Show newer

@cmconseils I can relate to the doubt, because it took long time for me to learn to listen without interrupting. Still, the truth is even more important, so can be hard to balance.

@doingfedtime Mixed feelings, the cult of Rust isn't always pleasant. Thinking of core utils being replaced in Ubuntu.

@cmconseils Try to stay positive, could be worse, at least you have a car.

modrobert boosted
modrobert boosted

This is blowing up a bit: not trying to scare you all! There is a *gigantic* set of sunspots coming around the limb of the sun, comparable in size to the sunspots sketched by Carrington. They may or may not send some plasma our way. There is also a minor aurora event predicted for 2 days from now due to interactions between an eruption from this sunspot group and previously emitted solar wind/magnetic fields.

ESA has some good info on big solar storms here: esa.int/Space_Safety/Space_wea

Show thread
modrobert boosted
modrobert boosted

𝗖𝗼𝗽𝘀 𝗞𝗲𝗲𝗽 𝟵𝟬% 𝗼𝗳 𝗪𝗵𝗮𝘁 𝗧𝗵𝗲𝘆 𝗦𝗲𝗶𝘇𝗲 𝗮𝗻𝗱 𝗦𝗽𝗲𝗻𝗱 𝗜𝘁 𝗼𝗻 𝗖𝗹𝗼𝘄𝗻𝘀
(𝗵𝗼𝘄 𝘁𝗵𝗲𝘆 𝗿𝗼𝗯 𝘆𝗼𝘂)
youtube.com/watch?v=-HGCGivMSUs

modrobert boosted

Go hack more Cloudflare shit.

cve.org/CVERecord?id=CVE-2025-

\n \n

In gokey versions <0.2.0,\n a flaw in the seed decryption logic resulted in passwords incorrectly \nbeing derived solely from the initial vector and the AES-GCM \nauthentication tag of the key seed.

\n

This issue has been fixed in gokey version 0.2.0. This is a breaking change. The fix has invalidated any passwords/secrets that were derived from the seed file (using the -s option). Even if the input seed file stays the same, version 0.2.0 gokey will generate different secrets.

\n

Impact

\n

This vulnerability impacts generated keys/secrets using a seed file as an entropy input (using the -s option). Keys/secrets generated just from the master password (without the -s\n option) are not impacted. The confidentiality of the seed itself is \nalso not impacted (it is not required to regenerate the seed itself). \nSpecific impact includes:

\n

\nkeys/secrets generated from a seed file may have lower entropy: it \nwas expected that the whole seed would be used to generate keys (240 \nbytes of entropy input), where in vulnerable versions only 28 bytes was \nused
\na malicious entity could have recovered all passwords, generated \nfrom a particular seed, having only the seed file in possession without \nthe knowledge of the seed master password
\n

\n

Patches

\n

The code logic bug has been fixed in gokey version 0.2.0\n and above. Due to the deterministic nature of gokey, fixed versions \nwill produce different passwords/secrets using seed files, as all seed \nentropy will be used now.

\n

System secret rotation guidance

\n

It is advised for users to regenerate passwords/secrets using the patched version of gokey (0.2.0\n and above), and provision/rotate these secrets into respective systems \nin place of the old secret. A specific rotation procedure is \nsystem-dependent, but most common patterns are described below.

\n

Systems that do not require the old password/secret for rotation

\n

Such systems usually have a \"Forgot password\" facility or a\n similar facility allowing users to rotate their password/secrets by \nsending a unique \"magic\" link to the user's email or phone. In such \ncases users are advised to use this facility and input the newly \ngenerated password secret, when prompted by the system.

\n

Systems that require the old password/secret for rotation

\n

Such systems usually have a modal password rotation window\n usually in the user settings section requiring the user to input the \nold and the new password sometimes with a confirmation. To \ngenerate/recover the old password in such cases users are advised to:

\n

\ntemporarily download gokey version 0.1.3 for their respective operating system to recover the old password
\nuse gokey version 0.2.0 or above to generate the new password
\npopulate the system provided password rotation form
\n

\n

Systems that allow multiple credentials for the same account to be provisioned

\n

Such systems usually require a secret or a cryptographic \nkey as a credential for access, but allow several credentials at the \nsame time. One example is SSH: a particular user may have several \nauthorized public keys configured on the SSH server for access. For such\n systems users are advised to:

\n

\ngenerate a new secret/key/credential using gokey version 0.2.0 or above
\nprovision the new secret/key/credential in addition to the existing credential on the system
\nverify that the access or required system operation is still possible with the new secret/key/credential
\nrevoke authorization for the existing/old credential from the system
\n

\n

Credit

\n

This vulnerability was found by Théo Cusnir (@mister_mime) and responsibly disclosed through Cloudflare's bug bounty program.

\n \n

modrobert boosted
modrobert boosted
modrobert boosted

Pocket Acid! A free software tracker for techno acid style music designed to run on linux based gaming handleds github.com/boomlinde/pocketacid

modrobert boosted
modrobert boosted

Woah, a usable (performance-wise on 68k) modern crypto ssh client for #Amiga (handshake takes 1 minute, interactive session is faster obv) franke.ms/git/bebbo/bebbossh

modrobert boosted

Grab a mini Van De Graff kit In our "Black fly day" sale" 10% off, if you use BLACK FLY DAY code at the checkout.

We don't do #BlackFriday until Dec 1st.

extkits.co.uk/product/van-de-g

modrobert boosted
modrobert boosted

Hardfloor - "Black Train"

Originaly released in 2014 to celebrate 5 years of the De:tuned label from Belgium on a 5x12" Vinyl Compilation Box-Set.

Now for the first time on to download and re-released on vinyl.
(HF033 Data Mining Vinyl Edition Vol.1)

►YouTube: youtube.com/watch?v=1GesOsxTOUs

modrobert boosted

OpenAI has experienced a data breach. Any user who utilized their API services should assume that personal data, including their name, location, user ID, and other details, is now in the possession of the hacker

openai.com/index/mixpanel-inci

modrobert boosted

I rewatched The Dark Knight, forgot how good it is, especially the Joker (Heath Ledger). However, the scene towards the end where Lucius reluctantly listens in on all cellphones of Gotham City didn't age well regarding , considering is a lot worse.

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.