saint

joined 2 years ago
MODERATOR OF
3
RAW on pornography (www.rawillumination.net)
4
A quick post on Chen’s algorithm (blog.cryptographyengineering.com)
 

But there is a saying in our field that attacks only get better.

 

Is this the real life? Is this just fantasy?

 

ECDSA NIST-P521 keys used with any vulnerable product / component should be considered compromised and consequently revoked by removing them from authorized_keys, GitHub, ...

 

Check out the book page as well (and you can download the book for free) - https://goatgreatesteconomistofalltime.ai/en

 

Yea or Nay?

 

Although the vulnerability was addressed in August 2018, the maintainers of Lighthttpd patched it silently in version 1.4.51 without assigning a tracking ID (CVE).

This led the developers of AMI MegaRAC BMC to miss the fix and fail to integrate it into the product. The vulnerability thus trickled down the supply chain to system vendors and their customers.

BMCs are microcontrollers embedded on server-grade motherboards, including systems used in data centers and cloud environments, that enable remote management, rebooting, monitoring, and firmware updating on the device.

In short - it is a BIOS/virtual keyboard and mouse accessible via internet and if you can access it - you are controlling the computer. Of course, to have such devices exposed without adequate protection is an interesting idea by itself, but there are quite some dedicated server providers that do it for various reasons (less work).

view more: ‹ prev next ›