infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

Mend It Mark recently got famous because a shithead sued him, but I think he's at Bob Ross level of quality entertainment anyway:

https://www.youtube.com/watch?v=ocpDG2O3H6o
this post | permalink
@Viss I see you are a man of culture as well!
this post | permalink
@stf no, only the heli vs car thing, but it's a police car.
this post | permalink
I just realized that in Die Hard 4 Matt's little "my dad is my hero" monologue to get the stolen car started is basically how prompt injection works these days :O
this post | permalink
Delinea Protocol Handler - Remote Code Execution via Update Process (CVE-2024-12908)
https://blog.amberwolf.com/blog/2024/december/cve-2024-12908-delinea-protocol-handler---remote-code-execution-via-update-process/

#frombsky
this post | permalink
Die Hard 4 is underrated. Fight me!
this post | permalink
In 10 mins: The master key #38c3

https://streaming.media.ccc.de/38c3/zigzag

#HDCP
this post | permalink
Proprietary silicon ICs and dubious marketing claims? Let's fight those with a microscope! #38c3

https://streaming.media.ccc.de/38c3/relive/492

Didn't expect this one to have a #synthdiy angle! 🤩
this post | permalink
I would complain about #38c3 streaming issues but the very existence of the service is so impressive I'll just thank the Angels now: thank you!
this post | permalink
To little surprise it seems that multiple #antivirus vendors have been ignoring COM hijacking as a self-defense bypass and LPE vector since at least 2018, when I first published about this technique (see my prev post).

At #38c3 guys from Neodyme demonstrated some more elegant exploits than my initial PoCs, nice work! My German is rusty but I think I'd have some comments about proposed solutions :)

ReLive will be available here:

https://streaming.media.ccc.de/38c3/relive/815
this post | permalink
Next Page