einaros | 2 years ago | on: Prediction: Threads will be shut down in 12 months or less
einaros's comments
einaros | 2 years ago | on: Prediction: Threads will be shut down in 12 months or less
einaros | 7 years ago | on: Norwegian frigate sinking has far-reaching implications
einaros | 12 years ago | on: Tell HN: Call your mom
And I wasn't the only one to get her support. She was a social worker who dealt with the very heaviest of drug users. She worked tirelessly to help them get a grip on their lives, and often spent her spare time following up on their troubles.
She, and others like her, contribute actual good to this world. I, with all of my inhibitive worries and hollow ambitions, admire them infinitely for that.
einaros | 12 years ago | on: Tell HN: Call your mom
einaros | 12 years ago | on: Tell HN: Call your mom
einaros | 12 years ago | on: Tell HN: Call your mom
einaros | 12 years ago | on: It’s Time to Encrypt the Entire Internet
einaros | 12 years ago | on: Cracking Cloudflare's heartbleed challenge
einaros | 12 years ago | on: Cracking Cloudflare's heartbleed challenge
einaros | 12 years ago | on: Cracking Cloudflare's heartbleed challenge
einaros | 12 years ago | on: Cracking Cloudflare's heartbleed challenge
I would recommend you to gather at least a gigabyte before digging for the key - preferably more. I dumped 43 GB from CloudFlare on Sunday, and found the prime 194 times in that dump. It can be found in much less time, however. Here's a test I just did against the CloudFlare server, resulting in the full prime 34 times in 60 seconds: https://twitter.com/einaros/status/456136820913238016
The code from the second posted you noted (https://news.ycombinator.com/item?id=7577659) isn't mine. That one builds off of the original Python PoC, which fails for a lot of configurations.
The Github code is the first publication I've done. Let me know if you see a server that's vulnerable, that the Github code fails to detect.
einaros | 12 years ago | on: Cracking Cloudflare's heartbleed challenge
The final test I did before publishing yielded ~100Mbit/sec of bleed from the challenge server, and had the prime in a few secs.
I also detailed a couple of other challenge observations here: https://hacking.ventures/rsa-keys-in-heartbleed-memory/
einaros | 12 years ago | on: Heartbleed disclosure timeline: who knew what and when
einaros | 12 years ago | on: New NSA Leak Shows MITM Attacks Against Major Internet Services
Analytics, however, will remain something I'm not overly fond of. For many sites it's unnecessary. For others it's something they could nearly just as easily license and deploy to their own servers. Pulling scripts in from Google Analytics, Statcounter and others -- and especially into privacy concerned apps -- is downright irresponsible.
As I noted here: https://2x.io/read/would-the-nsa-infiltrate-cdns-to-circumve..., even Norway's tax returns site (which hosts info I'd rather not have in any foreign company's hands) use external analytic scripts. They and 90% of the rest of the internet.
No wonder the NSA claim they can circumvent most HTTPS encryption.
einaros | 12 years ago | on: New NSA Leak Shows MITM Attacks Against Major Internet Services
Let's say that the NSA would like to track bitcoin transactions through MtGox. I don't know how easy it would be for them to plug a backdoor into a server in Japan, and let's assume that the NSA can't break the RC4 crypto their web server is configured to use ..
Since MtGox uses Google Analytics, and possibly pull other scripts from Google's CDN, they could either eavesdrop on whatever data comes back from them by default -- or insist that changes are made to ... pick up more.
einaros | 12 years ago | on: New NSA Leak Shows MITM Attacks Against Major Internet Services
Imagine if some foreign service, that is outside of an NSL's reach, has communication that the NSA wants to snoop on. If they can't break the crypto, but that service happens to load jQuery off of Google's CDN, or use Google Analytics, the NSA could pull a MITM attack and manipulate the content of the requested scripts.
Those scripts could rather easily act as proxies for the NSA or others, and either hijack sessions or pull data straight out of the protected services.
I'm tooting my own horn here, but that's exactly the kind of thing this blog post speculates on: https://2x.io/read/would-the-nsa-infiltrate-cdns-to-circumve...
einaros | 12 years ago | on: New NSA Leak Shows MITM Attacks Against Major Internet Services
I wrote a semiparanoid rant about this a couple of days ago ... but didn't think I'd be this close to the truth.
https://2x.io/read/would-the-nsa-infiltrate-cdns-to-circumve...
einaros | 12 years ago | on: New NSA Leak Shows MITM Attacks Against Major Internet Services
https://2x.io/read/would-the-nsa-infiltrate-cdns-to-circumve...
einaros | 12 years ago | on: Local IP discovery with HTML5 WebRTC: Security and privacy risk?