@a1ba@suya.place
@a1ba@suya.place avatar

a1ba

@a1ba@suya.place

Male.
26.
Pronouns: he/him/any.
Owner of suya.place and pleromashit.nexus.
Xash3D FWGS maintainer. Elbrus researcher.
Low quality Linux programmer by day. Reverse-engineer by night.
KZ expat in RU, Moscow.

Avatar source: https://twitter.com/uruchi_k0me/status/1757008069589115313

Russian: rwx
English: rw-
Feel free to correct my English grammar mistakes!

This profile is from a federated server and may be incomplete. Browse more on the original instance.

a1ba, to random
@a1ba@suya.place avatar

interrupts

a1ba, to random
@a1ba@suya.place avatar

babe wake up new chess piece has dropped

a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to Cat
@a1ba@suya.place avatar

#cat
That's how dishwashers work

a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar

https://notes.valdikss.org.ru/jabber.ru-mitm/

TL;DR: we have discovered XMPP (Jabber) instant messaging protocol encrypted TLS connection wiretapping (Man-in-the-Middle attack) of jabber.ru (aka xmpp.ru) service’s servers on Hetzner and Linode hosting providers in Germany.
The attacker has issued several new TLS certificates using Let’s Encrypt service which were used to hijack encrypted STARTTLS connections on port 5222 using transparent MiTM proxy. The attack was discovered due to expiration of one of the MiTM certificates, which haven’t been reissued.
There are no indications of the server breach or spoofing attacks on the network segment, quite the contrary: the traffic redirection has been configured on the hosting provider network.
The wiretapping may have lasted for up to 6 months overall (90 days confirmed). We believe this is lawful interception Hetzner and Linode were forced to setup.

a1ba, to random
@a1ba@suya.place avatar

Happy QA Day

a1ba, to random
@a1ba@suya.place avatar
a1ba, to random
@a1ba@suya.place avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • everett
  • magazineikmin
  • mdbf
  • thenastyranch
  • khanakhh
  • rosin
  • Youngstown
  • ethstaker
  • slotface
  • modclub
  • kavyap
  • DreamBathrooms
  • Durango
  • provamag3
  • ngwrru68w68
  • InstantRegret
  • tacticalgear
  • GTA5RPClips
  • cubers
  • normalnudes
  • osvaldo12
  • tester
  • anitta
  • cisconetworking
  • megavids
  • Leos
  • lostlight
  • All magazines