) to the internet, mailboxes get compromised just to change an IBAN in a PDF, and a simple phone call is still enough to get someone to hand over an MFA code.

But yes, by all means, let’s focus on post-quantum threats while handing AI tools SSH access like it’s a feature, not a confession.

#cybersecurity #stateoftheworld

Cet article "pourquoi se syndiquer dans l'informatique" m'avait beaucoup fait rĂ©flĂ©chir Ă  l'Ă©poque oĂč il Ă©tait paru. En 2026 la rĂ©sistance Ă  l'IA est un sujet syndical dans tous les syndicats de travailleuses que cĂŽtoie.
https://www.24joursdeweb.fr/2023/pourquoi-se-syndiquer-dans-linformatique
(Nb. À l'Ă©poque oĂč l'article est paru j'y connaissais strictement rien en syndicalisme, c'est vraiment une merveille de pĂ©dagogie)
Pourquoi se syndiquer dans l’informatique ? - 24 jours de web

Quand on parle de syndicalisme, on a souvent l’image de « Jojo-le-syndiquĂ©-de-la-cĂ©gĂ©tĂ© Â», qui brĂ»le des pneus devant l’usine en mangeant des merguez en manif. Ou encore de la mafia qui ne travaille 


24 jours de web