jwcrux | 1 year ago | on: RAG Logger: An Open-Source Alternative to LangSmith
jwcrux's comments
jwcrux | 1 year ago | on: Working with PaloAlto to identify CVE-2024-2550
Isn’t this blog post effectively “we patched our firewall, things broke, we made a support case, and the vendor investigated and filed a CVE”?
jwcrux | 1 year ago | on: Schwab users are unable to log in
jwcrux | 2 years ago | on: Solar
I noticed that you have a page on records that have been set. It looks like Ercot released this data today that might be of interest: https://www.ercot.com/news/release/2023-09-14-ercot-provides...
I’m curious why there appears to be a pretty significant delta between their data and yours.
Also, if you’re open to suggestions, I had trouble finding the pricing for gridstatus. Entirely possible I was missing something obvious, but I wanted to see how much it might cost to get the long term Ercot generation-by-source dataset and couldn’t seem to get a clear answer.
Regardless, building things like this takes a ton of effort, and I appreciate all you’re doing. Keep up the great work!
jwcrux | 4 years ago | on: Launch HN: Gravitl (YC W22) – VPN Platform Based on WireGuard
Edit - I see you mention that Tailscale uses userland WireGuard. Is that the biggest difference between the two? Do you foresee yourselves running into issues by not using the userland implementation?
jwcrux | 4 years ago | on: Hospital exec says employees are walking off the job
In addition to this, I’ve also heard anecdotally that many of the unvaccinated (by choice) patients have animosity towards the healthcare workers themselves because the patients see this virus as politicized.
Overall I can imagine that it’s resulted in a more-hostile-than-average working environment which is bound to be stressful.
jwcrux | 5 years ago | on: Poll: Will you take the Covid vaccine?
jwcrux | 5 years ago | on: Hunting for Malicious Packages on PyPI
That's the thing. If we're watching syscalls, we see these checks. These would be things like attempted file-reads. Would they be enough to set off alarms? Maybe, maybe not.
This is generally the cat/mouse game of malware detonation in general. There are attempts to make sandboxes appear realistic, but I'd argue that our use case is even simpler since running commands or making network connections during installation is not a normal thing. It might be benign, but it's abnormal enough to warrant investigation.
There will always be ways to try and get around the system, but I'm pretty firm that this will significantly raise the bar which is a Good Thing.
jwcrux | 5 years ago | on: Hunting for Malicious Packages on PyPI
1) The “observable window” is the entire installation time. If they make installs take forever, that’ll affect everyone which should raise alarms pretty quick.
2) The conditional execution is possible but the installation is done using a vanilla alpine container which will match many legitimate hosts too. And any fingerprinting activities that involve syscalls would be detected in the process.
All this to say, there’s always room to continue raising the bar!
jwcrux | 5 years ago | on: Hunting for Malicious Packages on PyPI
I'm a big believer that functions like this should be centralized under a foundation like that, and have really close connections to package manager maintainers so that we can work together towards solving the problem.
jwcrux | 5 years ago | on: Hunting for Malicious Packages on PyPI
If you're looking for a tl;dr you can find one on Twitter (with pictures!) [0]
This research was a blast to do, and I learned a ton. Happy to answer questions!
jwcrux | 5 years ago | on: Go in Production – Lessons Learned
Instead, if you build on the standard library, you can compose your application from there- a good muxer, some standard middleware that are generic http.Handler's, a session library, etc.
jwcrux | 5 years ago | on: SRE Teams: Hash
In general I agree with the point you're making, though.
jwcrux | 5 years ago | on: Crypto scammers piggybacking Trump’s Twitter, cloning Medium, stealing crypto
We used this botnet as a case study back in 2018 when doing analysis on finding Twitter bots at a large scale. You can find the paper here [0] - the cryptocurrency scam botnet starts on page 28. You can also find the talk here [1] where we go into a little more detail. In full irony, someone tried sharing our research on Twitter, and one of the bots replied to the thread trying to spread the scam.
[0] https://duo.com/assets/pdf/Duo-Labs-Dont-At-Me-Twitter-Bots....
jwcrux | 5 years ago | on: Cloudflare One
> S2 Systems NVR technology intercepts the remote Chromium browser’s Skia draw commands, tokenizes and compresses them, then encrypts and transmits them across the wire to any HTML5 compliant web browser (Chrome, Firefox, Safari, etc.)
[0] https://blog.cloudflare.com/cloudflare-and-remote-browser-is...
jwcrux | 5 years ago | on: I asked an online tracking company for all of my data (2018)
https://duo.com/labs/research/data-companies-are-watching-me
jwcrux | 5 years ago | on: How HTTPS Works
Worth noting that "The Handshake" episode [0] covers the key exchange using RSA. This has the downside that it doesn't support forward secrecy, meaning if an attacker ever compromises the server's private key they can retroactively decrypt traffic they previously captured.
It's more common these days to use an ECDHE exchange in which the client and server exchange keys that are generated just for this session (or at least, they should be [1]) and use those to generate the "shared secret".
In fact, in TLS 1.3 ECDHE is the only key exchange mechanism. [2]
The server then uses its long term keypair corresponding to the certificate to sign all the handshake messages that were seen previously [3].
[0] https://howhttps.works/the-handshake/
[1] https://raccoon-attack.com/
jwcrux | 5 years ago | on: Twitter hides Donald Trump tweet for “glorifying violence”
[0] https://www.internetlivestats.com/twitter-statistics/#source...
jwcrux | 6 years ago | on: Ask HN: What were the things you did that made the biggest impact at your work?
https://www.amazon.com/Unicorn-Project-Developers-Disruption...
jwcrux | 6 years ago | on: Building a Simple VPN with WireGuard with a Raspberry Pi as Server
I’m less familiar with LangSmith, but browsing their site suggests they happen to offer observability into LLM interactions in addition to other parts of the workflow lifecycle. This just seems to handle logging and you have to pass all the data yourself- it’s not instrumenting an LLM client, for example.