Filippo Valsorda
@filippo.abyssdomain.expert
23K followers 500 following 1.8K posts
RC F'13, F2'17 Cryptogopher / Go cryptography maintainer Professional open source maintainer https://filippo.io / https://github.com/FiloSottile https://mkcert.dev / https://age-encryption.org https://sunlight.dev / https://filippo.io/newsletter
Posts Media Videos Starter Packs
Reposted by Filippo Valsorda
lizthegrey.com
if the moderators were not applying discretion here a bunch of y'all who are yelling at and harassing Jay would be permanently gone.

the issue with people being struck for ridiculing Kirk's death was not a trans specific thing, so let's not pretend it was.
filippo.abyssdomain.expert
Sorry I wasn’t sure who owns frontend now! Yeah I think Mike already has an idea of how to implement it and just wants a nod that a PR would be welcome.
filippo.abyssdomain.expert
Hey @pfrazee.com is this something you’d merge if they submitted a PR? CourtListener previews would be nice!
Reposted by Filippo Valsorda
samwho.dev
I so want this to succeed. You’re telling me I can create an app and the whole persistence layer is owned by the user, and creates this immutable web of data that can be riffed on by other apps even when the original app is gone?

I need to carve time out to build something in the atmosphere.
danabra.mov
i wrote down the process of resolving an at:// URI step by step. turns out, it's a great way to learn how the AT protocol works!
Where It's at:// — overreacted
From handles to hosting.
overreacted.io
filippo.abyssdomain.expert
Which ones that are not already listed?
filippo.abyssdomain.expert
Trusted Publishing, which is a fancy name for OIDC from the CI identity.
filippo.abyssdomain.expert
No, it is generally very hard to extract a passkey, and it's not a bearer token. (You should not use a passkey authenticator that makes it easy for an attacker to extract the secret.)
filippo.abyssdomain.expert
That's the point of the survey I am writing yeah ^^

It's actually phishing-resistant auth, no more long-lived credentials, and read-only CI. All very doable.
filippo.abyssdomain.expert
Here are the 2024/2025 supply chain compromises I found.

XZ Utils
Shai-Hulud
Nx S1ingularity
npm debug/chalk/color
polyfill[.]io
MavenGate
eslint-config-prettier
[@]solana/web3.js
rustfoundation[.]dev
React Native ARIA & gluestack-ui
lottie-player
rand-user-agent

Am I missing any?
filippo.abyssdomain.expert
Just upgraded my Cert Spotter subscription to monitor Certificate Transparency for all Geomys domains. Your business probably should, too!

It's good to know we'll get notified if any CA is compromised and/or mis-issues a certificate, but also funding @agwa.name's work benefits all the WebPKI.
Cert Spotter - Certificate Transparency Monitor - Detect Security and Availability Problems
Skip to content
sslmate.com
filippo.abyssdomain.expert
Thank you! I have a narrower definition of compromise, I am interested in attacks that gain access to previously honest dependencies, but there was at least one in that list I didn't have yet.
filippo.abyssdomain.expert
I am doing a survey of supply chain attacks, and it's annoying how 95% of the analysis is on payloads vs. compromise vectors.

Yes, you are a very smart reverser and that's a very clever payload. Yes, rolling out phishing-resistant auth is a slog. No, this is not how we make progress.

</rant>
filippo.abyssdomain.expert
I just had someone ask me who’s my employer because they were not getting their way.

Not their lucky day.
Reposted by Filippo Valsorda
mikespecter.com
Today, my research group @ Georgia Tech released a paper on vulnerabilities in Tile --- the second largest device finding network after Apple's AirTags.

You can read about it in Wired, reporting by @kimzetter.bsky.social!
www.wired.com/story/tile-t...
filippo.abyssdomain.expert
This might have been one of my most niche PSAs, but there is a high-level takeaway!

I am working on a Geomys standard of care, and I want it to include having no persistent long-lived credentials for the repos we maintain.

Dog fooding it before I bring it to other Geomys maintainers.
filippo.abyssdomain.expert
Anyway, these commands should replace ~/.gitcookies.

brew install git-credential-oauth
git config --add credential.helper ""
git config --add credential.helper "cache --timeout 21600"
git config --add credential.helper oauth

You can revoke the old ones at myaccount.google.com/connections?....
filippo.abyssdomain.expert
> register a websocket from daemon to server

As in, open a random available port, send it to the server, then the server tells the web page to use that port?
filippo.abyssdomain.expert
What's the modern answer to handing off information from a web page to a local daemon?

Binding to a fixed localhost port risks port conflicts. Custom protocol handlers look like a massive pain on Linux.

This is for an OAuth flow, so I guess a fixed localhost port lets me avoid a jump off a domain.
filippo.abyssdomain.expert
Eeeeh the more time goes on the less I agree.

Compressed or uncompressed point encoding, DSA or Schnorr, and randomized/deterministic/hedged are all orthogonal to the underlying curve.

The one thing that isn't is the cofactor, and P curves are delightfully of prime order.
filippo.abyssdomain.expert
Also decompressing effectively forces point validation, which is otherwise a security load bearing forgettable extra step.
filippo.abyssdomain.expert
What’s wrong with pseudonyms? Of all fields, cryptography has definitely seen contributions from pseudonymous people.
filippo.abyssdomain.expert
Hah. Now I’m imagining @crawshaw.io hacking on sketch on the tiny copilot seat of a Piper Archer.