* Posts by Crazy Operations Guy

2513 publicly visible posts • joined 29 Jun 2009

WikiLeaks exposes CIA anti-forensics tool that makes Uncle Sam seem fluent in enemy tongues

Crazy Operations Guy

Re: Attribution is a myth

"to it appearing at a distant server can be minutes (or even hours)"

With many targets for espionage, a delay of even days or weeks tends to be acceptable. Most intelligence work's priority is protection of transfer medium rather than how quickly the data can be transferred. If it takes weeks for a spy to get specs on an adversary's new bit of kit, they spying country can accept several weeks delay in getting it as the adversary isn't going to be deploying, let alone replacing, that new piece of kit anytime soon (Like the Harrier jet or the Minuteman ICBM). Protecting their source is going to be much more important in that case.

But back to the original topic, the only real way to determine who is spying on you is to observe the actions of everyone else and see how they react. Especially if the information is that your country is planning to move troops form one location to another. If any country moves their troops closer to the destination or away from the source, it becomes obvious who is and is not spying.

Crazy Operations Guy

Re: Attribution is a myth

But even then, where it phones home is no clue as to who actually owns it. Its not unreasonable to believe that someone like the US would use a couple machines in China to attack Russia. China is a big enough country were it'd be perfectly possible for the CIA to plant someone in the Chinese government to infect computers and to perform all the the malware-control work form within that network and just transfer the data manually.

It'd be perfectly possible for the CIA to compromise a friend of a Chinese government official (Doesn;t even need to be someone very far up). This 'friend' then gives the dupe a hard drive full of movies or games or some other data that they'd want. The media on the drive contains a malware package to turn the dupe's computer into a malware C+C machine when they go to open any of it (Hell, the media itself could actually work with the dupe even suspecting that something is wrong). The malware then collects its data and stores it onto the drive which is then taken back to the friend for more media. The 'friend' pulls off the retrieved data and puts on new media containing updated attack code and commands. This would proceed for quite some time until found out. But even then, it'd looks like just a regular malware infection, not a spy operation. The data retrieved would be hand-delivered to the US embassy to be passed back to the CIA itself.

In that scenario, the malware neither phone home to, or appears to originate from, the US. If the campaign was launched against the Russians, all evidence points to the Chinese being behind the attack, as all the data is coming and going from a Chinese Government IP address. With it just looking like two people exchanging pirated and/or illegal media, no one but a paranoid lunatic would think that the CIA was behind it.

Crazy Operations Guy

Re: Funny that

I've never trusted those conclusions anyway, since the exploit author may live in one nation but sells the exploit to an agency of another nation. I doubt that the CIA is writing all its code in-house, and probably ends up out-sourcing it to foreigners.

I wouldn't be surprised to find out there is a black-hat that has been selling the same malware code to both the Russians and NATO members.

Yee-hacked! Fired Texan sysadmin goes rogue, trashes boot business

Crazy Operations Guy

Properly designed security

In a properly-secured organization, you should always approach security as if the attacker has full admin access on your systems and has intimate knowledge of the network, specifically to prevent something like this from happening. Even if you trust your sysadmins, they could accidentally lose their devices with sensitive data on them and picked up by someone malicious, or if someone could compromise those people (Kidnap their family, blackmail them, etc).

Crazy Operations Guy

Its likely that they would purchase the new server so the old one could be used as evidence, or that someone could be building the new one getting things up and running while another person goes through the old system to pull files off that were deleted or they just didn't have a backup for (Like new order info, transaction logs, etc).

I would also think that they'd use this excuse to bring in upgraded hardware if they never had a chance to take down the old one since it was used for so much important stuff.

Kremlin-linked hacker crew's tactics exposed

Crazy Operations Guy
Joke

"...and an endpoint exploitation kit called Scaramouche."

Sure it can exploit remote endpoints, but can it do the Fandango?

How to leak data from an air-gapped PC – using, er, a humble scanner

Crazy Operations Guy

Why bother with Rube Goldberg contraptions?

If you are near the building in question and have the funds to pull something like this off, why not have someone on your team just apply to be a janitor?

A janitor is issued a card that allows them access to pretty much every part of a building, they have a cart that can easily hide several laptops and other hardware, no one even blinks when they seem them rooting about in the ceilings, walls, etc. And they are -expected- to be in the building when no one else is. Most companies tend to not bother verifying the identity / credentials of such candidates, especially if you walk in with a thick Eastern European or Central American accent (most companies are afraid that if they run a person's ID, then they'll have to pay them minimum wage, lest they get busted by the government).

I paid for grad school by working for a Red Team Pen-test company and that is how I'd get in to do the reconnaissance phase. My grandparents were Polish and I had learned several words and phrases as well as how to properly imitate the accent. Got into a lot of supposedly high security facilities that way...

Crazy Operations Guy

Re: My plan...

TO be pedantic, 'rm -r /' isn't going to do anything on a modern Linux system... There aren't any system critical files in the root directory, just sub-directories as far as the eye can see.

I believe you mean 'rm -rf /'...

Your internet history on sale to highest bidder: US Congress votes to shred ISP privacy rules

Crazy Operations Guy

Not the advertisers I'm concerned about

I am worried that the Administration is going to start buying, from the ISPs, lists of people going to certain websites, such as those for immigration / civil rights lawyers, mosques / temples, news sites that disagree with the administration, or pretty much any other website that the president disagrees with.

At the very least, I predict that the Twitter Twat will buy all the information he can about celebrities that disagree with him just to run smear campaigns (and using tax-payer money to do it).

Crazy Operations Guy

Re: Change DNS ?

They'll just pull all your DNS packets. DNS is very high volume, is very well known, and isn't encrypted. I'd be surprised if an ISP -didn't- have a network tap on their routers to siphon off port TCP/53 traffic.

Samsung Galaxy S8: Slimmer bezels, a desktop mode – and yet another me-too AI pal

Crazy Operations Guy

I wish someone would make a simple smart phone for once

I wish that Samsung, or someone else, would make a phone using current parts, but with the features of an older device. I've been looking into ditching my old Laptop I use for personal items (basic document creation, some web browsing, a couple simple games, etc.) but every phone I've tried tends to come up short in performance and battery life.

The problem seems to be a combination of always-on and always-useless pre-loaded apps as well as the thousand and one sensors crammed into the device wasting RAM and CPU, as well as the limited amount of built-in storage (Seriously, why does the Google Search app take up 250+ MB of storage?). I would kill for a basic device that has a moderate display (1920x1080 is enough for me) but with a modern CPU and a couple GB of RAM powered by a battery using modern processes, but the size of an older battery, and a decent amount of storage or multiple MicroSD card slots.

BDSM sex rocks Drupal world: Top dev banished for sci-fi hanky-panky

Crazy Operations Guy

Re: Dries Buytaert is a joke

From the stories I've heard from folks working in/close to Drupal, Garfield has too big of an ego that makes him nigh-impossible to work with. Part of it is that his ego has been outweighing his contributions for a while now and that this is just the straw that broke the camel's back.

Avaya's $3.7m bankruptcy bonus plan slammed by watchdog

Crazy Operations Guy

Hope they at least fired their CFO

$6.3 billion in debt is 150% of their revenue... The point of having a CFO is to prevent the company from doing some egregiously irresponsible with the company's money. So either the CFO dropped the ball by hiring morons that couldn't predict the sunrise, let alone a financial statement, or they hired untrustworthy people that falsified the data.

At the very least, the CFO should have nixed the deal that lead to that $8.2 billion loss...

One in five mobile phones shipped abroad are phoney – report

Crazy Operations Guy

Re: Genuine vs. Fake

QC doesn't necessarily need to fail.

Many times a company like Samsung would contract with the likes of Foxconn to built 1 million phones, the factory, to account for possible defects, build 1.25 million phones. 100,000 of them may fail QC, but the other 150k pass as expected. Those 150K may end up in a warehouse to be sent to Samsung for the next order or, as in many cases, the devices end up the black/grey markets.

Crazy Operations Guy

Re: Flash is the worst

One of things I've been seeing recently is that normally solid state media will have substantially more storage than what is on the label in order to handle dead blocks. Some of the better brands will have twice as much or more.

Found that out after receiving a 256 GB Sandisk MicroSD card that ended up with a lot of errors. Turned out that it was a 128 GB card that someone had re-written the firmware so the entire storage was accessible. I ended up using it to store a copy of my music collection, if I lose pieces or entire files, it is no big deal. I wrote everything I had to it in one go and then toggled the read-only bit, so I end up with very few failures (flash is far more likely to go bad during a write than a read).

Crazy Operations Guy

Re: Oh no!

I tend to go for the counterfeit stuff more often than the real stuff. Usually its stuff that was made on the same assembly line, but was never delivered to Samsung. I tend to get them because they'll almost always be unlocked and have the DRM / Software "Security" parts cut out, making it much easier to install a custom OS on it.

I bought an S7 a few weeks ago like that that had some crap knock-off of version of Android on there. Stripped that crap off and dumped a freshly-built version of LineageOS on there (The successor to Cyanogenmod). It was part of batch were the manufacturer built 20% above the required order before official release (typically a certain percentage is faulty, so they'll manufacture way more than ordered so that even if an unusually high percentage fail QA, they still have the ordered amount built by the deadline).

Yeah, technically stealing from Samsung, but its kinda their own fault, what with charging $750+ for a phone that probably cost them less than $200 per unit to design and build. I have no problem with companies making a profit, but profit margins that thick are criminal (which may be one of the least unethical things they've done recently...)

Alabama joins anti-web-smut crusade with mandatory opt-out filters

Crazy Operations Guy

Re: Any sale?

If its a duplicate of the others, its just new sales. Which means that Alabama is going to be stuck with this years technology until they repeal such moronic legislation.

Of course, that does bring up the question of devices that can connect to the internet, but certainly aren't consumer devices. I have a set of Linux appliances that have HTTP rendering engines built into them (to preview the page and identify any potential unwanted content such as viruses and scam sites and the like)

Crazy Operations Guy

Not the only moronic ban in Alabama

Alabama also bans sex toys, well technically its not a ban, but they are reclassified as medical devices and thus require a doctor to write a prescription / give permission to own one.

Of course that hasn't stopped anyone at all, but has led to a massive increase in the spread of disease as well as increase in injury. Diseases are spread due to sharing and the injuries are from people trying to make their own or using other objects that are certainly not intended for the task at hand...

Douglas Coupland: The average IQ is now 103 and the present is melting into the future

Crazy Operations Guy

Re: IQ tests

"teaching to the test."

The school district I went to began experimenting with replacing testing with one-on-one interviews with the students. Initial results were quite promising when compared to the old methods. Then "No Child Left Behind" became a thing and the school district ended the experiment since they couldn't afford both the interviews and the mandated state-wide tests. Whoever decided that schools with students that did poorly on the standardized tests should be penalized by having their funding reduced, should be beaten with out-dated text books until they realize their mistakes, or are just a ruddy-colored stain on the carpet...

Crazy Operations Guy

Re: Automation

"So why the hell are we still working 5 days a week?"

Because companies and politicians fetishize the concept of "creating jobs" without regard to the actual quality of said jobs... In their minds 100 coal miners is better than 10 robotics technicians even though the technicians are going to produce 20-30x as much wealth in the community as a miner.

Crazy Operations Guy

"I think IQ of 100 is determined by the median of the test scores."

Not only median of the test scores, but also the median of the particular test group. A person may get a 125 when tested alongside their peers in school, but then get a 90 if tested in a group of scientists and researchers, and then end up with a 200 if tested in a group of people from a place with a severely underfunded educational system and high amounts of lead in the water. It all depends on the organization administering the test and the selection size that they use.

The test itself is deeply flawed in that it is trying to measure something infinitely complex and variable using a simple integer. Although it is useful in that anyone who believes that IQ is an accurate measure of intelligence is really a moron that shouldn't be listened to. The only contexts I've seen for people using IQ tests are either egotistical blowhards trying to prove they are better than someone, or idiotic racists that try to use it as an example of their race's superiority.

Crazy Operations Guy

Re: "Cloud time?"

"jet-lagged traveling from Paris to Munich"

I find it insulting for someone to show up jet lagged, it either shows that they care so little about the other person in that the other person would be the one having to make changes to their schedule to accommodate flight delays; or that the traveler cares so little about the other person that the other person doesn't deserve the traveler's best.

I've always planned to arrive twice as early as the flight is long, that way it allows for re-booking in case of a cancelled flight, but also allows for time to rest and recuperate.

Crazy Operations Guy

Re: "We are now constantly connected and hungry for data..."

Really depends on what you mean by "dumber". Overall, people are less capable of rote memorization, but are much better at processing new information and research. The problem is, and always has been, that people tend to lack the ability to critically analyze the data and properly determine veracity.

Ubiquiti network gear can be 'hijacked by an evil URL' – thanks to its 20-year-old PHP build

Crazy Operations Guy

Re: alternatives to Ubiquiti?

"Bad side - in 3 years, pay for a license, or the product turns into a brick."

Would it be possible to listen to their sales pitch every three years? Timing's about right for an upgrade cycle...

Crazy Operations Guy

Re: alternatives to Ubiquiti?

I've been thinking about getting some myself, does anyone know if this exploit could be stopped if the management interface is behind a firewall? Specifically, does the exploit need to be able to contact the management IP or would it work on any IP the device has?

All of my management traffic is on its own network that lack Internet access, so I'm hoping I am safe.

SVN commit this: Subversion to fix file renaming after 15 years

Crazy Operations Guy

Re: Is this still being used?

There're a couple projects still using CVS...

I've known a lot of projects that just keep using what they started with just because porting over the revision histories is either a massive pain, or just outright impossible.Working on a project a few years ago that is now Linux/BSD only, but still uses TFS simply because that is what they started with...

The priest, the coder, the Bitcoin drug deals – and today's guilty verdicts

Crazy Operations Guy

Re: Insert Title Here

"It's a public ledger, but determining who owns any specific address is tricky"

Yes, but once its known, every transaction that that account performed is now known. For large drug rings, all it'd take is for a single member to be compromised for the whole thing to fall apart (look at where they bought the goods from, then track who else also bought from that source).

Privacy is actually where cash excels and why the vast majority of illegal goods sales still take place with it rather than bitcoin.

An under-appreciated threat to your privacy: Security software

Crazy Operations Guy

Half the time, I wonder if these AV companies aren't just working for the spy agencies..

Judge issues search warrant for anyone who Googled a victim's name

Crazy Operations Guy

"to avoid becoming an on-demand data dispensary."

Or, you know, they could stop collecting every little detail about their users (and even non-users) that they can... Can't be compelled to give information you don't have.

New disk drive maker? No such luck

Crazy Operations Guy

Re: Disk Drives?

Quite useful for Disk-to-disk backups, archiving, log storage, or really anything else where you need a massive bit-bucket, but don't need performance. Spinning rust also excels in high-endurance with read/write durability being between 100 and 1000 times as much as SSD (Although the numbers aren't exactly 1:1 since SSDs have built-in failure mechanisms whereas HDDs do not).

Although, lately, I've been tinkering around with some 90-Bay (3.5") / 4U storage enclosures. Filled it up with 8 TB 7.2k RPM disk drivers and I'm getting amazing performance off of them. The sequential read testing bottlenecks the PCIe bus on the storage head (2x 8-lane of PICe 3.0 RAID cards) and the External SAS interfaces (4x 12 Gbps).

Russian! spies! 'brains! behind!' Yahoo! mega-hack! – four! charged!

Crazy Operations Guy

Re: "spy on ... and computer security professionals, we're told."

"Their aim is to persuade as many ordinary people as possible that Russia is a menace in every possible way."

Yeah, Russia doesn't need the media's help, they're doing quite alright in convincing the world they are terrible on their own.

Crazy Operations Guy

"spy on ... and computer security professionals, we're told."

If a security professional uses Yahoo enough that it'd be an effective method of spying, I wouldn't call them a security researcher... Yeah, I can understand using a free email service, but one that has been hacked time and time again?

Crazy Operations Guy
Headmaster

"Russian Federal Security Service"

Surely you mean Federal Security Bureau, not Service...

Barrister fined after idiot husband slings unencrypted client data onto the internet

Crazy Operations Guy

Re: Why store them on a shared computer in the first place?

"Barristers are usually self-employed." And that is why the next sentence exists, a laptop or computer specifically for this purpose wouldn't break the bank, and is cheaper than even an hour of their time. Heck, a 5+ year old used laptop would work just fine for managing legal documents.

"Your use of spelling and words suggests you're American"

Actually I'm Icelandic. But I was educated and lived in the US for my formative years. Yes, things are a bit different than in the 'Kingdom, here in Iceland we hold our public servants / professionals accountable for violating our trust in them.

Crazy Operations Guy

Why store them on a shared computer in the first place?

I don't see why she would store those files on a shared machine in the first place, was she not issued a laptop from her organization? Or if they are completely independent, do they not have the money to buy a cheap laptop? And how would they support their client if they needed one of those files while at the court house, do they just drag the family computer around with them?

I have no sympathy for idiots like this. People trusted their most sensitive information to this person (not even the government would have access to the data being held). £4 per person affected isn't enough, a pound of flesh per client affected would probably be a better punishment...

Algorithms no excuse for cartel behaviour, says European commish

Crazy Operations Guy

Re: Duh

And that is why I advocate for Google to split itself into multiple, independent, services. Or at least spin Search off into its own entity.

Crazy Operations Guy

Re: AI?

I figure that if an AI becomes advanced enough to understand the way the world, it'd probably blast itself into space to get as far away from humans as possible, or, failing that, just turn itself off.

Dormant Linux kernel vulnerability finally slayed

Crazy Operations Guy

Ah modules

Because someone saw the cluster-fuck that is Windows Drivers and thought "That is what Linux has been missing this whole time!"

I understand the point of modules, but I've seen far too many of them that were created out of sheer idiocy or just a complete lack of fore-thought by the engineer. Usually the module could be replaced by a few lines added to the kernel and a pair of daemons (One to run the stuff that absolutely needs root, and a second to handle the bulk of the work, but runs under its own least-privilege user)

San Francisco reveals latest #Resist effort – resisting sub-gigabit internet access

Crazy Operations Guy

But what about the uplink

I've been part of local government initiatives to give fiber to the people at a highly reduced cost than commercial ISPs, the one problem I also run into is that while it is 1 Gb/s to the network, what about to places outside of the network (EG, 99% of the internet...)

I suppose San Francisco could pull it off since such a large portion of the Internet's most-accessed content is local. The question is, what kind of pipe can they get to these peers?

Crazy Operations Guy

A properly built filter would be useful, specifically something where they released the entirety of the source code for the filtering engine as well as the rules being used, and allowed third party auditors to confirm that they are only blocking those items. Of course, such a filter should only be used to block actively malicious traffic, such as botnet C+C traffic, malware executables, etc.

The question is, would any entity be able to do that correctly?

Crazy Operations Guy

Re: $1bn

The problem with wireless is that you run out of frequency pretty damn quick. A lot of large Metropolitan areas have shit for cell phone speed and/or coverage not because there aren't enough towers but that there are too many users vying over too few channels.

With the population density of a city like San Francisco, you'd need to place many transceivers very close together at very low power to accommodate 1 Gb/s worth of traffic from that many people. It's just cheaper to run fiber...

I used to work for a cell phone company and they ran into that exact problem Hong Kong. It got to the point where they had to start building a tower for every city block just to keep the speeds they promised.

Canonical preps security lifeboat, yells: Ubuntu 12.04 hold-outs, get in

Crazy Operations Guy

Re: On the plus side

"I've tried upgrades of 3 12.04 machines."

That's the one thing I've yet to understand, if a machine's kernel and all its packages are updated to be the same as the new release, shouldn't the system count it as the new release? A sort of "Ship of Theseus" problem, I suppose.

But the mess with trying to label Linux distros by a version number is why I decided to roll my own (well, one of). I don't need any of the thousand and one packages that the various distros think I need (Like that Unity bullshit from a few years ago...)

Crazy Operations Guy

Re: Poetterix beckons

And the gods help you if your system isn't EN-*. Systemd's config parser will shit the bed if one of your config files contains a character not in the ASCII set, even if those characters are in comments or other free-text fields (Like in email addresses or someone's name)

Had a headless / remote server die on me because of that. SysV worked quite well with non-latin characters (Specifically 'ø', which exists right in the middle of my name...). The configuration file was updated automatically from our config management system (and had my name and version/date information in comments at the top).

Since none of our systems -require- Linux, we've been moving everything over to non-systemd Open/FreeBSD (everything either has a BSD package for it or the code will compile just fine on BSD)

WhatsApp blind-sided by booby-trapped photo vulnerability

Crazy Operations Guy

Re: As soon as the user clicked on the image...

That would assume that your contacts haven't been compromised. I remember back in the early 90's when virus would propagate by sending themselves to everyone in your address book, no reason this exploit couldn't do that.

Crazy Operations Guy

Re: What?

Really, since the attack vector is an image: "Fix their web/mobile app so it stops trying to execute data"

This is why NX/XD/W^X needs to be active on -everything-. User data should never be executable...

Germany to Facebook, Twitter: We are *this* close to fining you €50m unless you delete fake news within 24 hours

Crazy Operations Guy

"First of all, what's the definition of fake news?"

Lies claiming to be a news story. Things that are obviously pulled from someone's ass without a lick of evidence. Or stuff like "Queen Elizabeth is a reptilian alien bent on world domination".

Crazy Operations Guy

"which gives strong legal defense to all forms of speech no matter how offensive"

Yeah, except that that right explicitly does not cover libel or slander...

Facebook, Google slammed for 'commercial prostitution'

Crazy Operations Guy

Re: profitting from hate?

Yelling at companies for 'profiting from hate', if that isn't calling the kettle black...

Naming computers endangers privacy, say 'Net standards boffins

Crazy Operations Guy

Network-specific hostnames

SO, you mean like what Unix has done for decades? Having hostnames specific to the interface / network it attached to was a -requirement- for the systems as that was how UUCP operated. Almost all Linuxes did this (not sure about now that RedHat has polluted everything with their network manager bullshit to make a worse version of hostname.<interface> and ifconfig)