fmstrat

joined 2 years ago
MODERATOR OF
[–] fmstrat@lemmy.nowsci.com 2 points 1 month ago (1 children)

Fry's. Some Microcenters. Al Lashers.

[–] fmstrat@lemmy.nowsci.com 7 points 1 month ago

The drawers are the best everywhere. RadioShack? Component drawers. Home Depot? Fastener drawers. On and on.

[–] fmstrat@lemmy.nowsci.com 3 points 1 month ago (1 children)

I wonder if it's so you can get a calendar of usage tines. Could be handy to ensure kids are brushing for the right amount of time?

[–] fmstrat@lemmy.nowsci.com 3 points 1 month ago (1 children)

Tom's still around, he's just a photographer now: https://www.instagram.com/myspacetom

[–] fmstrat@lemmy.nowsci.com 9 points 1 month ago (5 children)

I have the same box fan

[–] fmstrat@lemmy.nowsci.com 7 points 1 month ago

Sometimes it's to artificially narrow the lane to slow traffic. That's what they did here.

[–] fmstrat@lemmy.nowsci.com 2 points 1 month ago

But.. your original comment is just.. wrong?

This isn't a critical security flaw unless you have the worst partition scheme on your encrypted volumes imaginable.

The default LUKS partition scheme is vulnerable.

It's not even a process flaw at that point, just "possible".

There is a successful POC, it is a flaw.

you can compromise disks once encrypted because everything is happening in an in-memory boot process.

This is not just in-memory. This is modifying the unencrypted part of initramfs on disk. Powering off the machine does not remove the exploit.

[–] fmstrat@lemmy.nowsci.com 4 points 1 month ago* (last edited 1 month ago) (2 children)

You always "boot something that is unencrypted." You then "mount" the encrypted volumes and load the OS.

This is how people can put an SSH server (dropbear) in initramfs so they can unlock remotely.

The attack is to initramfs, not the encrypted layer.

The order'ish:

  • Boot
  • Initramfs loads, gives you the LUKS prompt
  • Initramfs decrypts/mounts OS
  • OS loads
[–] fmstrat@lemmy.nowsci.com 3 points 1 month ago (1 children)

The other poster mentioned it, but some things that may help:

  • There is a phone-friendly web editor built in for editing Markdown
  • You're able to see the history of changes, and a reason why they were made if one was provided
  • You can link directly to a line or header in the markdown
  • Others can make changes that you can then approve or reject
[–] fmstrat@lemmy.nowsci.com 1 points 1 month ago* (last edited 1 month ago) (4 children)

I'm confused.

Initramfs is unencrypted in /boot when using LUKS with RAID. It has to be, right?

The attacker uses a debug shell to modify the unencrypted boot, so the next time you boot and type your LUKS password, they can gain access.

This doesn't line up with your comment?

[–] fmstrat@lemmy.nowsci.com 8 points 1 month ago (1 children)

Everyone is waiting for this. There needs to be a party.

[–] fmstrat@lemmy.nowsci.com 6 points 1 month ago

A fun conversation starter is always "So do you have an internal monologue?"

view more: ‹ prev next ›