:linux: StarkZarn :verified:

Linux wizard, FLOSS enthusiast, Infosec Lead. I like to break things.

:linux: StarkZarn :verified: boosted:
404 Media404mediaco
2025-08-12

A DEA agent used a local police officer’s password to the Flock automated license plate reader system to search for someone suspected of an “immigration violation.”

That DEA agent did this “without [the local police officer’s] knowledge,”

🔗 404media.co/feds-used-local-co

:linux: StarkZarn :verified:StarkZarn@infosec.exchange
2025-08-12

@redsakana This is a fantastic article! I might have to write another systemd blog post just to address some things here.

I think this isn't a 100% eventuality for compromise though, as the testing is all done via systemd-run. The sandboxing options per unit are to protect a compromised process in the given service context, not to protect from a user (or even sillier, a PRIVILEGED user) from abusing a service execution environment. I don't disagree with the premise of the blog post, very informative and well written. I do disagree with the threat model though.

:linux: StarkZarn :verified: boosted:
cR0w :cascadia:cR0w@infosec.exchange
2025-08-12
Bart Simpson with a white cane and sunglasses. The text says "Checking for suspicious activity in the logs I never turned on." And Bart is saying "Nothing to see here."
:linux: StarkZarn :verified:StarkZarn@infosec.exchange
2025-08-12

@redsakana I would love to learn more about this! I've seen some specific issues in implementations of dbus, like the @unit42_intel writeup of the Ubuntu USBCreator issues, but that was an application specific issue, not systemic to the use of systemd. Do you have any reading you could share on this topic?

:linux: StarkZarn :verified: boosted:
Robb Knightrobb@social.lol
2025-08-12

Will of the people. We’re doing it gang. $10. Two stickers. Shipped worldwide. In a few weeks time.

👉 rknight.me/shop/training-data

Pirate bay sticker but it says training data. The background is fibre cables or something like that.
:linux: StarkZarn :verified:StarkZarn@infosec.exchange
2025-08-12

@mattesilver fixed! I appreciate the feedback.

:linux: StarkZarn :verified:StarkZarn@infosec.exchange
2025-08-11

@mattesilver Ah, so I am! Thank you! One day I'll get _something_ typo-free...

:linux: StarkZarn :verified: boosted:
2025-08-11

@StarkZarn Woo hoo! Can't wait for #DEFCON34!

:linux: StarkZarn :verified:StarkZarn@infosec.exchange
2025-08-11

roguesecurity.dev/blog/systemd

Another #selfhosting blog down, this time some casual notes on #systemd #security. Love it or hate it, systemd is a big player in the bulk of Linux systems out there, and these are a few notes on how to lock down some of the defaults.

:linux: StarkZarn :verified: boosted:
daniel:// stenberg://bagder
2025-08-11

I think this shows how @linuxfoundation is not necessarily on our side.

social.lfx.dev/@linuxfoundatio

A screenshot of a Linux Foundation toot saying:

"Data privacy rules like GDPR are fueling a climate of risk aversion, slowing open data progress."
:linux: StarkZarn :verified: boosted:
nixCraft 🐧nixCraft
2025-08-11

GitHub is no longer independent at Microsoft after CEO resignation: GitHub CEO Thomas Dohmke has resigned, and now GitHub will be part of Microsoft’s core AI engineering team. Github is no longer independent company.

theverge.com/news/757461/micro

:linux: StarkZarn :verified:StarkZarn@infosec.exchange
2025-08-11

@Graylog understandable. Thanks for the reply! Hope to see you at #defcon next year!

:linux: StarkZarn :verified: boosted:
2025-08-08

Celebrating 20 Year of the #openSUSE Project Today!!!

:linux: StarkZarn :verified: boosted:
2025-08-08

Dear @microsoft ,

As a consumer, why on earth do I need to sign in to encrypt a drive?

:linux: StarkZarn :verified: boosted:
2025-08-08

The Register took a look at Microsoft Recall and found it captured personal information, such as social security numbers and such in its database.

They also found they could access it remotely using TeamViewer, using just a PIN.

theregister.com/2025/08/01/mic

:linux: StarkZarn :verified:StarkZarn@infosec.exchange
2025-08-08

@Graylog Any other way for fans like myself to get a patch? For those of us who weren't able to go to #Defcon this year?

:linux: StarkZarn :verified: boosted:
2025-08-08

@GrapheneOS I found the company : corporationwiki.com/p/3hbo31/p, I haven't yet figured out exactly what she does.

:linux: StarkZarn :verified: boosted:
DEVilonger 📟🎀devilonger
2025-08-08

@GrapheneOS _that_ rossmann?

:linux: StarkZarn :verified: boosted:
Laura Manach :bongoCat:cmconseils
2025-08-08

:thonking:

A meme featuring a 3D model of the character Mr. Bean in a video game setting that resembles Grand Theft Auto: San Andreas. Mr. Bean is wearing his signature brown tweed jacket and red tie, and he has an intensely confused and judgmental expression on his face, with a heavily furrowed brow.

The white text overlay on the image reads: "when I use '?????' in a conversation, this is exactly my face behind the phone".
:linux: StarkZarn :verified: boosted:
2025-08-07

Two years ago when researchers found and publicly exposed an intentional backdoor in a TETRA encryption algorithm used to secure radio communications for police/military/intel agencies around the world -- the algorithm involved a key advertised as one strength but secretly reduced to 32 bits -- the European organization that produced the algorithm told users that to secure their communications they could deploy an end-to-end encryption solution on top of the backdoor'd algorithm. Now the same researchers say they found a security problem with the end-to-end solution as well -- another reduced key. Here's my story for Wired:

wired.com/story/encryption-mad

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst