TheFinalDraw | 2 months ago | on: Stunnel
TheFinalDraw's comments
TheFinalDraw | 2 years ago | on: New seafloor map only 25% done, with 6 years to go
TheFinalDraw | 5 years ago | on: Launch HN: ShareWith (YC W21) – Easily share internal websites securely
TheFinalDraw | 5 years ago | on: Experts: Evidence to support search warrant on Rebekah Jones' home flimsy
You said, “they have an IP address which points to a specific one of those users,” but that’s not actually the case. They have an IP address which has somehow been related to the accused (though how is unclear to me since you note above there’s no linkage of IP/customer/date) — maybe they know she sent an email from that IP address at some point around the time of alleged crimes. But in any case, without providing evidence that the IP address is _only_ associated with the accused, and _not_ with any others with similar opportunity and motive (for example, any others with access to the shared username and password who might want to access the data for similar reasons, or wanted to frame the accused for hacking and put an end to the her very public/politicized efforts), then they don’t really have strong evidence of anything - basically only enough _not_ to rule the accused out of the probably large pool of possible suspects. How many other current or former employees had access to the shared username and password? When were they last changed? How many others who _weren’t_ ever authorized to access the system but could have compromised/gained access to these credentials since then? How many times have they been written down and left on a sticky note in some public or semi-public place? Do they ever have controls in place to prevent guessing/brute forcing the credentials (with one login for shared between all users, automatic account lockouts or resets seems very unlikely).
TheFinalDraw | 8 years ago | on: Passwords Evolved: Authentication Guidance for the Modern Era
I'll add docs and updates if people give a shit. The passwords.dat file in the resources folder is the top 1m most common pws that I compiled from a number of lists available at the time.
I implemented a redis-backed instance of the above common-password bloom filter in a sample Spring app which I was using to show off some features of spring security to a dev (I work in AppSec). You can see the policy and redis config here: https://github.com/milo-minderbinder/spring-ref/blob/indev/s...
And you can see an example of how to wire it up to a Spring Validator here: https://github.com/milo-minderbinder/spring-ref/blob/indev/s...
And you'll find where it's registered as a bean in the SecurityConfig.java file in the config dir with the other Spring java-config classes.
If you want to run it, I dockerized the whole Shebang with docker-compose a whole back, which should be easy to run: https://github.com/milo-minderbinder/docker-spring-ref/tree/...
Hope any of this was meaningful to literally anyone in literally any capacity haha
TheFinalDraw | 9 years ago | on: Super Easy Sequence Diagrams – PlantUML