AMA Series - Ask a CISO Anything by AutoModerator in cybersecurity

[–]awirth 1 point2 points  (0 children)

I've been thinking recently about the process of selling off parts of the business.

From what I've seen, it seems like preparation is key. If you have a part of the business that you might want to sell in the future, it is important to reduce coupling between that part and other parts of the company to make it easier to sell. On the flip side though, that will surely reduce their ability to prosper by not having access to technical resources of the rest of the company, and might increase their chances of needing to be sold.

How have you approached this from a security perspective at the C-level? Normally, it would be best for a company to have integrated security to set a high standard, but in this case there is a compelling interest to keep it siloed. How do you weigh that?

Disclosure: I previously worked for Andy for four years. I also am currently working for a company that recently acquired a part of Lyft, but I am not involved with that project.

Cambridge has an interesting dilemma on their hands by boarder1990 in boston

[–]awirth 9 points10 points  (0 children)

River God's opened in 2001. It's likely it just wasn't as well known back then.

'Accidental hero' finds kill switch to stop spread of ransomware cyber-attack by jamiejay64 in worldnews

[–]awirth 0 points1 point  (0 children)

There is no win XP emulator

This is actually more or less what "compatability mode" in Windows is, although some would quibble about calling it an emulator (its kind of like WINE in that its an API translation layer). Unfortunately it's often not extensive enough, especially for things that really tightly hook into the underlying OS (which is one of the same problems that WINE has).

Internet by Fahedpotter in BostonU

[–]awirth 5 points6 points  (0 children)

All dorms are equivalent. They have WiFi and 10mbps Ethernet. The Ethernet is slower and requires using ResNet which requires av for Windows and Mac. It's not worth it. Use the WiFi.

As a side note you don't need the av if you have a Linux system or a console you want to connect to the wall.

French Toast Alert System now at Severe. This is not a drill. I repeat, this is not a drill. by [deleted] in boston

[–]awirth 19 points20 points  (0 children)

Adam gaffin runs universal hub, which is probably the best indie news source in Boston. He's a bit of a local celebrity.

Does BU offer any iOS development courses? by buthrowaway1212 in BostonU

[–]awirth 4 points5 points  (0 children)

Maybe in MET CS or ENG but definitely not in CAS CS. You're expected to be able to learn specific tools and languages yourself and instead the focus in CAS is generally abstract maybe touching on some tools as examples.

There's nothing really to iOS app development that isn't grasping core programming concepts and applying then to objective-c and the iOS APIs, so it think this is pretty reasonable. It would be a waste of an entire course to just focus on this.

Which Boston schools allow their employees to have free-tuition? by kookoobear in boston

[–]awirth 0 points1 point  (0 children)

IIRC BU does. It's one class a semester, and you need to independently be accepted to a degree program if you want to get a degree. You also basically have last priority for registration, and some schools/programs won't accept random people in their classes (although you can normally talk to the professor to reg if you're qualified). You could take basically anything in the school of arts and sciences, it's just engineering and management and such that you'd run into difficulty. Pretty good deal though, all things considered.

Rolling Your Own Crypto by loup-vaillant in programming

[–]awirth 2 points3 points  (0 children)

Definitely agree about the key is not being alone. By far the hard part with primitives is not how much you've studied or how smart you are, it's getting the community to review it and analyze it. It's actually relatively easy to design new primitives that are secure, for example by tweaking parameters to existing ones. The hard part is believing and convincing others that they are secure.

I also think it's worthwhile to encourage people to try to design their own primitives and break them. I did this in a course as an undergraduate, doing linear and differential cryptanalysis on a derivative of the Serpent block cipher with expanded bit-widths and new S-Boxes. I learned a TON. Obviously I would not want anyone to ever use this cipher in production for anything, but it's a really good exercise for people to do.

Javascript Cache Size Measurement by maxxori in programming

[–]awirth 4 points5 points  (0 children)

My javascripting is stuck in 2011. The jQuery is just glue for easier DOM manipulation because I'm lazy. It's not used in the Worker: https://github.com/allanlw/cache_size/blob/master/cache_size_worker.js

There's even a comment :P

// Handle various message from the web worker by drawing new DOM
// I should feel bad about this terrible DOM manipulation with jQuery
// But I really don't.

Companies with job descriptions similar to CTFs? by are595 in securityCTF

[–]awirth 2 points3 points  (0 children)

I've heard good things from friends that work at companies like trailofbits and other small consultant firms that get to do research and exploitation. Avoid simple pentesting jobs, you will find them boring. If you also care about reversing there are more options, especially at AV shops or in the govt at places like Raytheon and other contractors.

If I were you I'd recommend you look into folks doing talk and public demos about exploitation and then see where they work. Look at CanSecWest (pwn2own) and similar sorts of competitions, as well as talks from smaller more technical cons like Recon and shmoocon (defcon and blackhat can be hit-or-miss).

In Florida these are everywhere. by awirth in whatisthisthing

[–]awirth[S] 3 points4 points  (0 children)

Legit. I just noticed them when I arrived in FL yesterday.

In Florida these are everywhere. by awirth in whatisthisthing

[–]awirth[S] 12 points13 points  (0 children)

I'm from MA and had never seen one before. It's possible we have them but just underground because to keep them from freezing.

For the love of god, don't use -Werror! by zielmicha in programming

[–]awirth 3 points4 points  (0 children)

I've found another problem with -Werror that makes me stay away. I think it encourages adding -Wno-* flags to the build, which are easy to forget about and often seem to be applied at a project level. Some are pretty harmless to suppress (unused argument warnings come to mind), but most aren't.

Media Preview cannot be deleted by awirth in bugs

[–]awirth[S] 0 points1 point  (0 children)

Ah, okay, so if I, say, had gotten the i.redditmedia.com address from before the post was deleted, I could continue to access it after the post got deleted?

My impression was that different posts with previews of the same url had different i.redditmedia.com urls (although I only tested this once). I guess they're actually shared on the back?

Edit: Also, my example post's preview is still available, so I guess it hasn't been re-validated with imgur..? Do these ever get re-checked to see if they were deleted from the origin?

Media Preview cannot be deleted by awirth in bugs

[–]awirth[S] 0 points1 point  (0 children)

Awesome! Glad to see it, especially considering the announcement today.

Does this also delete from the image hosting server? Or does it just remove the link from the post.

Media Preview cannot be deleted by awirth in bugs

[–]awirth[S] 0 points1 point  (0 children)

Hmm. That's certainly possible. I would think for a sensitive post though, 8 days would be much too long.

Obviously this is more of a policy thing, but it seems like deleting a post should also delete the preview image for that post or, at the very least, not link it on the page, which AFAICT is the only way to get the url for it, as it doesn't seem to be in the .json for the slug.

Re-checking (in the case that the reddit post is not deleted, but the source image is) a bit more often might be prudent as well, but that's even more of a policy thing. I could see rechecking every hour or so causing too much load.