throwaway125 | 12 years ago | on: OpenSSL site defacement involving hypervisor hack rattles nerves
throwaway125's comments
throwaway125 | 12 years ago | on: Cryptocat Considered Harmful: The Root Cause
throwaway125 | 12 years ago | on: Hey programmers, we need to talk
throwaway125 | 12 years ago | on: Ask HN: Those making $1,000+/month on side projects - what did you make?
throwaway125 | 12 years ago | on: Ask HN: Those making $1,000+/month on side projects - what did you make?
throwaway125 | 12 years ago | on: New effort to fully audit TrueCrypt raises $16,000+ in a few short weeks
2048^4 = 17592186044416
2^44 = 17592186044416throwaway125 | 12 years ago | on: An nginx configuration for security
add_header Strict-Transport-Security max-age=31536000;
add_header X-Frame-Options DENY;
The first one tells browsers it should never try to visit the http version of this site, even if the user clicks on a http link the browser will visit the https version. This helps prevent ssl stripping attacks.The second prevents browsers from including this site in an iframe or frame, which helps prevent clickjacking attacks. If your site depends on those you can also set the option to SAMEORIGIN.
https://developer.mozilla.org/en-US/docs/HTTP/X-Frame-Option... https://developer.mozilla.org/en-US/docs/Security/HTTP_Stric... https://en.wikipedia.org/wiki/SSL_stripping#SSL_stripping
throwaway125 | 12 years ago | on: Saltstack: Changing RSA public exponent from 1 to 65537
throwaway125 | 12 years ago | on: Ubisoft hacked, account data compromised
throwaway125 | 12 years ago | on: A Great Response to a Cease and Desist Letter
throwaway125 | 12 years ago | on: Jonathan Mayer Threatens To End “Do Not Track” Talks
I certainly hope people would think twice about actually implementing something like that.
throwaway125 | 13 years ago | on: Evolution of Hacker News
Still, I often find grey comments that are brought in a completely respectable way. I feel like these comments are getting downvoted because someone disagrees with them, rather than because they are bad or toxic comments.
The opposite is also true, I often find comments with a positive amount of votes that are in the "internet jokester" style and don't really contribute anything meaningful to the topic at hand.
throwaway125 | 13 years ago | on: Mac malware signed with Apple ID infects activist’s laptop
It's true that we could do that, but their original purpose was to protect us in the first place. The same is true for code signing certificates, to a certain extent.
throwaway125 | 13 years ago | on: Well, that's one SEO hack... (view-source)
throwaway125 | 13 years ago | on: IBM open sources new approach to crypto
http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_U...
throwaway125 | 13 years ago | on: "How I Explained REST to My Wife" taken down because of gender-oriented nature
http://web.archive.org/web/20110225075111/http://tomayko.com...
throwaway125 | 13 years ago | on: What technical reasons are there to have low maximum password lengths?
throwaway125 | 13 years ago | on: What technical reasons are there to have low maximum password lengths?
The hash output of bcrypt stops changing after 72 characters but almost all bcrypt documentation mentions a 55 character limit. I'm not quite sure what that is about, can anyone clarify?
throwaway125 | 13 years ago | on: tmux 1.8 Released
au BufRead,BufNewFile Makefile set noexpandtabthrowaway125 | 13 years ago | on: PeerCDN: WebRTC-based peer-to-peer CDN [video]
Breaking out of virtual machines is a really interesting process but it's important to remember that a hypervisor can be attacked with pretty much the same techniques you can attack any other program. Virtual machines aren't a magic contain-all-the-hackers solution. There was an interesting talk on DEFCON 19 about breaking out of KVM: http://www.youtube.com/watch?v=tVSVdudfF8Q