/bin/cat
Security consultant / Pentester
/bin/cat
Holy Shit, #Valve did a product launch in 2025 and did not mention AI a single fucking time. So refreshing.
Had a little scraping fun with Austria's yellow press. German explainer, sadly, no English captions.
https://www.youtube.com/watch?v=4rvPK6jB3l4
Let me explain. In Austria, governments feed the media with government funding and ads. No matter the party.
A few years ago, they invented yet another money funnel: digital transformation funding. Young online media explicitely excluded, aimed at establisehd media houses only.
They submit project proposals, a politically appointed jury waves them through. š§µ
@quad Music Assistant (Home Assistant component) does exactly what you described. You can connect it to Jellyfin (and various other sources) and have it stream to any networked speaker. In the case of the meeting room PC you mentioned, you can install a barebones distro and run squeezelite as the client.
https://www.music-assistant.io/
Happy one year anniversary of Microsoft "temporarily" not publishing Windows Developer VMs!
Why aren't they just asking Copilot to fix it?!
Microsoft are rolling out Gaming Copilot to all Windows 11 PCs (excluding in China).
Enabled by default, silent install, takes screenshots and trains MS AI by default.
It installed on my Windows 11 Professional PC š«” itās also not dependent on an NPU or Copilot+
@malmoeb I have also had success using esentutil to copy the SAM, SYSTEM and SECURITY hives when Defender EDR blocked my attempts to use reg save, maybe that works for ntds.dit too? :)
Today I learned: Using diskshadow to fetch the NTDS.dit. As mentioned several times, I love reading the HTB writeups from 0xdf because I always learn something new. Like here [1]:
"To dump the domain hashes, Iāll want to get the C:\Windows\NTDS.dit file. Unfortunately, this file canāt just be copied as it is locked and in use. I can access it via a shadow copy, which Iāll generate with diskshadow and this script:
set verbose on
set context persistent nowriters
set metadata C:\Windows\Temp\0xdf[.]cab
add volume c: alias 0xdf
create
expose %0xdf% e:
and pass it [the script from above] to diskshadow:
C:\programdata> diskshadow /s C:\programdata\backup"
Attackers love vssadmin, and so do the EDR vendors. How about diskshadow? We tested the attack flow in our lab with various EDRs, and the results were .. interesting. Would the command above trigger an alert in your environment?
And here, for reference, is the corresponding lolbas article [3]
[1] https://0xdf.gitlab.io/2025/09/19/htb-baby.html
[2] https://raw.githubusercontent.com/elastic/protections-artifacts/b5a0c1956d0aa92e2f44156bc9983c25ddc817d1/behavior/rules/windows/credential_access_credential_access_via_known_utilities.toml
[3] https://lolbas-project.github.io/lolbas/Binaries/Diskshadow/
GitHub Copilot Chat Flaw Leaked Data From Private Repositories https://www.securityweek.com/github-copilot-chat-flaw-leaked-data-from-private-repositories/
It turned out that Copilot was not merely learning from private repos, it was reportedly distributing them as if they were party favors. The user had not realized that the definition of an "AI pair programmer" extended to "unauthorized code distributor." 𤣠the GitHub user should perhaps feel flattered that their proprietary data was deemed worth sharing š
I've been really enjoying Grim Dawn the past two weeks. It's essentially Diablo 2 in 2016.
Weāre thrilled to be bringing you a upcoming feature to help you find your people on Mastodon: Packs. (Or something⦠weāre still figuring out the name.)
As always, we want to build this important feature for the community WITH the community.
Read this blog post about our approach and let us know what you think!
https://blog.joinmastodon.org/2025/10/our-ideas-about-packs/
@MadMike77 @dabeaz cool, thanks for sharing!
@keisatsu @dabeaz It's a little labyrinth game. You can try the esp32-python version online on wokwi. It generates a labyrinth. You navigate it with the switches. The LEDs light indicate that the direction is walled-off. You start in north-west corner of the labyrinth and need to find the exit in the south-east.
We did it as a showcase for our hackerspace-booth at a fair.
https://wokwi.com/projects/406621792660467713
Rust code is here: https://github.com/PJaros/rust-nano-laby/
@MadMike77 @dabeaz ah I meant what your project used it for, sorry for not being more clear
@MadMike77 @dabeaz what does the arduino do, if you don't mind telling more?
@RnDanger Happy to see you got Fallout running! If you don't know already: You can look up games on ProtonDB to see if they run well and if there are any tweaks others have figured out for those that won't work out of the box
Repost if you can hear this image blaring
if you would like to see my 'how to bug hotel rooms' talk from #Sec-T, it's got its own clip now!
https://www.youtube.com/watch?v=ScwNIWzk4RQ&ab_channel=SEC-T
Good news! Your action worked! :awesome: š
Germany will be OPPOSING the Chat Control proposition! This (for now) secures a blocking minority to stop this horrifying proposal for mass surveillance.
But keep the pressure on! āšŖšŗ
The final vote will be on October 14th and many things could change until then. Keep contacting your representatives to tell them to oppose (or keep opposing) Chat Control, as soon as you can.
The blocking vote should be as large as possible to ensure this Orwellian nightmare never becomes reality.
Let's change this blocking minority into a blocking majority! We can do it! :ablobcatnod: š
#ChatControl #HumanRights #EUpol
https://digitalcourage.social/@echo_pbreyer/115184350819592476