Forgot your password?
typodupeerror

Comment: Re:I don't buy it (Score 1) 151

by blueg3 (#47603163) Attached to: Planes Can Be Hacked Via Inflight Wi-fi, Says Researcher

Hardcoded credentials aren't necessary. What they *mean* is that the *reason* for hardcoded credentials is "support". "Necessary" here doesn't actually mean "necessary", but rather, "deemed to be the best choice". Of course, it might really be the best choice. There's certainly a cost associated with making the support more complicated. You have to weigh that against the difficulty of using the hardcoded credentials and what you can do with them. There are lots of potential tradeoff points, from "using hardcoded credentials was the stupidest choice you've ever made" to "it's technically offensive, but also the best option".

Comment: Re:Do cellphone chargers require USB negotiation? (Score 1) 205

by blueg3 (#47576225) Attached to: "BadUSB" Exploit Makes Devices Turn "Evil"

Sure. Depending on your device (iPhone works differently from the standard USB fast-charging spec), you should be able to easily look up what resistors need to go where. (As mentioned, non-iPhone devices use an informal standardized spec. A circuit diagram of something like a Samsung charger should show you.)

Comment: Re:Oh think of the fun when drivers update firmwar (Score 1) 205

by blueg3 (#47576195) Attached to: "BadUSB" Exploit Makes Devices Turn "Evil"

What sneakernet issue? Be more clear. USB devices do not contain installable software, except for the obvious and well-known case of a mass-storage device happening to contain files that can be intentionally or inadvertently executed by the end user after the MSD is connected.

Comment: Re:Do cellphone chargers require USB negotiation? (Score 1) 205

by blueg3 (#47575523) Attached to: "BadUSB" Exploit Makes Devices Turn "Evil"

You just need a resistor or two. Almost any USB-charged device will charge at 500 mA if it is connected to a dumb charger (no data lines), but in order to charge at a higher current (as many devices do), it needs to sense that it's connected to a charger that supports the higher current draw. So that it can be implemented without real USB-supporting electronics, that's just done with some simple electrical components. So you can make a charger that blocks the data lines but permits full-speed charging.

If you're okay with the slow version, just go out and buy a "power only" USB cable. They already exist. Alternately, this.

Comment: Re:How is this viable as an attack medium? (Score 4, Interesting) 205

by blueg3 (#47574581) Attached to: "BadUSB" Exploit Makes Devices Turn "Evil"

1. A ton of USB devices are actually implemented as general-purpose components with programmable firmware (attached to whatever support hardware, like a network card or a webcam, is necessary). So they're more common than you think.

2. Smartphones are an excellent reprogrammable USB device that lots of individuals have.

3. This is difficult enough to really engineer well that it is probably a bigger threat as a targeted attack against a big organization for now. Until someone does the engineering to make it easy to deploy widely. Then, it'll be a threat for everyone. Kind of like automated hacking of consumer-grade routers to modify the firmware to participate in an Internet-wide portscan. It's the Metasploit effect: it's not a big problem until someone makes it automated, then it is.

Comment: Re: Why? (Score 2) 92

by blueg3 (#47533677) Attached to: New SSL Server Rules Go Into Effect Nov. 1

They are bugged only once, and then they accept the cert locally.

Not necessarily. On Chrome, for example, accepting a self-signed cert long-term isn't the default behavior. Even that isn't a great idea: you have no knowledge of whether the self-signed cert is legitimate or not without a substantial out-of-band communication of technical information to nontechnical people, which isn't cheap. A college network is a good example: it should be treated as a hostile network, so MitM against a self-signed cert within your private network is very much a reality.

Or the college provides an easy way for the BYOD people to acquire the college's cert.

Doing that at a large scale for technically-inclined people costs more than a public CA cert. Once you have to support regular users, it's way more expensive.

There is no need for an official CA to issue a cert for Server1 at IP address 10.2.1.2

Certs don't include IP address. When you get a cert for server1.internal.unm.edu, they don't know what IP address(es) it will be bound to, and they don't and shouldn't care.

No need whatsoever.

There certainly is a need. It's to enable devices that want SSL but aren't configured to trust your internal CA to securely identify your server. There are lots of reasons for "aren't configured to trust your internal CA" to happen.

And, as proof of that, starting in November, the official CAs will stop issuing those types of certs.

They're going to require that certs they issue are for domains that are tied to an external domain. For example, mail.internal.unm,edu. This doesn't negatively impact people's ability to have public CA certs for internal resources. Nor should it.

Comment: Re:Strictly speaking... (Score 1, Informative) 95

by blueg3 (#47409007) Attached to: Thousands of Leaked KGB Files Are Now Open To the Public

Oddly, it's not. That's where OP is coming from. "Treasure trove" comes ultimately from Latin via French (or at least, some language fragments the Normans brought over). The "trove" means "found", so it's "found treasure". That's why in the original (pre-English) phrase, the word order is backwards: "trove" is the adjective, "treasure" is the noun, and it follows the appropriate French/Latin word order. It was pulled directly into English without reordering (common for borrowed phrases). Eventually, "trove" (which had no English meaning at all) became a synonym (a shortening) for "treasure trove".

So by etymology, "trove" was originally an adjective. However, it means nothing in English. The phrase "treasure trove" is a noun phrase all by itself that can't really be broken into parts.

Chemist who falls in acid will be tripping for weeks.

Working...