joelanders's comments

joelanders | 10 years ago | on: Shelling Out Sucks (2012)

Is there a reason "fork over" and "shell out" can both (roughly) mean "fork and exec a shell" or the seemingly unrelated phrase "pay?"

joelanders | 11 years ago | on: Show HN: Snapception – Intercept all snapchats received over the network

See links for a bit of reading about how hard it is to break DRM on Spotify or Netflix. They're doing a lot more than Snapchat. The difference between "you just need to reverse engineer the HTTP API to make a 3rd-party client" and "you need to run IDA Pro and PANDA and whatever else" is significant. The latter exploit would have far less reach.

[1] http://moyix.blogspot.de/2014/07/breaking-spotify-drm-with-p...

[2] https://www.usenix.org/node/182951

joelanders | 11 years ago | on: Write every day

Check out the stuff made by Alphasmart. A larger display would be nice for editing.

joelanders | 11 years ago | on: Lost Lessons from 8-Bit BASIC

Regarding machines and discoverability: I think an interesting comparison to flesh out would be computers vs. cars. Compare how tinkerers in each came to be (opening up their parents' car/computer, for example). Compare how "the average user" treats the thing when it breaks. Etc.

joelanders | 12 years ago | on: Replacing a Thinkpad X60 Bootflash Chip

There is an awkward period (after clicking past the warning and before verifying the signed SSL certificate fingerprint) which is no more or less safe than HTTP, but which is more cumbersome and might encourage often-bad behavior in some users. After verifying that the certificate is signed by her (which requires trusting her public key--more hoops), you get some benefit.

It's difficult to weigh the cost/benefit, and nobody is denying that PKI can be awkward.

/thread?

ed: ok, i guess we might still debate the cost/benefit of getting a free cert--i don't really know.

joelanders | 12 years ago | on: Mission Impossible: Hardening Android for Security and Privacy

If you like this, you'll also like Peter Stuge's 30c3 talk: Hardening hardware and choosing a #goodBIOS

"A commodity laptop is analyzed to identify exposed attack surfaces and is then secured on both the hardware and the firmware level against permanent modifications by malicious software as well as quick drive-by hardware attacks by evil maids, ensuring that the machine always powers up to a known good state and significantly raising the bar for an attacker who wants to use the machine against its owner."

http://media.ccc.de/browse/congress/2013/30C3_-_5529_-_en_-_...

And this is the best blog post I know of on the above:

https://blog.patternsinthevoid.net/replacing-a-thinkpad-x60-...

page 1