xianb | 3 years ago | on: Ask HN: Does Uber Eats take a loss when they offer their coupons?
xianb's comments
xianb | 6 years ago | on: Auth0 JWT Auth Bypass: Case-Sensitive Blacklisting Is Harmful
https://auth0.com/blog/critical-vulnerabilities-in-json-web-...
xianb | 7 years ago | on: U.K. Lawmakers accuse Facebook's CEO of leadership failure
xianb | 7 years ago | on: Gmail spam-filters PayPal security messages
xianb | 7 years ago | on: Google has quietly dropped ban on personally identifiable web tracking (2016)
xianb | 7 years ago | on: I exploited TLS-SNI-01 issuing Let's Encrypt SSL-certs for any domain (2018)
The assumption was that you controlled the domain if you could return the self-signed cert with subjectAlt=foo.bar.acme.invalid when the SNI request for foo.bar.acme.invalid is made to the server your are requesting a cert for. Unfortunately the assumption didn't hold up because hosting providers shared the same routing server across domains and subdomains and those routing servers did not have controls around the subjectAlt domains used for TLS-SNI-01.
> Also, what do host headers have to do with this? Presumably this is just a tls handshake test? They don't have anything to do with the weakness. It's mentioned to make the distinction that SNI is used for the cert retrieval to establish the connection and Host-header is used separately to route to the proper backend
xianb | 7 years ago | on: Hacking of artificial intelligence is an emerging security crisis
There's also other smaller bugs like coinbase and parity wallet
xianb | 7 years ago | on: PagerDuty Files Confidentially for IPO
xianb | 7 years ago | on: Button offers instant gratification for those plagued by airplane noise
xianb | 7 years ago | on: Amazon is selling stolen art, fake products and is infringing copyrights
xianb | 7 years ago | on: Amazon’s Grocery Push Keeps Stumbling After Whole Foods Purchase
xianb | 7 years ago | on: Chat app fined for plaintext passwords under GDPR
xianb | 7 years ago | on: Chat app fined for plaintext passwords under GDPR
Rather than scan for password being contained in the message, something more reasonable to try would be to check if the whole message is the password since you can just plug that into the normal password hasher and run just one slower hash op
xianb | 7 years ago | on: LinkedIn violated data protection by using 18M email addresses of non-members
xianb | 7 years ago | on: Blue Apron lays off more workers
basically would have just been a losing gamble to have withheld money instead instead of it being something forced upon them
xianb | 7 years ago | on: Former Groupon CEO Andrew Mason on what the roller-coaster ride felt like
xianb | 7 years ago | on: Sales engagement startup Apollo says its massive contacts database was stolen
xianb | 7 years ago | on: Facebook Network Breach Impacts Up to 50M Users
xianb | 7 years ago | on: A Cardiologists Concerns with the New Apple Watch
xianb | 7 years ago | on: Google’s first all-hands after 2016 election [video]
people have, but who knows how long it'll last
https://twitter.com/grubhub/status/611320394256109568?lang=e...