Are there any parts of the US where single pane windows are common instead of double pane?
  • xavier xavier 1y ago 100%

    I'm in the southeast US and only have single-pane windows on my house. Of course, my house was built in 1990, so it's probably more about the house's age.

    4
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearBO
    Books 1y ago
    Jump
    What book(s) are you currently reading? 03 August
  • xavier xavier 1y ago 100%

    My favorite Discworld book is his last, The Shepherd's Crown. After doing the whole library, I felt it ending well. Then you read the afterword by Rob Wilkins... you get all the feels.

    4
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearBO
    Books 1y ago
    Jump
    What book(s) are you currently reading? 03 August
  • xavier xavier 1y ago 100%

    Re-reading the original Ringworld series by Larry Niven so that I can read the newer Fleet of World series. Currently on Ringworld Throne.

    Did you know there is a fediverse reading tracker called Bookwyrm? You can find me here! https://books.infosec.exchange/user/xavier

    2
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHA
    Hacker News 1y ago
    Jump
    Man found guilty of child porn because he ran a Tor exit node
  • xavier xavier 1y ago 100%

    He was arrested about 10 years ago. Interesting interview and recap...

    2
  • Google camera requires Google photos, is there any workaround?
  • xavier xavier 1y ago 100%

    Have you tried Open Camera or Cymera? May be easier to use another camera app.

    5
  • *Permanently Deleted*
  • xavier xavier 1y ago 100%

    AHHH! NATION STATE!!!

    6
  • Never do this!
  • xavier xavier 1y ago 100%

    This applies to you monogamous people, as well as us poly folks.

    11
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearTE
    TechNews 1y ago
    Jump
    [HN] The End of the Magic World’s 50-Year Grudge
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearIN
    Feature Request: Open external links in new tab

    Is there a setting to default all external links to a new tab? I'm used to that behavior from infosec.exchange. I keep finding myself having to reopen infosec.pub after going down a rabbit hole.

    8
    0
    Looking For Something to Read
  • xavier xavier 1y ago 100%

    I'm currently going through Niven's work. I'd suggest The Mote in God's Eye by Larry Niven and Jerry Pournelle.

    Project Hail Mary by Andy Weir is also an amazing book if you haven't read it yet.

    One more suggestion: Rendezvous with Rama by Arthur C. Clarke

    12
  • Best way to encrypt a partition?
  • xavier xavier 1y ago 100%

    Bitlocker is perfectly fine. Veracrypt and LUKS are good alternative. Sounds like you're looking for a personal use case, but in case there others out there looking for an enterprise solution, avoid Winmagic. It's a pain to manage at scale and breaks all the time.

    1
  • github.com

    Callisto is an intelligent automated binary vulnerability analysis tool. Its purpose is to autonomously decompile a provided binary and iterate through the psuedo code output looking for potential security vulnerabilities in that pseudo c code. Ghidra's headless decompiler is what drives the binary decompilation and analysis portion. The pseudo code analysis is initially performed by the Semgrep SAST tool and then transferred to GPT-3.5-Turbo for validation of Semgrep's findings, as well as potential identification of additional vulnerabilities. This tool's intended purpose is to assist with binary analysis and zero-day vulnerability discovery. The output aims to help the researcher identify potential areas of interest or vulnerable components in the binary, which can be followed up with dynamic testing for validation and exploitation. It certainly won't catch everything, but the double validation with Semgrep to GPT-3.5 aims to reduce false positives and allow a deeper analysis of the program. ![](https://lemm.ee/api/v3/image_proxy?url=https%3A%2F%2Finfosec.pub%2Fpictrs%2Fimage%2F9db1ccb1-4a53-4b0f-a280-10fe65e54363.png)

    7
    1
    github.com

    A decompiler-unified plugin by Zion Basque that leverages the OpenAI API to enhance your decompilation process by offering function identification, function summarisation and vulnerability detection. The plugin currently supports IDA, Binja and Ghidra. ![](https://lemm.ee/api/v3/image_proxy?url=https%3A%2F%2Finfosec.pub%2Fpictrs%2Fimage%2Ff3fb732f-34b6-4915-bcda-97b8fb2ed693.png)

    4
    0
    github.com

    Codex Decompiler is a Ghidra plugin that utilizes OpenAI's models to improve the decompilation and reverse engineering experience. It currently has the ability to take the disassembly from Ghidra and then feed it to OpenAI's models to decompile the code. The plugin also offers several other features to perform on the decompiled code such as finding vulnerabilities using OpenAI, generating a description using OpenAI, or decompiling the Ghidra pseudocode.

    4
    0
    https://medium.com/tenable-techblog/g-3po-a-protocol-droid-for-ghidra-4b46fa72f1ff

    In this post, I introduce a new Ghidra script that elicits high-level explanatory comments for decompiled function code from the GPT-3 large language model. This script is called G-3PO. In the first few sections of the post, I discuss the motivation and rationale for building such a tool, in the context of existing automated tooling for software reverse engineering. I look at what many of our tools — disassemblers, decompilers, and so on — have in common, insofar as they can be thought of as automatic paraphrase or translation tools. I spend a bit of time looking at how well (or poorly) GPT-3 handles these various tasks, and then sketch out the design of this new tool. If you want to just skip the discussion and get yourself set up with the tool, feel free to scroll down to the last section, and then work backwards from there if you like. The Github repository for G-3PO can be found [HERE](https://github.com/tenable/ghidra_tools/tree/main/g3po).

    4
    0
    github.com

    LLDB plugin which queries OpenAI's davinci-003 language model to speed up reverse-engineering. Treat it like an extension of Lisa.py, an Exploit Dev Swiss Army Knife. At the moment, it can ask davinci-003 to explain what the current disassembly does. Here is a simple example of what results it can provide: ![](https://lemm.ee/api/v3/image_proxy?url=https%3A%2F%2Finfosec.pub%2Fpictrs%2Fimage%2Fd5595c3d-7a13-42a8-9f41-326acf31ca36.png)

    7
    0
    github.com

    IDAPython script by Daniel Mayer that uses the unofficial ChatGPT API to generate a plain-text description of a targeted routine. The script then leverages ChatGPT again to obtain suggestions for variable and function names.

    1
    0
    github.com

    Gepetto is a Python script which uses OpenAI's gpt-3.5-turbo and gpt-4 models to provide meaning to functions decompiled by IDA Pro. At the moment, it can ask gpt-3.5-turbo to explain what a function does, and to automatically rename its variables.

    1
    0
    github.com

    This is a little toy prototype of a tool that attempts to summarize a whole binary using GPT-3 (specifically the text-davinci-003 model), based on decompiled code provided by Ghidra. However, today's language models can only fit a small amount of text into their context window at once (4096 tokens for text-davinci-003, a couple hundred lines of code at most) -- most programs (and even some functions) are too big to fit all at once. GPT-WPRE attempts to work around this by recursively creating natural language summaries of a function's dependencies and then providing those as context for the function itself. It's pretty neat when it works! I have tested it on exactly one program, so YMMV.

    7
    0
    github.com

    Automated Audit Log Forensic Analysis (ALFA) for Google Workspace is a tool to acquire all Google Workspace audit logs and perform automated forensic analysis on the audit logs using statistics and the MITRE ATT&CK Cloud Framework. By [Greg Charitonos](https://www.linkedin.com/in/charitonos/) and [BertJanCyber](https://twitter.com/BertJanCyber)

    2
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearIN
    Jump
    What 'app' are you using to view infosec.pub
  • xavier xavier 1y ago 0%

    Lemmy Native - but only out of ignorance. Gunna start looking at these now.

    0
  • InfoSec Podcasts?
  • xavier xavier 1y ago 66%

    Smashing Security Podcast is a great one, too. Less technical, more fun. Plus, they're on Mastodon: @smashingsecurity@mastodon.green

    1
  • securitylabs.datadoghq.com

    cross-posted from: https://infosec.pub/post/86834 > This is an excellent series on container security fundamentals by Rory McCune who is a bit of an authority in this field: > > * [part 1](https://securitylabs.datadoghq.com/articles/container-security-fundamentals-part-1/) > * [part 2](https://securitylabs.datadoghq.com/articles/container-security-fundamentals-part-2/) > * [part 3](https://securitylabs.datadoghq.com/articles/container-security-fundamentals-part-3/) > * [part 4](https://securitylabs.datadoghq.com/articles/container-security-fundamentals-part-4/)

    2
    0

    Hey everyone! Since we're creating a new community here, I'd love to hear who's here. I've been doing security for a bit over 30 years now. Made it up to a divisional CISO, then climbed back down the ladder to find a good work/life balance. Currently part of the security leadership team at a large US bank. I run a couple of teams right now, including a firewall policy engineering team and a production support center of excellence. I'm looking forward to seeing what type of community we can build here.

    3
    18
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearCO
    Jump
    Plex, Emby, or Jellyfin
  • xavier xavier 1y ago 50%

    I've been running Plex for years (maybe a decade or more). Yes, there are a bunch of mainstream-ish features that I don't use. It's still simple for everyone in my family (including older parents) to navigate and use. I use it for movies, TV, and it runs a photo screen saver with family pics.

    0
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearSE
    Jump
    Hacker drains Russian special services wallets, transfers funds to Ukraine
  • xavier xavier 1y ago 0%

    Look like the link is broken. I get what I think is a 404 message in Russian.

    0
  • But instead of pissing on them... Bravo for enlisting the help of [@huntress](https://infosec.exchange/@huntress) to do a code review. This vuln is NOT being actively exploited... yet. https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability []()

    1
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearIN
    Integrations with Mastodon?

    Hey everyone. I just joined and am a current member over at infosec.exchange. Is there any good way to leverage Mastodon in Lemmy, or visa-versa?

    1
    0