Neil Madden

886 Followers
354 Following
1.9K Posts
Author: API Security in Action (Manning), CVE-2022-21449. I'm on smoko so leave me alone.
Bookhttps://www.manning.com/books/api-security-in-action
Bloghttps://neilmadden.blog/
Githubhttps://github.com/NeilMadden
Newsletterhttps://buttondown.email/illuminatedsecurity
Consultinghttps://illuminated-security.com/
The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin

RE: https://flipboard.com/@axiosnews/axios-1ijujvslz/-/a-BNwrY6v2R5eKB_LoijMwpA%3Aa%3A2150299410-%2F0

Well this gives the lie to Anthropic’s notion that they’re being responsible by not publicly releasing the model. NSA are consistently one of the most irresponsible cybersecurity orgs in the world.

Top tip for anyone who’s electric car window stops working when wound down, like mine has: a plastic rubble sack with a bottle of water in the bottom makes a very effective and quick rain cover until you can get is sorted. Just trap the top in the door and let it hang down, no tape needed.
#cars

I reported an insecure DKIM key to Deutsche Telekom / T-Systems. They first asked me to further explain things (not sure why 'Here's your DKIM private key' needs more explanation, but whatever...). Then they told me it's out of scope for their bugbounty.

I guess then there's really no reason not to tell you: They have a 384 bit RSA DKIM key configured at: dkim._domainkey.t-systems.nl

384 bit RSA is... how shall I put it? I think 512 bit is the lowest RSA key size that was ever really used. 384 bit RSA is crackable in a few hours on a modern PC (using cado-nfs). The private key is:
-----BEGIN RSA PRIVATE KEY-----
MIHxAgEAAjEAtTliQYV2Xvx1OGkDyOL799BTFEuobY2dn2AgtiKCQgrh78NVK1JK
j0yRXgNnPpGBAgMBAAECMF0t+TBZUCi8xATSMij7VLTxv5Xi5OIXesNiXOKtYIRP
LkpYfR5PggaMScfbmqSssQIZAMwOhm9d7Y7Qi7I2j1AlYbiqdtqO54T7FQIZAONa
9dJFkC6lM3EPXR+0SZ4dqwwpiM0nvQIYYgz8thi5JK264ohq9sTvnu9yKvUN9I09
AhgfgMYZKcxtujRjkSZtMzUUNLYzzDmJe90CGDKwqcBI0v9ChaR8WHht+/chMdxj
7ez94w==
-----END RSA PRIVATE KEY-----

Average number of hours between #curl security reports

Material for a pending presentation

I wrote up in the TLS mailing list why I think composite signatures (ML-DSA + ECDSA/RSA) are a net negative, will hurt the ecosystem, and should not be implemented.

Hybrid key exchange was simple and self-contained. Hybrid signatures would be a mountain of complexity in code responsible for half of sev:crit in crypto libraries since 2020.

https://mailarchive.ietf.org/arch/msg/tls/oh3jmmkHzHdp1hk4R4M9QjkmvBk/

[TLS] Re: Composite ML-DSA

Search IETF mail list archives

Been staring at the same Google Doc for an hour now and have written three words and then deleted them. Send motivation.

Are "device bound session credentials" really device bound, or is that a nice name for something that's hard to steal and use?

When I look at https://developer.chrome.com/docs/web-platform/device-bound-session-credentials , it looks like the attacker can steal them, but only use them in the next ten minutes?

Device Bound Session Credentials (DBSC)  |  Web Platform  |  Chrome for Developers

Learn how to enhance your web application's security by integrating Device Bound Session Credentials (DBSC) to protect against session hijacking.

Chrome for Developers

Mythos and its impact on security

I’m sure by now you’ve all read the news about Anthropic’s new “Mythos” model and its apparently “dangerous” capabilities in finding security vulnerabilities. I’m sure everyone reading this also has opinions about that. Well, here are a few of mine.

http://neilmadden.blog/2026/04/14/mythos-and-its-impact-on-security/

Mythos and its impact on security

I’m sure by now you’ve all read the news about Anthropic’s new “Mythos” model and its apparently “dangerous” capabilities in finding security vulnerabilities. I’m sure everyone reading this also ha…

Neil Madden

@bagder Responsible Disclosure is just whack-o-crazy now.

Everything should be a bug, open and visible for everyone right away.