There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

lemmy.ml

Steamymoomilk , to linuxmemes in that ain't legal either

makes malware

Debian-THATS NOT FOSS IN ARE CODE, o yeah its also malware

possiblylinux127 ,

To be fair proprietary software really shouldn’t be trusted

Kolanaki , to newcommunities in Random Communities that your Lemmy instance doesnt display.
@Kolanaki@yiffit.net avatar

Having bounced around using a lot of different apps while on the same instance that, afaik, hasn’t defedersted from anything: I think it has more to do with how the apps work. I can refresh Jerboa, Raccoon and Connect all at the same time on 3 different devices, sorting the same way and in the same space (all), and get entirely different results from each one or go into the same post and see less comments in one app than I do in another.

SnotFlickerman , to programmerhumor in that ain't legal either
@SnotFlickerman@lemmy.blahaj.zone avatar

Oh please, dear? For your information, the Supreme Court has roundly rejected prior restraint.

Plasma , to programmerhumor in that ain't legal either
@Plasma@lemmy.ml avatar

Backdoors are bad for security 😆😆

shootwhatsmyname ,
@shootwhatsmyname@lemm.ee avatar

oh dang removes backdoor from my house

unreachable ,
@unreachable@lemmy.world avatar

OnlyFansrontDoor

Potatos_are_not_friends ,

Hell yeah. Make the windows difficult to enter, and now you have a singular point of entry.

Then put a gun turret there.

frezik ,

Your house isn’t truly secure until you have a lava moat, and other ideas I came up with when I was eight.

eatham ,
@eatham@aussie.zone avatar

Just remove the windows

waspentalive ,

Don’t remove the back door from your house, bar it with a sturdy 2x4 that holds it closed. Just be sure to use a 2x4 that is not made weak by the application of a specific chemical that only the secret bad guy knows about.

unionagainstdhmo ,
@unionagainstdhmo@aussie.zone avatar

Didn’t some pro-gun idiots suggest removing back doors from American schools

Liz ,

I’m pro gun and that’s a laughably stupid idea for about a million reasons.

RedWeasel , to programmerhumor in that ain't legal either

Seriously. If you are going to do it, write in assembly or something else no one understands.

Ineocla ,

Tbh jia tan really wasn’t lucky some mf at Microsoft noticed a 500ms delay in ssh. The backdoor was so incredibely clever and Well hidden and ingenious i almost feel bad for him lmao

conditional_soup ,

A really good point I heard is: this was likely a state actor attack, so how many others just like this are out there, undiscovered?

B0rax ,

Unpopular opinion: what if it was not a state actor and just some bored person somewhere that thought it would be cool to own a bot net?

What if this is just one of many backdoors and it’s just the only one we found?

thisisbutaname ,

I heard that person actively contributed for something like 2 years, providing actually useful contributions, to gain the level of trust needed to plant that backdoor. Feels a bit too much to chalk it up to boredom.

As for the second part, that’s an interesting question. Are there lots of backdoors and we just happened to notice this one, or are backdoors very rare exactly because we’d have found them out soon like in this case?

Appoxo , (edited )
@Appoxo@lemmy.dbzer0.com avatar

You’d be surprised what I manage with motivation and boredom.
You’d be surprised what a highly skilled scalled person can manage to achieve.

Boredom, Skills and Motivation are dangerous things to have if improperly handled.

neeeeDanke ,

highly scalled person

You might be on to something, it might have been the lizzard people!

trolololol , (edited )

Another speculation from the suse team was a private company with intent to sell the exploit to state across actors

I think there’s lots of known backdoors that are not publicly disclosed and privately sold.

But given the history of cves in inclined to believe most come from well intentioned developers. When you read the blogs from the Google security team for example, it’s interesting to see how you need to chain a couple exploits at least, to get a proper attack going. Not in this case, it would make it very straightforward to accomplish very intrusive actions.

PapstJL4U ,
@PapstJL4U@lemmy.world avatar

The design is Moriarty lvls of complex. State actor might be too specific, but everything but a group of people would be highly unlikely.

agent_flounder ,
@agent_flounder@lemmy.world avatar

Nobody is both that bored and that motivated. Unless paid.

B0rax ,

You forget that a lot of brilliant open source projects are one man shows from geniuses somewhere around the world. They are usually not paid.

In the other hand, if you get your hands on a powerful botnet, you can rent out its services (like ddos for example) for quite a bit of money.

GissaMittJobb ,

Realistically I think it’s probably easier to acquire a botnet of less secure systems. This was a targeted attack.

B0rax ,

Easier, yes. But some people will do stuff because it is more challenging.

InputZero ,

Yeah, well that’s just, like, your opinion, man. (You mentioned the word opinion in a post referencing The Big Lebowski. I had to. Thank you for coming to my shit post.)

SzethFriendOfNimi ,

It’s scary to think about… a lot of people are now thinking about how we can best isolate our build test process so it works as a test suite but doesn’t have any way to interact with the output or environment.

It’s just blows my mind to think of the levels of obfuscation this process used and how easy it would be to miss it.

Vilian ,

the guy was even in microsoft he was at his house testing debian

RegalPotoo ,
@RegalPotoo@lemmy.world avatar

Jia Tan probably wasn’t one person - most likely the identity was operated by a team of people at an intelligence agency, probably Russian or Chinese

TheGalacticVoid ,

I’m surprised that nobody suggested that he was a kidnapped dev. This seems like a different implementation of the pig butchering scams that target ordinary people.

davel ,
@davel@lemmy.ml avatar
TheGalacticVoid ,

I wasn’t joking.

A good chunk of scam calls and texts come from people who themselves are victims of kidnapping. Many of those victims (primarily in Asia) got into the position they were in because they were looking for work, went to a different country to start a promised job, and then got trapped and forced to work for scam centers that do social engineering attacks.

These scam centers are sophisticated to the point where they can develop very legitimate-looking crypto trading platforms for targets in the US and other wealthy countries. They then assign one of the kidnapped people to a target. These kidnapped people then social engineer their way for months to get what their captors want - usually money in the aforementioned trading platform. Then, they cut all contact once they have control of the funds.

How does this relate to XZ? Well, if they can kidnap ordinary people looking for jobs, there’s not much stopping them from including devs in their pool of targets. Afterward, it’s just a rinse and repeat of what they’d done before.

If you want to look more into pig butchering, John Oliver has a great episode on it.

davel ,
@davel@lemmy.ml avatar

You don’t kidnap extremely highly skilled internet malware developers and force them to code for you, you just pay them appropriately.

TheGalacticVoid ,

The malware, sure, but you’re ignoring how they were able to push the malware in the first place.

Iapar ,

Jupp. If you trap someone highly skilled and give that person a weapon, the chances are good that this person will use that against you.

Like how does a less skilled person know that this code will not send location to the police with a message?

TheGalacticVoid ,

A bit late, but the police are often paid by captors, so calling the police just leads to punishment.

OurToothbrush , (edited )

Any sources there or do you just lie for fun?

Edit: an article on this kind of behavior:redsails.org/false-witnesses/

kieron115 ,

All they did was offer an opinion, chill.

winterayars ,

There’s a high likelihood it was Russian or Chinese work tbh. That’s a pretty reasonable take.

ElCanut ,

Aggressively writes a backdoor in COBOL

Wooki ,

Whoa hol up.

Write the build script in assembly?

Thats not okay man.

RedWeasel ,

No, it this case the backdoor. Hide it in plain sight.

Bene7rddso ,

Assembly wouldn’t run on multiple architectures

RedWeasel ,

Neither does the blob it downloaded. Would you think twice about AVX10 support if it was commented as AVX10 support in a compression library? Some might, but would they be the ones reviewing the code? A lot of programs that can take advantage of “handwritten” optimizations, like video decoders/encoders and compression, have assembly pathways so it will take advantage of the hardware when it is available but run when it isn’t. If the reviewers are not familiar with assembly enough something could be snuck in.

systemD is using dlopens for libraries now and I am not convinced malware couldn’t modify the core executable memory and stay resident even after the dl is unloaded. Difficult, yes, but not impossible.

stepanzak , to linuxmemes in that ain't legal either

Backdoors are bad for security

PlasticExistence ,

They’re great for avoiding jealous husbands who come home early unexpectedly though

Worx ,

NSFWI was with my mistress one day when she heard her husband walking up the drive. She said, “quick, use the back door!”. I wasn’t sure we had time, but it’s not every day you’re offered anal

TimeSquirrel ,
@TimeSquirrel@kbin.social avatar

Dude I worked for in 2008 (small IT support company) insisted we store all the domain logins and passwords for all our customer's networks on our internal Sharepoint system and forward a port to RDP on all their domain controllers. It was a fucked up place to work with every procedure pulled out of someone's ass on the spot.

/randomrelatedstory

pastermil , to programmerhumor in The dangers of procrastination

technical debt is your friend.

Karyoplasma , to programmerhumor in The dangers of procrastination

Rookie mistake. The best way to procrastinate is to set everything up so you could work on it and then not do it. What’s the fun in procrastination when not actively defying work?

pancakes ,
@pancakes@sh.itjust.works avatar

I like having the work I’m procrastinating up on my second monitor so that if I happen to feel a 30 second burst of productivity it doesn’t go to waste.

interrobang ,

And if anyone wants to know, you’re right in the middle of it just when they happen to ask

UnRelatedBurner ,

I unplugged my lan, thrown my mobile to the other side of the room, opened everything that I needed. And still ended up just walking up & down thinking about random stuff.

calabast , to programmerhumor in The dangers of procrastination

Time to find out if someone else has access, and can make a copy and send it to you, and then you can play dumb about where/how you got your copy.

Patches ,

That’s when middle management gets involved.

Problem: There are 18 sources of truth for this information

Solution: There are now 19 sources of truth for this information

InputZero ,

That’s when district management gets involved.

Problem: There are 19 sources of truth for this information

Solution: There are now 20 sources of truth for this information

Patches ,

Corporate gets involved

There are now 18 (10 Old and 8 new but conflicting) sources of truth

We reduced departmental inefficiency by 50% (20 to 10). Round of applause

dumbass , to programmerhumor in When a real user uses the app
@dumbass@lemy.lol avatar

Game makers should hire me to test their maps, if there’s a spot where I can get 100% stuck no matter what, you bet your shiny metal ass I’ll find it.

roux ,
@roux@hexbear.net avatar

Me and dumb compact design blueprints on Dyson Sphere Program. I’ve had to tear parts of builds down an embarrassing amount of times to get unstuck because of the way hitboxes on refactionators and a few other buildings work in close proximity.

Etterra , to memes in Raid

Slightly less than nothing to see here.

keepcarrot , to programmerhumor in Interview vs Job

I am aghast at how difficult interviews are compared to literally every aspect of most jobs I’ve had.

huf , to programmerhumor in Interview vs Job
ChaoticNeutralCzech , (edited ) to memes in Raid

TL;DR My country’s customs officers seem to have misappropriated 7 buttplugs, 8 Venus ball sets, 3 non-USB penis devices and 7 sets of BDSM straps.

We had a large shipment of illegal sex toys seized in the Czech Republic, and the customs office held an auction with publicly disclosed contents of the package. There were several suspicious amounts. I have a copy of the list:

Not auctioned individually, only as a complete set. 1 CZK ≈ 0.04 USD. Yes, we have words for sex toy but they specifically chose more formal wording.

Item Description of the auctioned item Qty Unit price CZK total
1 Erotic aid - anal jewel, 3 pcs/set 594 300 ($13) 178 200,00 ($7722)
2 Erotic aid case 300 210 ($9) 63 000,00 ($2700)
3 Erotic aid (penis) 40 600 ($25) 24 000,00 ($1000)
4 Electric pump 40 90 ($4) 3 600,00 ($160)
5 Sex aid - straps 193 300 ($13) 57 900,00 ($2509)
6 Erotic aid - anal jewel with tail 99 210 ($9) 20 790,00 ($891)
7 Erotic aid for penis without USB 77 300 ($13) 23 100,00 ($1001)
8 Venus balls 112 300 ($13) 33 600,00 ($1456)
9 Enema 210 120 ($5) 25 200,00 ($1050)
10 Enema with black pouch 30 150 ($7) 4 500,00 ($210)
Total price (CZK) 433 890,00 ($18,315)
Auction start at (CZK) 144 630,00 ($6105)

The goods have been legalized for resale in the EU even though some lack CE certification.

Auction notice including photos (Czech, PDF, 9,74 MiB) / Deep-L’s English translation of the document (view in browser) - gets interesting on page 5, or just click the hyperlinked items for extracted images (only 6 seems to have been published)

Above is translation of a Reddit comment I had made here but since overwritten with a power-delete tool.

Zagorath ,
@Zagorath@aussie.zone avatar

You can use the “save” function to come later

Yeah you can

ChaoticNeutralCzech ,

Or I can reply to your comment and have you receive a notification. Yeah, it’s done, I even extracted the images from the document (native res, no scaling).

Zagorath ,
@Zagorath@aussie.zone avatar

Haha thanks!

But unfortunately, tone doesn’t carry well through text, and may be especially poorly conveyed to someone who isn’t a native speaker (which I’m assuming, from your username). My previous comment was meant to be read with an insinuating tone, playing on your use of the term “come”.

HottieAutie ,

Let’s return together

Appoxo ,
@Appoxo@lemmy.dbzer0.com avatar

60min are over.
We need that information!

For research.

ChaoticNeutralCzech ,

Sorry, there have been tech problems. It’s done, I’ll just extract and upload the rest of the images from the PDF.

Appoxo ,
@Appoxo@lemmy.dbzer0.com avatar

(Disclaimer: My comment earlier was not to be taken seriously)

Thank you for the update :)

Huschke ,

Nothing suspicious here lol

sunbytes ,

“erotic aid for penis without usb”

This implies the existence of…

Viking_Hippie ,

Well how do YOU charge penises? 🤷

MenigPyle ,

With my mouth ajar?

Viking_Hippie ,

Sure, that works.

WhiskyTangoFoxtrot ,

With a proprietary connector, unfortunately.

Viking_Hippie ,

Your MOM’S a proprietary connector!

She still works for Bumble, right? 😉

ChaoticNeutralCzech ,

I am handicapped, my penis does not have a USB port. I am thankful that there are erotic aids made for people like me.

Zagorath , (edited )
@Zagorath@aussie.zone avatar

I am kinda curious what about these were illegal. Like, are they particularly shoddy home-made stuff? Just some boring lack of import permits? Does Czechia have strict laws around sex toys?

ChaoticNeutralCzech , (edited )

Nah, likely just incorrectly declared and the importer failed to respond to a tax evasion fine. The Czech Republic is pretty lax when it comes to regulating such things (heck, even this was allowed). They could be legalized without a CE certificate, just some paper work.

HottieAutie ,

Based on a few docu-series I’ve seen on the Internet that include casting interviews, adult parties, and erotic behaviors in public, I’m pretty certain that the Czech Republic is lax on sexual matters.

BreadOven , to programmerhumor in When a real user uses the app

I once deleted system32…That’s when I began calling the shots.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines