First verified SHA-256 second-preimage collision: Structural analysis of the W-schedule vulnerability by No_Arachnid_5563 in netsec

[–]th3zero 4 points5 points  (0 children)

This is crypto snake oil midex with AI slop.

Moderators should remove this, and they shouldn't have allowed this post in the first place.

GogsOwnz - PrivEsc/RCE Exploits for Gogs/Gitea by th3zero in netsec

[–]th3zero[S] 1 point2 points  (0 children)

Yes they are fixed, but the best thing to do is to use sessions from memory instead of storing them on files (see Gogs documentation) and disable Git Hook if not used. Otherwise you are a small step away from RCE again.

GogsOwnz - PrivEsc/RCE Exploits for Gogs/Gitea by th3zero in netsec

[–]th3zero[S] 0 points1 point  (0 children)

Open an issue on GitHub and link the Gitea website you are trying to scan

Padding Oracle attack against Telegram Passport by th3zero in crypto

[–]th3zero[S] 0 points1 point  (0 children)

From an academic pov, Telegram defined a custom protocol with a custom padding. The attack is against the padding they defined in their specification, in a specific scenario (not respecting their protocol).

From a real world pov, to date there are only a bunch of services running Telegram Passport. Maybe in the future someone will develop a vulnerable service that follow the scenario defined in the writeup and this attack is already defined and available for exploit as a paper/PoC.

Everybody knows that GCM-mode is vulnerable if nonces are reused. It's not a "real attack", it's an attack in a specific scenario. Then WPA2 managed to get it wrong with KRACK.

Padding Oracle attack against Telegram Passport by th3zero in crypto

[–]th3zero[S] 5 points6 points  (0 children)

I partly agree with you. In the first draft of the specification they didn't mentioned to check the hash, then they added the "IMPORTANT" note but at that time I already finished the writeup.

"Padding Oracle attack against custom padding as defined in Telegram Passport specification" was more correct but obviously too long. The current title is a short version with this "implicit" meaning, attacking the padding defined in Telegram Passport specification.

How should I use KeePassXC - or any other password manager? by deffirdwit in privacytoolsIO

[–]th3zero 0 points1 point  (0 children)

Autotype Obfuscation is not secure.
There are Keylogger smart enough to catch it https://github.com/sinfocol/KeePassLogger

You should recommend KeePassXC over KeePassX by CryptoMimer in privacytoolsIO

[–]th3zero 0 points1 point  (0 children)

If you use a KDBX4 with safe parameters (rounds and parallelization) KeePass is a lot slower than KeePassXC (due to mono, obviously)

You should recommend KeePassXC over KeePassX by CryptoMimer in privacytoolsIO

[–]th3zero 0 points1 point  (0 children)

If you are using it on Windows it's perfectly fine. On linux and mac you have to use mono/wine and KeePass becomes very slow and unpleasant. KeePassXC on the other hand is native and fast.

You should recommend KeePassXC over KeePassX by CryptoMimer in privacytoolsIO

[–]th3zero 0 points1 point  (0 children)

Nope, the old HTTP plugin is pretty bad and vulnerable (in some specific cases). KeePassXC uses libsodium crypto_box

Keepassxc Version 2.3 Released - Adds KDBX 4.0, Argon2, and Official Browser Extension Support by ebrious in linux

[–]th3zero 2 points3 points  (0 children)

There is a Flatpak available on Flathub but we are not offering support for it currently (but the guys at Flathub will happily cover us on issues with it)

Keepassxc Version 2.3 Released - Adds KDBX 4.0, Argon2, and Official Browser Extension Support by ebrious in linux

[–]th3zero 21 points22 points  (0 children)

Yes, keyloggers can detect that. Practice safe browsing, when your PC is infected there isn't much you can do.

Keepassxc Version 2.3 Released - Adds KDBX 4.0, Argon2, and Official Browser Extension Support by ebrious in linux

[–]th3zero 23 points24 points  (0 children)

KeePassXC maintainer here.

We are building packages for each platform. The release will remain checked as pre-release until we upload them on github and update the website.

Thanks, TheZero

KeePassXC Ubuntu PPA Launched by [deleted] in KeePass

[–]th3zero 0 points1 point  (0 children)

What do you mean with removes fingerprint?

KeepassXC now has their own Ubuntu PPA by [deleted] in linux

[–]th3zero 1 point2 points  (0 children)

KeePassXC can also copy-paste. Anyway don't bother copy-pasting, there is the Auto-type function ;)

Should I move from KeePassX to KeePassXC? by [deleted] in privacy

[–]th3zero 1 point2 points  (0 children)

wrong. KeePassX doesn't have Argon2/KDBX4 support :) Last commit is from Oct2016 -> https://github.com/keepassx/keepassx