What the Web used to look like: NASA/JPL Comet Shoemaker Levy 9

Scan 1

A Short Translation from Bullshit to English of Selected Portions of the Google Chrome Blink Developer FAQ /ht @shaver

1 Why is Chrome spawning a new browser engine?

The WebKit maintainers wouldn’t let us attack Apple directly, by changing WebKit in ways that would make it perform badly on OS X and iOS.

Because they share a rendering engine, developer effort to ensure Chrome compatibility currently benefits Apple platforms for free. To prevent this, we must make Chrome and WebKit behave differently.

1.1 What sorts of things should I expect from Chrome?

Nothing yet. This is a political move, not a technical one.

However, while the Chrome user interface will not change in any significant way, we will be silently overwriting all existing installations of Chrome with our new rendering engine without your knowledge or consent.

…continues gloriously at Chrome Blink FAQ.

Python speed optimization in the real world

What worked, ultimately, was finding operations that have instruction costs O(n**2) in the number of commits and squashing them. At this point a shout-out goes to Julien “FrnchFrgg” Rivaud, a very capable hacker trying to use reposurgeon for some work on the Blender repository. He got interested in the speed problem (the Blender repo is also quite large) and was substantially helpful with both patches and advice. Working together, we memoized some expensive operations and eliminated others, often by incrementally computing reverse-lookup pointers when linking objects together in order to avoid having to traverse the entire repository later on.

Even just finding all the O(n**2) operations isn’t necessarily easy in a language as terse and high-level as Python; they can hide in very innocuous-looking code and method calls. The biggest bad boy in this case turned out to be child-node computation. Fast import streams express “is a child of” directly; for obvious reasons, a repository analysis often has to look at all the children of a given parent. This operation blows up quite badly on very large repositories even if you memoize it; the only way to make it fast is to precompute all the reverse lookups and update them when you update the forward ones.

Another time sink (the last one to get solved) was identifing all tags and resets attached to a particular commit. The brute-force method (look through all tags for any with a from member matching the commit’s mark) is expensive mainly because to look through all tags you have to look through all the events in the stream – and that’s expensive when there are 56K of them. Again, the solution was to give each commit a list of back-pointers to the tags that reference it and make sure all the mutation operations update it properly.

It all came good in the end. In the last benchmarking run before I shipped 2.29 it processed 56424 commits in 303 seconds. That’s 186 commits per second, 11160 per minute. That’s good enough that I plan to lay off serious speed-tuning efforts; the gain probably wouldn’t be worth the increased code complexity.

via Python speed optimization in the real world.

NetBSD: RNG Bug May Result in Weak Cryptographic Keys #sameold #sameold

Due to a misplaced parenthesis, if insufficient GOOD bits were available to satisfy a request, the keying/rekeying code requested either 32 or 64 ANY bits, rather than the balance of bits required to key the stream generator.

The result of this bug is that even after the minimum entropy threshold was reached, the generators for in-kernel and userspace consumers could in the worst case be keyed, or re-keyed, with as few as 32 bits (on 32 bit platforms) or 64 bits (on 64 bit platforms) of data, plus a 32-bit cycle counter value, plus the name of the generator (an LWP ID for userspace, a fixed string for kernel consumers), plus stack noise for the remainder.

Systems which never experience an “insufficient entropy” condition (for example, systems with hardware random number generators supported by NetBSD) are not impacted by this bug.

All cryptographic keys generated on NetBSD 6 or NetBSD-current (prior to 2013-01-27) systems should be regenerated, unless it is certain that the system in question cannot have suffered a low-entropy condition when the keys were generated.

via .

A New Role for Muffett: Facebook

Back in June 2011 I joined Surevine – a company of great people whom I cannot commend highly enough* as a excellent working environment, as promoters of open source, and of people who care about software and security and about doing both right. I am pleased to have helped cause some beneficial change at Surevine – including, but not limited to, security awareness, operations architecture and obtaining ISO27001 certification.

All this said: I’ve been offered a really exciting prospect which I’ve decided to pursue.

Thus: I shall shortly be joining Facebook as a software engineer and will be working out of the London/Covent Garden office.

What happens after that will be interesting in a whole variety of ways. 🙂

* If you’re a UK-based security geek or Java developer then go look Surevine up. Send them a resume. Say that “Alec’s blog sent you”; I get no money for this, it’s just a really great company that deserves good people.

One for @weldpond @dotmudge

Photo by alecmuffett • Instagram.

…and then there’s SATAN

Walshman writes:

…and he’s quite right:


  • “It’s like randomly mailing automatic rifles to 5,000 addresses. I hope some crazy teen doesn’t get a hold of one.” (Oakland tribune.)
  • “SATAN is like a gun, and this is like handing a gun to a 12-year-old.” (LA times.)
  • “It’s like distributing high-powered rocket launchers throughout the world, free of charge, available at your local library or school, and inviting people to try them out by shooting at somebody.” (San jose mercury.)
  • “It discovers vulnerabilities for which we have no solutions.” (The New York Times.)
  • …people could die.” (vikr@aol.com (VikR))


  • “…there is no obscuring its presence. It announces itself like a rock concert to the scanned machine’s log file.” (Nick Christenson, npc@minotaur.jpl.nasa.gov)

Welcome to PinItTo.me / PinItTo.me is an infinite virtual corkboard. Collaborate with friends, family, or colleagues…

Welcome to PinItTo.me.

Welcome to PinItTo.me

PinItTo.me is an infinite virtual corkboard. Collaborate with friends, family, or colleagues in real time in any way you want. Make plans, share ideas, play games…

PinItTo.me is currently a free service. If you like our application please donate to help keep the service online and ad-free.

PinItTo.me is an Open Source project. The application source code is freely available on GitHub.


#LittlePrinter Authentication Bypass – blog.encrypted.cc # THIS IS WHY YOU TEST NEGATIVE CASES IN YOUR CODE

The website remote.bergcloud.com is used to communicate with the Little Printer; set up print subscriptions, send messages to the printer, give friends permission to send messages, and so on. I discovered an authentication/authorization bypass issue on this site which allows an owner of a Little Printer, as well as any user who has been authorized to print messages to at least one Little Printer, to print messages to any of the Little Printers out there – without prior authorization from the owners.

The HTTP POST which is sent when you message the Little Printer contains the following payload:


The field message[bot_id] contains the ID of the Little Printer, which is a sequential numeric identifier. Changing the ID allows a user to send a message to another Little Printer without being authorized by the owner. The user is also able to print messages without authenticity_token present in the payload.

After printing a message, the site will normally display a box saying Message sent. When printing to another Little Printer, without really having permission to do so, the site displays an error and it seems like printing was not successful. However, that’s not the case.

via Little Printer Auth Bypass – blog.encrypted.cc.

See also

Pwn Pad | Pwnie Express # #WANT WANT SO MUCH WANT

The Pwn Pad – a commercial grade penetration testing tablet which provides professionals an unprecedented ease of use in evaluating wired and wireless networks. The sleek form factor of the Pwn Pad makes it an ideal product choice when on the road or conducting a company or agency walk-through. This highspeed, lightweight device, featuring extended battery life and 7” of screen real estate offers pentesters an alternative never known before.

Pwn Pad | Pwnie Express.

HT Rohan Pinto