Super Sheep

210 Followers
532 Following
198 Posts
When these frail shadows we inhabit now have quit the stage, we'll meet and raise a glass again together in Valhalla.
Bloghttps://musings.konundrum.org/
Twitterhttps://twitter.com/qutluch
WWWhttps://konundrum.org/
Keybasecquigley

Linux has made the most complicated & broken audio setup I've ever dealt with. For years it has always been an abomination but it's even worse than it ever was today with pipewire and wireplumber.

I have a Linux laptop for work and my DAC is almost unusable because of constant bursts of static. I've spent two days reading the struggles people have gone through with these packages. Configuring conf files and writing Lua. It's ridiculous. People talk about The Year Of The Linux desktop but it will never happen because developers for these systems think everyone can just sudo their way around the problems, ask on forums for help and writing 40 lines of configuration file or Lua or god know what to fix the issue as if it's no thing. It doesn't work in the corporate world.

I say The Year Of The #FreeBSD desktop where I've literally never had any issues or major complications with audio ever in the last 25 years but I've always lost hours to Linux audio problems.

ucutils (helpers for the Unicorn Emulator) is now published to PyPI: https://pypi.org/project/ucutils/
ucutils

Convenience helpers for working with the Unicorn emulator

PyPI
Anyone running #FreeBSD using PPPoE for 1Gb FTTH? Looking for speed reports. I keep reading about performance problems on FreeBSD with PPPoE and unable to achieve full speeds. I've wanted to replace my current router for a while but not if I won't be able to make full use of the line.

China targeted and might have held for months access to the infrastructure used to do wiretaps on the AT&T and Verizon networks.

This is a huge "told you so" moment for the cryptographic community that has been saying that such infrastructure does present a huge risk to national security. China reportedly used this capability for intelligence collection, obviously without a warrant ...

https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b?st=C5ywbp&reflink=desktopwebshare_permalink

#CUPS vuln shall now to referred to from now as "Cupstorm in a Teapot".

Heh, CUPS. I've been building every #FreeBSD box for as long as I can remember without #CUPS.

OPTIONS_UNSET+=CUPS

Vulnerability feels like it was over hyped, IMO.

I'm absolutely gutted I won't make it to EuroBSDCon in Dublin this year. I've been using FreeBSD every day for 25 years now. It's my favourite operating system and a true passion for me. I've always wanted to attend :( I hope everyone has a great time! #EuroBSDcon #EuroBSDCon2024 #BSD

Revisiting 2 of the 5 docs from the Snowden leaks that mention 'cookies'.

GCHQ 2009 on 'target detection identifiers':
https://snowden.glendon.yorku.ca/items/show/188/

NSA 2011 on 'selector types':
https://snowden.glendon.yorku.ca/items/show/172

...featuring cookie/browser IDs from Google/Doubleclick, Facebook, Microsoft and many more.

It's breathtaking how the surveillance marketing industry has still managed to claim for many years that unique personal identifiers processed in the web browser are 'anonymous', and sometimes still does.

Target Detection Identifiers · Snowden Archive

Fantastic work by @amlw - xzbot

Exploration of the xz backdoor (CVE-2024-3094). Includes the following:

* honeypot: fake vulnerable server to detect exploit attempts

* ed448 patch: patch liblzma.so to use our own ED448 public key

* backdoor format: format of the backdoor payload

* backdoor demo: cli to trigger the RCE assuming knowledge of the ED448 private key

https://github.com/amlweems/xzbot

GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)

notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) - amlweems/xzbot

GitHub
That's me all caught up now! I will probably commit in batches where I can't do daily for another while https://github.com/100DaysofYARA/2024/pull/113 Made some updates to previous rules looking for Rust & Golang FreeBSD kernel modules with inspiration from @captainGeech rules. And also added two rules looking for suspicious drivers. #100DaysofYARA
All caught up by schrodyn · Pull Request #113 · 100DaysofYARA/2024

Rules shared by the community from 100 Days of YARA 2024 - All caught up by schrodyn · Pull Request #113 · 100DaysofYARA/2024

GitHub