Will Dormann

4.1K Followers
567 Following
2.6K Posts
I play with vulnerabilities and exploits.
I used to be https://twitter.com/wdormann but Twitter has become unbearable, so here I am.
Related side note:
Due to feature creep and excessive CPU usage, I switched to WezTerm last year and haven't looked back.
Will Dormann (@[email protected])

After realizing the macOS Terminal isn't compatible with tmux's page-up, I quickly discovered iTerm as an alternative. However, between feature creep and obnoxiously high CPU usage, I've moved on to wezterm (after poking around at some inferior alternatives). 3 months in, I can confidently say that we have a winner. The main nit that I had was that by default it was hard to see the window borders if the terminal was on top of something black. Putting this in `~/.wezterm.lua` fixed it for me: ``` local wezterm = require 'wezterm' local config = {} -- keep native resizable border; also keep the macOS shadow on config.window_decorations = "RESIZE|MACOS_FORCE_ENABLE_SHADOW" -- draw a super-thin internal border to outline corners/edges config.window_frame = { -- widths/heights accept “cell” units; small fractions are thin border_left_width = '0.15cell', border_right_width = '0.15cell', border_top_height = '0.10cell', border_bottom_height= '0.15cell', -- subtle grey that’s visible on black border_left_color = '#444444', border_right_color = '#444444', border_top_color = '#444444', border_bottom_color = '#444444', } -- no padding—let the border sit right at the edge config.window_padding = { left = 0, right = 0, top = 0, bottom = 0 } return config ```

Infosec Exchange
The folks at iTerm2 figured out a way to get arbitrary code execution as the result of cat <file>, which is... impressive?
TIL that medical and religious ski masks are a thing?
Your push notifications can betray your privacy. Here are the settings you can enable to do something about that: https://www.eff.org/deeplinks/2026/04/how-push-notifications-can-betray-your-privacy-and-what-do-about-it
How Push Notifications Can Betray Your Privacy (and What to Do About It)

A phone’s push notifications can contain a significant amount of information about you, your communications, and what you do throughout the day. And there are myriad ways that law enforcement can access the content or metadata of push notifications. Let’s fix that.

Electronic Frontier Foundation
I thought that ClickFix was silly, but we've clearly entered the "please fire this footgun" stage of infosec.
https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/

so now there’s a proposed federal U.S. bill that mandates EVERY OS to verify your age on setup, regardless if you’re an adult or not or if you even want this feature…
and they call it the Parents Decide Act.

excellent  

https://itsfoss.com/news/os-level-age-verification-across-us/

#ageverification #bigtech #Linux

Oh No! Now A Federal Bill Wants OS-Level Age Verification for Everyone in the USA

If passed, the bill would apply across the U.S., unlike the state-level laws already around.

It's FOSS

Interestingly, a good chunk of the [(12/73) AV detections on VT](https://www.virustotal.com/gui/file/d84250e2ad053ab4097d0591933935573e4cab3e975360004a126abc102dc6f6 for this RedSun.exe exploit are due to the EICAR part being detected, as opposed to what the exploit does, despite the string being reversed in the code. (note: this reversal apparently does nothing to prevent EICAR detection in the AV engines on VT)

If we make the EICAR string less obvious (encrypted), the detections drop to 5.

Defender currently doesn't detect the exploit in either case.

FCC exempts Netgear from ban on foreign routers, doesn't explain why

Trump FCC starts handing out exemptions to its ban on foreign-made routers.

Ars Technica
OpenAI is getting on board too.
To "protect against identity fraud." 😂

From the GitHub repo:

When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that's supposed to protect decides that it is a good idea to just rewrite the file it found again to it's original location.

This Exploit uses the "Cloud Files API", writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction/reparse point to redirect the file rewrite (with new contents) to C:\Windows\system32\TieringEngineService.exe. At this point, the Cloud Files Infrastructure runs the attacker-planted TieringEngineService.exe (which is the RedSun.exe exploit itself) as SYSTEM. Game over.