Are you over 18 and want to see adult content?
More Annotations

A complete backup of survivinglifedaily.com
Are you over 18 and want to see adult content?

A complete backup of foto-planeta.com
Are you over 18 and want to see adult content?

A complete backup of simplehealthykitchen.com
Are you over 18 and want to see adult content?

A complete backup of comertzeytin.com
Are you over 18 and want to see adult content?

A complete backup of classicthunder.us
Are you over 18 and want to see adult content?
Favourite Annotations

A complete backup of visitfingerlakes.com
Are you over 18 and want to see adult content?

A complete backup of epontos.blogspot.com
Are you over 18 and want to see adult content?

A complete backup of elrincondeluz.com.ar
Are you over 18 and want to see adult content?

A complete backup of sorridents.com.br
Are you over 18 and want to see adult content?

A complete backup of matematicasparaticharito.wordpress.com
Are you over 18 and want to see adult content?

A complete backup of futuretravelexperience.com
Are you over 18 and want to see adult content?
Text
FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
SUPERFISH, KOMODIA, PRIVDOG VULNERABILITY TEST Superfish, Komodia, PrivDog vulnerability test (retired) This test has been retired in favor of the badssl.com Dashboard . You can still find Superfish removal instructions here . Test disabled. YES, it looks like you have a Komodia. proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at themoment, but
THE SAD STATE OF SMTP ENCRYPTION EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
HOW PLEX IS DOING HTTPS FOR ALL ITS USERS MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
SUPERFISH, KOMODIA, PRIVDOG VULNERABILITY TEST Superfish, Komodia, PrivDog vulnerability test (retired) This test has been retired in favor of the badssl.com Dashboard . You can still find Superfish removal instructions here . Test disabled. YES, it looks like you have a Komodia. proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at themoment, but
THE SAD STATE OF SMTP ENCRYPTION EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
HOW PLEX IS DOING HTTPS FOR ALL ITS USERS MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an SEARCHABLE LINUX SYSCALL TABLE FOR X86 AND X86_64 Searchable Linux Syscall Table for x86 and x86_64. There are some tables like this around, but they are usually cool auto-generated hacks and that has the downfall of not distinguishing what of the different implementations is the correct one, etc. THE "BEHIND THE SOFA" CT LOG The "Behind The Sofa" CT Log. behindthesofa iswas an open Certificate Transparency log.. URL: https://ct.filippo.io/behindthesofa/ Log ID TOUCH-TO-OPERATE PASSWORD-STORE WITH YUBIKEY 4 Filippo Valsorda, 10 Sep 2018 on Technical notes Touch-to-operate password-store with YubiKey 4. There are dozens of tutorials on how to fight GnuPG to use YubiKeys for everything, but my favorite overlooked feature of the YubiKey 4 is "touch to operate", where each cryptographic operation takes a physical touch of the gold surface.. That pairs particularly well with password-store, a PGP UNDERSTANDING METRICS IN THE AGE OF THE TSDB Understanding Metrics in the Age of the TSDB. Network and web applications generate metrics, which we usually just shovel into a library without thinking much about their true meaning or performance cost. This week I decided to read through the existing Go libraries, got halfway through writing my own, dropped it, and finally wrote thisguide
NATIVE SCROLLING AND ITERM2 Native scrolling and iTerm2. tl;dr See the bullet points for the supported programs and the last paragraph for installation. Something I always wanted is native touchpad/mousewheel scrolling in all my terminal programs. MouseTerm hacks that into the OS X Terminal, but I am a iTerm2 user. I tried and gave up researching this a while ago,but
UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
SUPERFISH, KOMODIA, PRIVDOG VULNERABILITY TEST Superfish, Komodia, PrivDog vulnerability test (retired) This test has been retired in favor of the badssl.com Dashboard . You can still find Superfish removal instructions here . Test disabled. YES, it looks like you have a Komodia. proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at themoment, but
THE SAD STATE OF SMTP ENCRYPTION EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
HOW PLEX IS DOING HTTPS FOR ALL ITS USERS MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
SUPERFISH, KOMODIA, PRIVDOG VULNERABILITY TEST Superfish, Komodia, PrivDog vulnerability test (retired) This test has been retired in favor of the badssl.com Dashboard . You can still find Superfish removal instructions here . Test disabled. YES, it looks like you have a Komodia. proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at themoment, but
THE SAD STATE OF SMTP ENCRYPTION EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
HOW PLEX IS DOING HTTPS FOR ALL ITS USERS MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an SEARCHABLE LINUX SYSCALL TABLE FOR X86 AND X86_64 Searchable Linux Syscall Table for x86 and x86_64. There are some tables like this around, but they are usually cool auto-generated hacks and that has the downfall of not distinguishing what of the different implementations is the correct one, etc. THE "BEHIND THE SOFA" CT LOG The "Behind The Sofa" CT Log. behindthesofa iswas an open Certificate Transparency log.. URL: https://ct.filippo.io/behindthesofa/ Log ID TOUCH-TO-OPERATE PASSWORD-STORE WITH YUBIKEY 4 Filippo Valsorda, 10 Sep 2018 on Technical notes Touch-to-operate password-store with YubiKey 4. There are dozens of tutorials on how to fight GnuPG to use YubiKeys for everything, but my favorite overlooked feature of the YubiKey 4 is "touch to operate", where each cryptographic operation takes a physical touch of the gold surface.. That pairs particularly well with password-store, a PGP UNDERSTANDING METRICS IN THE AGE OF THE TSDB Understanding Metrics in the Age of the TSDB. Network and web applications generate metrics, which we usually just shovel into a library without thinking much about their true meaning or performance cost. This week I decided to read through the existing Go libraries, got halfway through writing my own, dropped it, and finally wrote thisguide
NATIVE SCROLLING AND ITERM2 Native scrolling and iTerm2. tl;dr See the bullet points for the supported programs and the last paragraph for installation. Something I always wanted is native touchpad/mousewheel scrolling in all my terminal programs. MouseTerm hacks that into the OS X Terminal, but I am a iTerm2 user. I tried and gave up researching this a while ago,but
UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
SUPERFISH, KOMODIA, PRIVDOG VULNERABILITY TEST Superfish, Komodia, PrivDog vulnerability test (retired) This test has been retired in favor of the badssl.com Dashboard . You can still find Superfish removal instructions here . Test disabled. YES, it looks like you have a Komodia. proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at themoment, but
THE SAD STATE OF SMTP ENCRYPTION EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
HOW PLEX IS DOING HTTPS FOR ALL ITS USERS MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
SUPERFISH, KOMODIA, PRIVDOG VULNERABILITY TEST Superfish, Komodia, PrivDog vulnerability test (retired) This test has been retired in favor of the badssl.com Dashboard . You can still find Superfish removal instructions here . Test disabled. YES, it looks like you have a Komodia. proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at themoment, but
THE SAD STATE OF SMTP ENCRYPTION EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
HOW PLEX IS DOING HTTPS FOR ALL ITS USERS MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an SEARCHABLE LINUX SYSCALL TABLE FOR X86 AND X86_64 Searchable Linux Syscall Table for x86 and x86_64. There are some tables like this around, but they are usually cool auto-generated hacks and that has the downfall of not distinguishing what of the different implementations is the correct one, etc. THE "BEHIND THE SOFA" CT LOG The "Behind The Sofa" CT Log. behindthesofa iswas an open Certificate Transparency log.. URL: https://ct.filippo.io/behindthesofa/ Log ID TOUCH-TO-OPERATE PASSWORD-STORE WITH YUBIKEY 4 Filippo Valsorda, 10 Sep 2018 on Technical notes Touch-to-operate password-store with YubiKey 4. There are dozens of tutorials on how to fight GnuPG to use YubiKeys for everything, but my favorite overlooked feature of the YubiKey 4 is "touch to operate", where each cryptographic operation takes a physical touch of the gold surface.. That pairs particularly well with password-store, a PGP UNDERSTANDING METRICS IN THE AGE OF THE TSDB Understanding Metrics in the Age of the TSDB. Network and web applications generate metrics, which we usually just shovel into a library without thinking much about their true meaning or performance cost. This week I decided to read through the existing Go libraries, got halfway through writing my own, dropped it, and finally wrote thisguide
NATIVE SCROLLING AND ITERM2 Native scrolling and iTerm2. tl;dr See the bullet points for the supported programs and the last paragraph for installation. Something I always wanted is native touchpad/mousewheel scrolling in all my terminal programs. MouseTerm hacks that into the OS X Terminal, but I am a iTerm2 user. I tried and gave up researching this a while ago,but
UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
SUPERFISH, KOMODIA, PRIVDOG VULNERABILITY TEST Superfish, Komodia, PrivDog vulnerability test (retired) This test has been retired in favor of the badssl.com Dashboard . You can still find Superfish removal instructions here . Test disabled. YES, it looks like you have a Komodia. proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at themoment, but
EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
HOW PLEX IS DOING HTTPS FOR ALL ITS USERS THE SAD STATE OF SMTP ENCRYPTION MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
SUPERFISH, KOMODIA, PRIVDOG VULNERABILITY TEST Superfish, Komodia, PrivDog vulnerability test (retired) This test has been retired in favor of the badssl.com Dashboard . You can still find Superfish removal instructions here . Test disabled. YES, it looks like you have a Komodia. proxy running (but not Superfish). Unfortunately there aren't detailed removal instructions at themoment, but
EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
HOW PLEX IS DOING HTTPS FOR ALL ITS USERS THE SAD STATE OF SMTP ENCRYPTION MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an THE "BEHIND THE SOFA" CT LOG The "Behind The Sofa" CT Log. behindthesofa iswas an open Certificate Transparency log.. URL: https://ct.filippo.io/behindthesofa/ Log ID THE SAD STATE OF SMTP ENCRYPTION This is a quick recap of why I'm sad about SMTP encryption. It explains how TLS certificate verification in SMTP is useless even if you force it. SMTP SMTP is the protocol that mail servers talk between them to deliver mail. Standardized in 1982 it used to be, unsurprisingly, 100% SEARCHABLE LINUX SYSCALL TABLE FOR X86 AND X86_64 Searchable Linux Syscall Table for x86 and x86_64. There are some tables like this around, but they are usually cool auto-generated hacks and that has the downfall of not distinguishing what of the different implementations is the correct one, etc. TOUCH-TO-OPERATE PASSWORD-STORE WITH YUBIKEY 4 Filippo Valsorda, 10 Sep 2018 on Technical notes Touch-to-operate password-store with YubiKey 4. There are dozens of tutorials on how to fight GnuPG to use YubiKeys for everything, but my favorite overlooked feature of the YubiKey 4 is "touch to operate", where each cryptographic operation takes a physical touch of the gold surface.. That pairs particularly well with password-store, a PGP UNDERSTANDING METRICS IN THE AGE OF THE TSDB Understanding Metrics in the Age of the TSDB. Network and web applications generate metrics, which we usually just shovel into a library without thinking much about their true meaning or performance cost. This week I decided to read through the existing Go libraries, got halfway through writing my own, dropped it, and finally wrote thisguide
UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in NATIVE SCROLLING AND ITERM2 Native scrolling and iTerm2. tl;dr See the bullet points for the supported programs and the last paragraph for installation. Something I always wanted is native touchpad/mousewheel scrolling in all my terminal programs. MouseTerm hacks that into the OS X Terminal, but I am a iTerm2 user. I tried and gave up researching this a while ago,but
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
THE SAD STATE OF SMTP ENCRYPTION UNDERSTANDING METRICS IN THE AGE OF THE TSDBSEE MORE ONBLOG.FILIPPO.IO
A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECH Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
THE SAD STATE OF SMTP ENCRYPTION UNDERSTANDING METRICS IN THE AGE OF THE TSDBSEE MORE ONBLOG.FILIPPO.IO
A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDA
Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. MAKING SYSTEM CALLS FROM ASSEMBLY IN MAC OS X 64-bit. 64-bit is a bit cleaner, but completely different: OS X (and GNU/Linux and everyone except Windows) on 64 architectures adopt the System V AMD64 ABI reference.Jump to section A.2.1 for the syscall calling convention.. arguments are passed on the registers rdi, rsi, rdx, r10, r8 and r9; syscall number in the rax register; the call is done via the syscall instruction USING ED25519 SIGNING KEYS FOR ENCRYPTION Filippo Valsorda, 18 May 2019 on Crypto | Mainline Using Ed25519 signing keys for encryption @Benjojo12 and I are building an encryption tool that will also support SSH keys as recipients, because everyone effectively already publishes their SSH public keys on GitHub.. For RSA keys, this is dangerous but straightforward: a PKCS#1 v1.5 signing key is the same as an OAEP encryption key. EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOS Filippo Valsorda, 07 Feb 2018 on Technical notes Easy Windows and Linux cross-compilers for macOS. tl;dr: you can install cross-compiler toolchains to compile C/C++ for Windows or Linux from macOS with these two Homebrew Formulas. A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in HOW THE NEW GMAIL IMAGE PROXY WORKS AND WHAT THIS MEANS Note: this article was written in 2013 and might be out of date. Google recently announced that images in emails will be displayed automatically by default to Gmail users, thanks to an anonymizing proxy operated by them. This, they say, will actually benefit users privacy. This might very well be UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust SSH WHOAMI.FILIPPO.IO ssh whoami.filippo.io. Here's a fun PoC I built thanks to Ben's dataset. I don't want to ruin the surprise, so just try this command. (It's harmless.) ssh whoami.filippo.io. For the security crowd: don't worry, I don't have any OpenSSH 0day and even if I did I wouldn't burn them on my blog. Also, ssh is designed to log into untrusted servers. NATIVE SCROLLING AND ITERM2 Native scrolling and iTerm2. tl;dr See the bullet points for the supported programs and the last paragraph for installation. Something I always wanted is native touchpad/mousewheel scrolling in all my terminal programs. MouseTerm hacks that into the OS X Terminal, but I am a iTerm2 user. I tried and gave up researching this a while ago,but
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECHFILIPPO WATCHFILIPPO RESTAURANTFILIPPO S PIZZAFILIPPO LORETI REVIEWFILIPPO LORETI WATCHESFILIPPO LORETI WATCHFOR SALE
Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
THE SAD STATE OF SMTP ENCRYPTION UNDERSTANDING METRICS IN THE AGE OF THE TSDBSEE MORE ONBLOG.FILIPPO.IO
A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTIONCAPTIVE PORTAL FAILEDDISABLE CAPTIVE PORTAL DETECTIONDISABLE CAPTIVE PORTAL DETECTION CHROMECAPTIVE PORTAL AUTHORIZATION CHROME OSCAPTIVE PORTAL DETECTION CISCOCAPTIVE PORTAL PROBLEM Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECHFILIPPO WATCHFILIPPO RESTAURANTFILIPPO S PIZZAFILIPPO LORETI REVIEWFILIPPO LORETI WATCHESFILIPPO LORETI WATCHFOR SALE
Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
THE SAD STATE OF SMTP ENCRYPTION UNDERSTANDING METRICS IN THE AGE OF THE TSDBSEE MORE ONBLOG.FILIPPO.IO
A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTIONCAPTIVE PORTAL FAILEDDISABLE CAPTIVE PORTAL DETECTIONDISABLE CAPTIVE PORTAL DETECTION CHROMECAPTIVE PORTAL AUTHORIZATION CHROME OSCAPTIVE PORTAL DETECTION CISCOCAPTIVE PORTAL PROBLEM Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
FILIPPO VALSORDA
Filippo Valsorda 9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105. hi@filippo.io. filippo@golang.org.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. MAKING SYSTEM CALLS FROM ASSEMBLY IN MAC OS X 64-bit. 64-bit is a bit cleaner, but completely different: OS X (and GNU/Linux and everyone except Windows) on 64 architectures adopt the System V AMD64 ABI reference.Jump to section A.2.1 for the syscall calling convention.. arguments are passed on the registers rdi, rsi, rdx, r10, r8 and r9; syscall number in the rax register; the call is done via the syscall instruction USING ED25519 SIGNING KEYS FOR ENCRYPTION Filippo Valsorda, 18 May 2019 on Crypto | Mainline Using Ed25519 signing keys for encryption @Benjojo12 and I are building an encryption tool that will also support SSH keys as recipients, because everyone effectively already publishes their SSH public keys on GitHub.. For RSA keys, this is dangerous but straightforward: a PKCS#1 v1.5 signing key is the same as an OAEP encryption key. EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOS Filippo Valsorda, 07 Feb 2018 on Technical notes Easy Windows and Linux cross-compilers for macOS. tl;dr: you can install cross-compiler toolchains to compile C/C++ for Windows or Linux from macOS with these two Homebrew Formulas. A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in HOW THE NEW GMAIL IMAGE PROXY WORKS AND WHAT THIS MEANS Note: this article was written in 2013 and might be out of date. Google recently announced that images in emails will be displayed automatically by default to Gmail users, thanks to an anonymizing proxy operated by them. This, they say, will actually benefit users privacy. This might very well be UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust SSH WHOAMI.FILIPPO.IO ssh whoami.filippo.io. Here's a fun PoC I built thanks to Ben's dataset. I don't want to ruin the surprise, so just try this command. (It's harmless.) ssh whoami.filippo.io. For the security crowd: don't worry, I don't have any OpenSSH 0day and even if I did I wouldn't burn them on my blog. Also, ssh is designed to log into untrusted servers. NATIVE SCROLLING AND ITERM2 Native scrolling and iTerm2. tl;dr See the bullet points for the supported programs and the last paragraph for installation. Something I always wanted is native touchpad/mousewheel scrolling in all my terminal programs. MouseTerm hacks that into the OS X Terminal, but I am a iTerm2 user. I tried and gave up researching this a while ago,but
FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECHFILIPPO WATCHFILIPPO RESTAURANTFILIPPO S PIZZAFILIPPO LORETI REVIEWFILIPPO LORETI WATCHESFILIPPO LORETI WATCHFOR SALE
Filippo Valsorda. I'm a cryptography and software engineer. I'm in charge of cryptography and security on the Go team at Google. Read more about what I do and how we might know each other. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
UNDERSTANDING METRICS IN THE AGE OF THE TSDBSEE MORE ONBLOG.FILIPPO.IO
A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTIONCAPTIVE PORTAL FAILEDDISABLE CAPTIVE PORTAL DETECTIONDISABLE CAPTIVE PORTAL DETECTION CHROMECAPTIVE PORTAL AUTHORIZATION CHROME OSCAPTIVE PORTAL DETECTION CISCOCAPTIVE PORTAL PROBLEM Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in THE SAD STATE OF SMTP ENCRYPTION MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
UNTRUSTING AN INTERMEDIATE CA ON OS X Filippo Valsorda, 26 May 2016 on Mainline Untrusting an intermediate CA on OS X. Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. FILIPPO VALSORDACRYPTOSO I LOST MY OPENBSD FDE PASSWORDHI! I'M FILIPPO VALSORDADONATING.TECHFILIPPO WATCHFILIPPO RESTAURANTFILIPPO S PIZZAFILIPPO LORETI REVIEWFILIPPO LORETI WATCHESFILIPPO LORETI WATCHFOR SALE
Filippo Valsorda. I'm a cryptography and software engineer. I'm in charge of cryptography and security on the Go team at Google. Read more about what I do and how we might know each other. BRAINWALLETS: FROM THE PASSWORD TO THE ADDRESS A lot of them just take the unsalted SHA256 hash of the password. This is wrong.Because SHA256 is fast and that means that an attacker can pregenerate huge tables of all possible brainwallets to monitor and empty them (Spoiler: they do). This kind of thing – turning a human supplied password into a public hash – is exactly what password stretching are for, and not using them here is an EFFICIENT GO APIS WITH THE MID-STACK INLINERSEE MORE ONBLOG.FILIPPO.IO
TICKETBLEED (CVE-2016-9244)SEE MORE ON FILIPPO.IO EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOSSEE MORE ONBLOG.FILIPPO.IO
UNDERSTANDING METRICS IN THE AGE OF THE TSDBSEE MORE ONBLOG.FILIPPO.IO
A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTIONCAPTIVE PORTAL FAILEDDISABLE CAPTIVE PORTAL DETECTIONDISABLE CAPTIVE PORTAL DETECTION CHROMECAPTIVE PORTAL AUTHORIZATION CHROME OSCAPTIVE PORTAL DETECTION CISCOCAPTIVE PORTAL PROBLEM Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in THE SAD STATE OF SMTP ENCRYPTION MKCERT: VALID HTTPS CERTIFICATES FOR LOCALHOST (or for any other name) The web is moving to HTTPS, preventing network attackers from observing or injecting page contents. But HTTPS needs TLS certificates, and while deployment is increasingly a solved issue thanks to the ACME protocol and Let's Encrypt, development stillmostly ends up
UNTRUSTING AN INTERMEDIATE CA ON OS X Filippo Valsorda, 26 May 2016 on Mainline Untrusting an intermediate CA on OS X. Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites.FILIPPO VALSORDA
Filippo Valsorda. I'm a cryptography and software engineer. I'm in charge of cryptography and security on the Go team at Google. Read more about what I do and how we might know each other.FILIPPO.IO
Filippo Valsorda, 18 Apr 2020 on Technical notes Hacking together a USB-C charger for a cheap Chromebook. The era of USB-C has come. The other day I threw all other cables into a box, and bought a set of USB-C to USB-C, Lightning, and microUSB cables. MAKING SYSTEM CALLS FROM ASSEMBLY IN MAC OS X 64-bit. 64-bit is a bit cleaner, but completely different: OS X (and GNU/Linux and everyone except Windows) on 64 architectures adopt the System V AMD64 ABI reference.Jump to section A.2.1 for the syscall calling convention.. arguments are passed on the registers rdi, rsi, rdx, r10, r8 and r9; syscall number in the rax register; the call is done via the syscall instruction USING ED25519 SIGNING KEYS FOR ENCRYPTION Filippo Valsorda, 18 May 2019 on Crypto | Mainline Using Ed25519 signing keys for encryption @Benjojo12 and I are building an encryption tool that will also support SSH keys as recipients, because everyone effectively already publishes their SSH public keys on GitHub.. For RSA keys, this is dangerous but straightforward: a PKCS#1 v1.5 signing key is the same as an OAEP encryption key. EASY WINDOWS AND LINUX CROSS-COMPILERS FOR MACOS Filippo Valsorda, 07 Feb 2018 on Technical notes Easy Windows and Linux cross-compilers for macOS. tl;dr: you can install cross-compiler toolchains to compile C/C++ for Windows or Linux from macOS with these two Homebrew Formulas. A SECURE CAPTIVE PORTAL BROWSER WITH AUTOMATIC DNS DETECTION Captive portals are the worst. Flaky detection. The OS and browser try to detect these annoying network features but fail quite often, leaving you with broken connections. DID YOU KNOW that probe-based captive portal detection really doesn't work very well, with ~30% FP *and* ~30% FN rate in HOW THE NEW GMAIL IMAGE PROXY WORKS AND WHAT THIS MEANS Note: this article was written in 2013 and might be out of date. Google recently announced that images in emails will be displayed automatically by default to Gmail users, thanks to an anonymizing proxy operated by them. This, they say, will actually benefit users privacy. This might very well be UNTRUSTING AN INTERMEDIATE CA ON OS X Intermediate CAs are certificates signed by a root CA that can sign arbitrary certificates for any websites. They are just as powerful as root CAs, but there's no full list of the ones your system trusts, because root CAs can make new ones at will, and your system will trust NATIVE SCROLLING AND ITERM2 tl;dr See the bullet points for the supported programs and the last paragraph for installation. Something I always wanted is native touchpad/mousewheel scrolling in all my terminal programs. MouseTerm hacks that into the OS X Terminal, but I am a iTerm2 user. I tried andgave up researching
SSH WHOAMI.FILIPPO.IO Here's a fun PoC I built thanks to Ben's dataset. I don't want to ruin the surprise, so just try this command. (It's harmless.) ssh whoami.filippo.io For the security crowd: don't worry, I don't have any OpenSSH 0day and even if I did I wouldn't burn them onFILIPPO VALSORDA
I'm a cryptography and software engineer. I'm in charge of cryptography and security on the Go team at Google. Read more about what I do and how we might know each other.
I am _FiloSottile_ on GitHub andTwitter .
My most popular project is mkcert . The one I have the highest hopes for is age . I have a newsletter, Cryptography Dispatches, and a
Twitch channel .
I attended the Recurse Center batches Fall 2013and Fall 2 2017.
CONTACTS
Filippo Valsorda
9450 SW Gemini Dr #52960 Beaverton, Oregon 97008-7105hi@filippo.io
filippo@golang.org
INDEX
Most of the content is at blog.filippo.io or in my newsletter archives.
/behindthesofa
/linux-syscall-table ssh whoami.filippo.ioVULNERABILITY TESTS
/Heartbleed
/Ticketbleed
/CVE-2016-2107
/Badfish
Details
Copyright © 2023 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0