kondbg | 3 years ago | on: Who pays for your rewards? Redistribution in the credit card market [pdf]
kondbg's comments
kondbg | 4 years ago | on: Set up a practically free CDN
https://www.cloudflare.com/terms/
> 2.8 Limitation on Serving Non-HTML Content
> The Services are offered primarily as a platform to cache and serve web pages and websites. Unless explicitly included as part of a Paid Service purchased by you, you agree to use the Services solely for the purpose of (i) serving web pages as viewed through a web browser or other functionally equivalent applications, including rendering Hypertext Markup Language (HTML) or other functional equivalents, and (ii) serving web APIs subject to the restrictions set forth in this Section 2.8. Use of the Services for serving video or a disproportionate percentage of pictures, audio files, or other non-HTML content is prohibited, unless purchased separately as part of a Paid Service or expressly allowed under our Supplemental Terms for a specific Service. If we determine you have breached this Section 2.8, we may immediately suspend or restrict your use of the Services, or limit End User access to certain of your resources through the Services.
If this was truly acceptable and not in some grey area, why doesn't Backblaze simply route all downloads through Cloudflare by default, rather than having each individual customer go through the hassle of setting this up?
kondbg | 5 years ago | on: Rocky Linux: A CentOS replacement by the CentOS founder
The build process is documented here: https://wiki.centos.org/action/show/Sources?action=show&redi...
kondbg | 5 years ago | on: Rocky Linux: A CentOS replacement by the CentOS founder
The most common argument (Oracle is evil and litigious. Therefore, using Oracle Linux will result in me being sued) honestly seems like FUD.
All RHEL downstream distributions rebuild the same SRPMs that RHEL provides. Doing a quick comparison over some common packages (kernel, httpd, openssl, etc.) between CentOS 8.3 (https://vault.centos.org/8.3.2011/BaseOS/Source/SPackages/) Oracle Linux 8.3 (https://yum.oracle.com/repo/OracleLinux/OL8/baseos/latest/x8...) shows that they are indeed byte identical (with the exception of certain spec files including debranding patches).
What is the value of having a separate RHEL derivative? It isn't as if the "community" can propose/submit any changes, since any changes will cease to make the downstream distribution a "bug for bug" compatible RHEL derivative. If I actually wanted to participate in the larger RHEL-derivative community, I would need to actually submit my changes to the CentOS stream project.
kondbg | 5 years ago | on: How to Setup FTP Server with Vsftpd on Raspberry Pi
FTP has sendfile support for data transfers since there is no framing in the data connection. (OpenSSL 3.0 has sendfile support so FTP over TLS would also benefit as well).
kondbg | 8 years ago | on: Blizzard's Battle.net Updater Installs Root Certificate
kondbg | 8 years ago | on: Chrome 59 stable released
--force-device-scale-factor
Previously did not have to do this.kondbg | 8 years ago | on: Telefonica Is Target of $600,000 Bitcoin Ransomware Attack
It's amazing how any organization can get away with poor security and backup practices by blaming either Russia or China, without showing any evidence to back their claim.
kondbg | 9 years ago | on: Ryzen is for Programmers
kondbg | 9 years ago | on: Ryzen is for Programmers
kondbg | 9 years ago | on: Ryzen is for Programmers
NMI watchdog: BUG: soft lockup - CPU#9 stuck for 23s!
which requires a hard reset. This behavior doesn't occur on Windows, though, so if you use Windows for development, you should be good.kondbg | 9 years ago | on: Caddy 0.10 Released
Caddy records the cipher suite advertised by the client during the TLS handshake and then later examines the client's user agent. Using the fingerprinting techniques mentioned in the paper, Caddy then determines whether or not the advertised user-agent is compatible with the user-agent that it inferred through the client cipher suites.
TLS interception proxies establish their own TLS connection to the server. Depending on what underlying TLS library the proxy uses, it also has its own unique fingerprint. When the TLS proxy forwards the user's request, Caddy detects the mismatch and flags it as a MITM.
kondbg | 9 years ago | on: Using GPG to Encrypt Your Data
kondbg | 9 years ago | on: Some DNS lookups causing 5xx errors due to leap second bug
[1] https://blog.cloudflare.com/how-and-why-the-leap-second-affe...
kondbg | 9 years ago | on: 2017 is not just another prime number
For the non-mathematically inclined, how do mathematicians come up with these? Are these just observations that they happened to witness, or are there underlying theoretical properties that allow one to derive this claim?
kondbg | 9 years ago | on: Some DNS lookups causing 5xx errors due to leap second bug
kondbg | 9 years ago | on: Bitcoin 0.13.0 Binary Safety Warning
kondbg | 9 years ago | on: Ask HN: Why are sites now breaking login forms into stages (name then password)?
Adding "verification images" or security questions that you set up does not prove that a site is legitimate. A successfully established HTTPS connection to the bank's domain is necessary and sufficient to guarantee authenticity (and most banks use EV too, which browsers make extra obvious).
Users should be trained to look at the URL bar for the green EV indicator, instead of being trained to believe that a site is legitimate simply because it displays a picture that they select. Banks that encourage this behavior are actively encouraging users to become even more gullible to well-crafted phishing attacks.
kondbg | 9 years ago | on: Ask HN: Why are sites now breaking login forms into stages (name then password)?
kondbg | 10 years ago | on: Bypassing Antivirus with Ten Lines of Code
Exec (before the cast) points to memory containing the shellcode data.
To actually start executing the shellcode, you just need to somehow cause the program counter to point to the address of the shellcode.
An easy way to change the program counter is by calling a function ... which is what this line does.
Read this as "cast exec to a pointer to a function that takes zero arguments and returns void and call the function with no arguments."
This is the same as:
typedef void (*some_func)();
some_func func = (some_func)exec;
func();
To familiarize yourself with C syntax regarding pointers, read about the "right-left rule" [1]
Using credit cards allows you to keep close to a zero checking account balance and manage your own cash flow, since credit card bill dates are deterministic.
Why would anybody want to keep _any_ amount of money in a non-interest bearing checking account right now especially when the risk free rate of interest (US treasury bills / equivalent money market funds invested in US treasuries) yields 4.00%+ APY now?