• 1 Post
  • 23 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle


  • your computers are much less secure in general but they also have different security assumptions

    phones are the pinnacle of security in this point in time. rooting them not only breaks but also breaks the security assumptions that apps rely on

    for example I can be sure that no other app has access in my data as an app dev. based on that assumption i might store secrets. which on android/iOS is totally fine (there are better ways but ok)

    you’d never make such an assumption on a pc app. you’d find another way. there’s no such thing as “my data” on desktop. hence you develop around it


  • and that’s a reason not to use banking or other critical apps from a pc. a mobile is much more secure

    rooting also bears the issue of being “not intended”. that means that what you use to get root (for example to manage the root permission) is not as much tested as the rest of the operating system and opens up holes which we don’t know about yet

    security is a game of money. as a security researcher, bypassing the sandbox and accessing another apps data, can gain you literally millions

    bypassing the root permission on an already rooted phone will gain a pat in the back and a conference talk at best





  • I’ve not looked into fire jail in depth but I’ve read lots and lots of bad takes on it

    What we need is docker with a better graphics integration, in terms of both ease of use and security. maybe wayland can help in that (cause with X you just forward the whole management socket and that’s it, anyone can draw anything)

    There’s a chance that snap has done it right (I know that everyone hates it but there’s a CHNACE that they got it right in terms of security and ease of use)

    flatpak “is not enough” since the controls it gives you are not enough. first you need flatseal to disable stuff per application and the defaults aren’t good enough and steam for example REQUIRES access to the whole home folder which defeats the whole purpose


  • what kind of privilege separation? you’re talking about containers/namespaces?

    cause as it is linux desktop has 1 unprivileged user and that’s it. from an attackers perspective privilege escalation is irrelevant - you have access to the screen, keyboard, browser, files. there really is nothing left to gain from gaining root

    and if you have any reason to gain root, it’s super easy by just replacing sudo with an alias in .bashrc you’ve got the user’s password

    We REALLY need sandboxing and soon, that’s why I want to give fedora silverblue a try but my hopes are quite low

    btw windows is in a bit of a better place and M1 mac is in much better place




  • I never got where the misconception of “*nix doesn’t have malware” came from. Maybe from the 2k era where “malware” was anything that was slowing down your PC (I also don’t get why a malware would slow down your PC, unless it’s a ransomware)?

    I remember the c99.php shell from way back which is an amazing example of cross-platform (PHP can run anywhere) “virus” and it was considered a golden standard (2010 era?)




  • ok so let’s start with the exploits. Exploit is a bug (problem) in a piece of software that when… umm… “abused” (well the word is just exploited) it allows you to do stuff that you shouldn’t. An exploit could be live from your browser to the program you use to zip files. The top 2 reasons to use an exploit is to either get initial foothold on a machine (e.g. an exploit in a browser that would allow an attacker to execute arbitrary code when you visit their page or an exploit in winrar that when you open a zip file executes code)

    From the attackers perspective, you got in, nice. Mind you you got in through means that have nothing to do with windows (and that’s true most times, especially on desktops). but now? what?

    You hacked into the machine for a reason! You might wanna grab the browser cookies (giving you direct access to the accounts that the victim is logged into), grab some files, screenshots, passwords

    That’s where the AV kicks in. After the initial exploit the malware behaves like a normal program. But not completely. Assuming that the AV hasn’t seen the same exact malware before (which would an insta kick ban) it’s going to see a random process accessing files in chrome’s directory. HUH. ISNT THAT SOMETHING. quarantined.

    Wanna start listening to each and every keystroke? quarantined

    Meanwhile the way that the exe ended up in your system was not through an installer, you don’t provide an uninstaller and it was downloaded from www.xXxveryNicEsiteyou.got. HUUUUUUUH

    the whole process is a bit simplified of course, but it captures the general idea

    So why does linux not have an AV? FUCK IF I KNOW! It would be very, VERY useful. Writing malware that bypasses AV is an art of its own. Can be done for sure, but it’s an extra step and it’s not fun

    background: used to get paid to do shit like that (legally, pentest) and it’s a fun hobby (writing code around it, not hacking people)


  • dzervas@lemmy.worldtoMemes@lemmy.mlGoogle now
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    my whole experience with matrix is deeply disappointing. devices getting out of sync, not being able to decrypt messages, missing notifications and that fucking mark as read not working are daily problems

    dig deeper and you’ll find the causes of the problems, which are disturbing. e.g. a json string is hashed (however 2 equal json objects can be the same while their strings are very different)

    the only reason I still use it is a room I want to be part of



  • dzervas@lemmy.worldtoMemes@lemmy.mlSociety
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    Contrary to popular similar stories I had the feeling that I was in my 20-25s for “I was there for a long time” and I was eager for the next decades (with a small break for depression but I got through) Now I’m 28 and it kinda feels it speeds up but I don’t complain (but I do complain about everything else, A LOT)