Accurate time is incredibly important for cryptography. Things like certificates and pki all rely on having an accurate clock. NTP was never designed with security in mind, and a network-level adversary can manipulate normal plaintext NTP traffic in ways that would allow them to make your clock jump forward or backwards. Preventing this means your system needs a reliable source of time. NTS (Network Time Security) adds a layer of authenticated encryption to normal NTP which helps to mitigate the tampering part of this problem. Afaik, only Chrony and NTPsec provide NTS-secured NTP. I recommend Chrony because it is pretty straightforward to configure and reliable.
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_basic_system_settings/assembly_overview-of-network-time-security-in-chrony_configuring-basic-system-settings
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_basic_system_settings/assembly_overview-of-network-time-security-in-chrony_configuring-basic-system-settings
Red Hat Customer Portal
Chapter 32. Overview of Network Time Security (NTS) in chrony Red Hat Enterprise Linux 8 | Red Hat Customer Portal
Access Red Hat’s knowledge, guidance, and support through your subscription.
Forwarded from Sys-Admin InfoSec
/ Linux kernel: Heap buffer overflow in fs_context.c since version 5.1
- https://www.openwall.com/lists/oss-security/2022/01/18/7
- CVE-2022-0185 (demo) - https://github.com/Crusaders-of-Rust/CVE-2022-0185
/ GitHub Actions flaw that allowed code to be approved without review is addressed with new feature rollout
- https://portswigger.net/daily-swig/github-actions-flaw-that-allowed-code-to-be-approved-without-review-is-addressed-with-new-feature-rollout
- https://www.openwall.com/lists/oss-security/2022/01/18/7
- CVE-2022-0185 (demo) - https://github.com/Crusaders-of-Rust/CVE-2022-0185
/ GitHub Actions flaw that allowed code to be approved without review is addressed with new feature rollout
- https://portswigger.net/daily-swig/github-actions-flaw-that-allowed-code-to-be-approved-without-review-is-addressed-with-new-feature-rollout
GitHub
GitHub - Crusaders-of-Rust/CVE-2022-0185: CVE-2022-0185
CVE-2022-0185. Contribute to Crusaders-of-Rust/CVE-2022-0185 development by creating an account on GitHub.
Forwarded from BlackBox (Security) Archiv
The EU Wants Its Own DNS Resolver that Can Block ‘Unlawful’ Traffic
The EU is planning to develop its own government-run DNS resolver. The project dubbed DNS4EU is meant to offer a counterweight to the popular resolvers that are mostly based in the U.S. Aside from offering privacy and security to users, the DNS solution will also be able to block "illegal" websites, including pirate sites.
https://torrentfreak.com/the-eu-wants-its-own-dns-resolver-that-can-block-unlawful-traffic-220119/
#eu #dns
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
The EU is planning to develop its own government-run DNS resolver. The project dubbed DNS4EU is meant to offer a counterweight to the popular resolvers that are mostly based in the U.S. Aside from offering privacy and security to users, the DNS solution will also be able to block "illegal" websites, including pirate sites.
https://torrentfreak.com/the-eu-wants-its-own-dns-resolver-that-can-block-unlawful-traffic-220119/
#eu #dns
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
Torrentfreak
The EU Wants Its Own DNS Resolver that Can Block 'Unlawful' Traffic * TorrentFreak
The EU is planning to develop its own government-run DNS resolver that can also be used to block unlawful websites.
BlackBox (Security) Archiv
The EU Wants Its Own DNS Resolver that Can Block ‘Unlawful’ Traffic The EU is planning to develop its own government-run DNS resolver. The project dubbed DNS4EU is meant to offer a counterweight to the popular resolvers that are mostly based in the U.S. Aside…
I don't see how this will accomplish anything when DNS resolvers like DnsCrypt-Proxy exist. At best, it would be a farce.
Encrypt your DNS. If you don't already, use Android's "Private DNS" feature under your network settings. If you're on Linux, use DnsCrypt-Proxy. If you use Chrome or FireFox, set up your browser to use DNSoverHTTPS.
If you are going to be publishing sensitive information, don't count on pixelation to safely redact information. Use full black-box redaction to safely redact stuff.
https://positive.security/blog/video-depixelation
https://positive.security/blog/video-depixelation
positive.security
Recovering redacted information from pixelated videos | Positive Security
We explore the history of image unblurring and present a simple yet effective technique to get a high-resolution image from a pixelated video in order to recover redacted information (with no guessing involved).
Packet Pusher
https://lilithwittmann.medium.com/bundesservice-telekommunikation-enttarnt-dieser-geheimdienst-steckt-dahinter-cd2e2753d7ca
AppleInsider
Apple's AirTag uncovers a secret German intelligence agency
A researcher has sent one of Apple's AirTags to a mysterious "federal authority" in Germany to locate its true offices — and to help prove that it's really part of an intelligence agency.
Excellent script for finding public proxies that allow https traffic. What you decide to use them for is up to your imagination. Do also be careful and never trust a public proxy - ie use a VPN/Tor before connecting to said proxy.
https://github.com/stamparm/fetch-some-proxies
https://github.com/stamparm/fetch-some-proxies
GitHub
GitHub - stamparm/fetch-some-proxies: Simple Python script for fetching "some" (usable) proxies
Simple Python script for fetching "some" (usable) proxies - stamparm/fetch-some-proxies
A good reason to ditch Bitcoin and similar cryptocurrencies in favor of Monero.
With that being said, the SPLC's publishing of Monero addresses holds no weight because, unlike other cryptocurrencies, there is no way for them to surveil the inputs and outputs of the Monero blockchain.
TLDR: Basically, they can't see who sends Monero to a given wallet, where funds from that wallet go, or even if the given wallet has funds in it to begin with. That is the power of Monero.
https://mobile.twitter.com/Hatewatch/status/1480651996302557187
With that being said, the SPLC's publishing of Monero addresses holds no weight because, unlike other cryptocurrencies, there is no way for them to surveil the inputs and outputs of the Monero blockchain.
TLDR: Basically, they can't see who sends Monero to a given wallet, where funds from that wallet go, or even if the given wallet has funds in it to begin with. That is the power of Monero.
https://mobile.twitter.com/Hatewatch/status/1480651996302557187
Twitter
Hatewatch
.@splcenter has updated its list of cryptocurrency addresses used by extremists & hate groups to include 500+ publicly advertised addresses used to accept donations in #Bitcoin, #Litecoin, #Ethereum, and #Monero. View the list below. splcenter.org/cryptocurrency…
***Repost, but still highly relevant.***
BLUF: Use at least a 7 to 8 word passphrase for encryption.
For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security against normal bruteforcing.
Why a couple of words and not just some 16 or 20 random character password? Memorization. A passphrase is significantly easier to memorize compared to a password, and it holds up stronger thanks to key stretching.
For security against an adversary (like the NSA/FBI) who will probably have a quantum computer within the next decade, the passphrase needs to be longer.
BLUF: Use at least a 7 to 8 word passphrase for encryption.
For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security against normal bruteforcing.
Why a couple of words and not just some 16 or 20 random character password? Memorization. A passphrase is significantly easier to memorize compared to a password, and it holds up stronger thanks to key stretching.
For security against an adversary (like the NSA/FBI) who will probably have a quantum computer within the next decade, the passphrase needs to be longer.
Packet Pusher
***Repost, but still highly relevant.*** BLUF: Use at least a 7 to 8 word passphrase for encryption. For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security…
The Whonix and Kicksecure wikis both have lots of very good information on topics like this.
https://www.whonix.org/wiki/Passwords
https://www.whonix.org/wiki/Passwords
Kicksecure
Passwords
Generating Strong Passwords
Packet Pusher
***Repost, but still highly relevant.*** BLUF: Use at least a 7 to 8 word passphrase for encryption. For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security…
It really boils down to what your threat model is. It could include any number of things from simple unauthorized access, all the way to the feds confiscating your mobile device and hooking it up to one of Cellebrite's black boxes - in the end, its up to you.
Packet Pusher
***Repost, but still highly relevant.*** BLUF: Use at least a 7 to 8 word passphrase for encryption. For something like full disk encryption, you will want to use some kind of randomly generated passphrase consisting of at least 7 to 8 words for security…
Electronic Frontier Foundation
EFF Dice-Generated Passphrases
Create strong passphrases with EFF's new random number generators! This page includes information about passwords, different wordlists, and EFF's suggested method for passphrase generation. Use the
Packet Pusher
https://www.eff.org/dice
Use something like a password manager as well. Say you use something like KeePassXC or Bitwarden to manage passwords and have a phone and a laptop. You would only have to memorize 3 passphrases. One to unlock your password manager and the other two to unlock your devices. The rest can all be safely stored in your password manager.
❤1