@h3artbl33d@exquisite.social
@h3artbl33d@exquisite.social avatar

h3artbl33d

@h3artbl33d@exquisite.social

Hacker | OpenBSD | InfoSec | Coffee addict | Todays paranoia is tomorrows truth

This profile is from a federated server and may be incomplete. Browse more on the original instance.

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

I am wearing a top today :flan_XD:

Shirt designed and made by my sister from another mister @Banshee

h3artbl33d, to Signal
@h3artbl33d@exquisite.social avatar

Signal on OpenBSD

Rust-powered Signal client for the terminal. Sans Java.

Here is how you do it, pending my port:

$ doas pkg_add git protobuf rust<br></br>$ cargo install --git https://github.com/boxdot/gurk-rs gurk<br></br>$ export PATH=~/.cargo/bin:$PATH<br></br>$ gurk<br></br>

Might want to grab a coffee (or beer, wine, whatever your poison is) while cargo runs.

Enjoy - and as always HACK THE PLANET :flan_hacker:

#OpenBSD #Signal

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

There are new updates for Mastodon, fixing a major security issue, GHSA-jhrq-qvrm-qr36. Admins: time to update your instances once again :flan_hacker:​

#mastoadmin

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

With Microsoft pushing their supercharged spyware soon, today is - like any other day - perfect to make the switch to #OpenBSD. The sane, well-documented, secure OS that isn't bloated and doesn't spy on you.

#RUNBSD

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Whoop. Mastodon is throwing in a change that might just help battle the increase in spam.

This PR will flip open registrations to approval required if the staff (admins/mods) have been inactive over a week.

#mastoadmin

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Nextcloud admins: starting with Nextcloud v28, some applications (like Forms) need an additional MIME mapping:

application/javascript js mjs;<br></br>

The mjs extension is new (ES6 module), apps relying on it fail to load without the MIME type set.

#Nextcloud @nextcloud

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Calling all *BSD developers and aficionados: if you have an interesting story to tell, consider submitting a proposal for a talk - or tutorial at EuroBSDcon 2023: https://2023.eurobsdcon.org/call-for-papers-is-now-open/ :flan_hacker:

The deadline for the call for papers is May, 25th. The event will be held at Coimbra, Portugal - September 14-17 2023 :flan_heart:

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Over a decade ago, I took a leap of faith and became an entrepreneur. It has somewhat escalated - as in: my company incorporated and that I have employees nowadays (still getting used to that, but that is a story for another day).

There are some key lessons that I learned, that I want to share:

  • The single most worthy 'asset' is humans. Treat them with respect. If you don't, you'll be digging your own grave. Listen, reward and pay effin attention. Nobody is perfect - nor are you and I.
  • Having an attitude can be good. The client isn't always right - and if you can explain why you don't want to work on it, it might just open their eyes.
  • Being an entrepreneur often requires taking risk. But do it at your own expense - never, ever at the expense of others.
  • Let go. You can't manage everything - even though your company feels like it is your 'child'. Micro-managing will end up hurting everyone.
  • Always be open to learn and adapt. We are human, bound to make mistakes and fuck up. Be honest and humble. Apologize if you effed up.
  • Never, ever, give tight deadlines. If your estimation is three weeks, communicate double (six weeks). It'll cut you some slack when things don't go according to plans.

1/2 🧵

h3artbl33d,
@h3artbl33d@exquisite.social avatar
  • Again: humans. Employees and workers above everything else. Don't ever throw them under the bus. If you do - I might pay you a visit and give you a deserved slap in the face.

And... Silicon Valley (...and others) should be an example of how not to conduct business. Seriously. Steer clear of VC - as it'll only end up hurting everybody.

As a business owner, you should never, ever be the first beneficiary. Because if you are, you are doing it wrong.

2/2 🧵

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

We become what we behold
We shape our tools and then
our tools shape us
~ Marshall McLuhan

That quote struck me :flan_aww: I have been using #OpenBSD for little over two decades. Back then, it wasn't love at first sight as documented on a blog. It did grow on me, right to the point where I could say that I truly loved it. I still remember socially engineering my mother for permission to get a Puffy tattoo (which was a requirement before turning 18). Much to my surprise, she was not only okay with it, but offered to give it as my birthday present :flan_heart:

Over the years, OpenBSD and the community have been shaping my views on computing, security and privacy. I am incredibly grateful to Theo, to OpenBSD, to the developers, to the contributors and community at large.

You - collectively and without exception - have been a bless. It has been (and continues to be) an honor. I am forever grateful to you all :heartcyber:

(soon to be continued)

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

OpenBSD was right

Newsflash: #OpenBSD is always right.

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

@delta

I run into the issue that deltachat-rpc-server doesn't build on OpenBSD, due to the quinn crate (in particular, quinn-udp). The fix isn't trivial.

Should I file a bug report as an issue in deltachat-core-rust repo or as a feature request / support issue on the forum?

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Oh my :flan_ooh: A big Youtuber with 20M subscribers (Mrwhosetheboss) talks about Enshittification, features @pluralistic right in the intro.

Now that there is some momentum, it might be a good time to help your loved ones move away from big tech and reclaim their privacy. Please help, you all, increase the awareness!

The video in question:

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Another fancy branded vulnerability with a domain, logo and name. This one hits GPUs - even embedded ones like in iPhones.

Meet LeftoverLocals. Ten lines of code can steal secrets from GPUs. Cross boundaries, containers/virtualization do not offer protection or mitigation.

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Upon troubleshooting a hosting issue, I stumbled upon a rather aggressive bot that was crawling the website - for an AI.

The crawler is Claude and the user-agent:

Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)<br></br>

They use thousands of IP addresses from AWS that don't seem to be unique to this bot; the party responsible doesn't publish a list of IPs. They do however mention that it can be blocked by adding this to robots.txt:

User-agent: ClaudeBot<br></br>Disallow: /<br></br>

Adding: Here is an nginx config for WordPress websites.

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Did you know that Mastodon has a nifty NSA-esque feature?

It stores all user IP addresses by default for a year :flan_nooo:

Exquisite retains the IP addresses for 4 (four) hours before being pruned completely.

Should we become the target for abuse, we can increase the retention. But one full year? That is just plain and utter madness - and a complete disregard for privacy and protecting the community :flan_molotov:

#MastoAdmin

h3artbl33d, to Signal
@h3artbl33d@exquisite.social avatar

Molly is an hardened fork of Signal for Android.

It is designed to keep userdata safe, even in the case of a full phone compromise. But that is not where it stops. Not at all:

  • Molly has an official FOSS version with FCM, GMaps etc stripped out,
  • Additionally, there is a UnifiedPush version. Push messages from either a trusted party or selfhosted.
  • It features encryption at rest, secure RAM wiper, automated lock, multi device support and much more.

Now grab a Pixel (preferably 8+ due to MTE), install GrapheneOS and Molly.

While we are on the subject, the upcoming v7 beta will feature usernames and phone number privacy (source). Finally :flan_hurrah:

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Tomaž Zaman is designing a router that will eventually hit the market. I find watching the process immensely intesting. Be sure to check out the other videos on the channel.

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

A map of Europe drawn from memory

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Signal isn't perfect - really - but we need those usernames. "The competition" which has usernames is helping fascist dictators find dissidents to jail and murder them.

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar
h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

From what I gather, from the very limited information available: the signedness folks are being vocal about an NFS exploit and dubbing it as an OpenBSD RCE.

I have no reason to assume that this is misinformation, given the track record of these folks. However: NFS is disabled by default.

If you are running nfsd, especially exposed publicly, you might want to disable it until this vulnerability is patched.

#OpenBSD :openbsd:

h3artbl33d,
@h3artbl33d@exquisite.social avatar

Furthermore, both me and PurpleRaiN (from @secbsd fame) went through the source tree. Seems that this is still unpatched.

From that, there is one logical conclusion: the vulnerability is not shared with #OpenBSD. Because if it were, it'll be patched faster than one can pronounce "remote code execution".

Hence, this is irresponsible behaviour. "We have a RCE exploit for NFS on OpenBSD, but we aren't disclosing any details, nah-nah".

ParadeGrotesque, to random
@ParadeGrotesque@mastodon.sdf.org avatar

Ooops... ☹️

grep -ic 2024 /etc/hosts.deny

2363

That is 2363 unique hosts added to the deny list because they tried to brute-force SSH since the beginning of the year. Today is March 4th, 64 days into the year. That's about 36 new hosts per day.

It is quite obvious to me that there is a concerted effort to attack SSH ports opened on the Internet.

Anyone else see this?

h3artbl33d,
@h3artbl33d@exquisite.social avatar

@ParadeGrotesque

Yep! I do use #iBlock, the number of (perma)blocked IPs is madness. I do have to add that it isn't only the SSH port, but also 445/tcp (SMB), 3389/tcp (RDP) and others.

All that while I already use pf-badhost with a fair number of blocklists. The internet really is a clusterf*ck nowadays.

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

Our platform uses military grade end-to-end encryption to protect your data from hackers. We recently have upped the ante, by switching to ROT-17576.

h3artbl33d,
@h3artbl33d@exquisite.social avatar

Remember when ROT-13 was all the rage? The initial version of our platform already took that to the next level by implementing ROT-26.

Now we have truly outdone ourselves. Our internal R&D spent years and years developing ROT-17576 - and now finally having it implemented makes us immensely proud.

h3artbl33d, to random
@h3artbl33d@exquisite.social avatar

A new episode in Torvalds' "all bugs are equal" bullshit. Citing Ian Coldwater on the birdsite:

The Linux kernel became a CNA and are planning on issuing a CVE for every bug whether security-related or not “because security fixes aren’t special”. It’s blatant sabotage of a system people rely on and it’s going to fuck all kinds of systems that rely on it.

h3artbl33d,
@h3artbl33d@exquisite.social avatar

It is a very just observation of the state of Linux. There were some really good initiatives aiming to systematically improve the security of Linux - which were met with hostility, discontempt etc.

One example: grsecurity - which offers systematic and foundational improvements and hardening. Originally, it was submitted as patches to merge upstream.

Grsecurity has a paid-for model nowadays, due to the 'toxicity' of the project they were contributing to.

Just one of the massive numbers of examples.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • mdbf
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • JUstTest
  • GTA5RPClips
  • tacticalgear
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • ethstaker
  • anitta
  • Leos
  • cisconetworking
  • provamag3
  • lostlight
  • All magazines