11 Matching Annotations
  1. Mar 2024
    1. Next to the xz debacle where a maintainer was psyops'd into backdooring servers, this is another new attack surface: AI tools make up software packages in what they generate which get downloaded. So introducing malware is a matter of creating malicious packages named the way they are repeatedly named by AI tools.

  2. Oct 2023
    1. "Without the right to tinker and explore, we risk becoming enslaved by technology; and the more we exercise the right to hack, the harder it will be to take that right away" - Andre "Bunnie" Huang

      hah, we are already "enslaved by technology". ask Ted Kaczynski

      our enemies already have hardware backdoors, compromising emissions (tempest), closed-source firmware/drivers/hardware, ... but sure, "feel free"

  3. Jan 2023
  4. Mar 2022
    1. Can we get hacked by visiting an infected website? Unfortunately, we can always be hacked when visiting an infected website. Due to the existence of a number of vulnerabilities on the web, visiting websites has always been dangerous over the years. Moreover, with the advent of JavaScript, infecting with a malicious virus became easier.

  5. Jun 2020
    1. Wyróżniamy 2 podstawowe metody wykrywania malware(można mówić o większej ilości, jednak na potrzeby przybliżenia podstaw wspomnę tylko o dwóch):

      2 ways antiviruses detect malware:

      • Signature-Based Detection - based on signatures (known byte sequences) updated continuously. For example, the method deletes software immediately after it's downloaded
      • Heuristic and Behavioral-Based Detection - based on malware's "behaviour" (each of its instructions)
  6. May 2020
    1. I do not understand what is the threat model of not allowing the root user to configure Firefox, since malware could just replace the entire Firefox binary.
  7. Apr 2020
  8. Mar 2020
  9. Feb 2020
    1. With version 6.1.4, the Foxit installer was bundled with potentially unwanted programs like OpenCandy which installed the browser-hijacking malware Conduit.[11][12] Following complaints from users, it was removed after version 6.2.1.[13] In July 2014, the Internet Storm Center reported that the mobile version for iPhone was transmitting unencrypted telemetry and other data to remote servers located in China despite users attempting to opt out of such data collection.[14]
  10. Jun 2016