whatupmiked | 1 year ago | on: Surveilling the masses with wi-fi-based positioning systems
whatupmiked's comments
whatupmiked | 1 year ago | on: Asymmetric Routing Around the Firewall
You can configure a router to not use a path, even though that path physically exists.
whatupmiked | 2 years ago | on: How I'm able to take notes in mathematics lectures using LaTeX and Vim (2019)
I stumbled on this blog recently when researching the same topic (nvim +latex). I found this more recent blog (https://www.ejmastnak.com/tutorials/vim-latex/intro/), by another author, inspired by this original author useful as well.
I found this blog post to be very helpful and the author was obviously a very good writer and I am sure he will be missed. Condolences to his friends and family.
whatupmiked | 2 years ago | on: NSA publishes ten most common misconfigurations in networks
The list was good but this last one reads more like end-point security.
whatupmiked | 2 years ago | on: How NAT traversal works (2020)
whatupmiked | 3 years ago | on: Shifting the Balance of Cybersecurity Risk: Security-by-Design and -Default [pdf]
"Some examples of modern memory safe languages include C#, Rust, Ruby, Java, Go, and Swift."
"Too often, backwards- compatible legacy features are included, and often enabled, in products despite causing risks to product security. Prioritize security over backwards compatibility, empowering security teams to remove insecure features even if it means causing breaking changes."
"While customer input is important, the authoring agencies have observed important cases where customers have been unwilling or unable to adopt improved standards, often network protocols. It is important for the manufacturers to create meaningful incentives for customers to stay current and not allow them to remain vulnerable indefinitely."
---
The fundamental challenge is that by the time a "secure default" has been universally agreed on, and implemented widely in a space, the target moves again. Meanwhile each vendor decides what is "most secure" based on what they have been able to implement. Businesses are left with the integration challenge, and maintenance burden, of operating equipment that changes underneath their feet with each upgrade/update in the name of "being more secure."
Government agencies could reduce the integration and adoption window by providing implementations of the "secure defaults" that were ready-to-use in the recommended programming languages. To do this they would need to be able to incentivize and recruit personnel that were capable of doing this, and adopt methods and practices that could produce such modules in a timely manner. Do governments want to distribute implementations that are usuable by any actor? Can they produce it in a timely manner? Would industry trust the implementation if it was produced by governments?
When "legacy features" are being asked for it is most likely because they have been shown to work, and integrate, well across the business. A new product may be perfectly secure, but is it usable? The last quote alludes to this, customers need to run the business to generate the revenue to afford the security.
whatupmiked | 3 years ago | on: First in-the-wild UEFI bootkit bypassing UEFI Secure Boot
whatupmiked | 3 years ago | on: First in-the-wild UEFI bootkit bypassing UEFI Secure Boot
whatupmiked | 4 years ago | on: Open letter from researchers involved in the “hypocrite commit” debacle
whatupmiked | 5 years ago | on: Avoid Consumer Routers
whatupmiked | 5 years ago | on: Avoid Consumer Routers
whatupmiked | 5 years ago | on: Avoid Consumer Routers
whatupmiked | 6 years ago | on: John Chambers and a star team of ex-Cisco engineers launched Pensando Systems
whatupmiked | 6 years ago | on: The End of the Golden Era of American Chess
whatupmiked | 8 years ago | on: Storing Drinking-Water in Copper Pots Kills Contaminating Bacteria (2012)
whatupmiked | 9 years ago | on: Mirai Botnet Linked to Dyn DNS DDoS Attacks
"The central goal of the attacker we consider is to gather location and movement data about a large number of devices, either globally or pertaining to a specific region of interest."