Had a quick look at this today and it’s a doozy! Patrick Wardle has created a small python script that dumps the data from the macOS, notifications database. This is a whole lot of information that you may not want anyone to see, let alone audit. Be interesting if and how the Mac os X dev team may manage this issue.
More info hear…
Saw this today….”Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments”.
This will need more investigation – if it is what it purports to be … a lot of trouble!
I have spent the afternoon researching the work of Sarah Jamie Lewis. A very interesting person and among other things she used to work for GCHQ! The irony is that she is now an independent security researcher who is pro anonymity and privacy advocate.
She is also the author of an interesting product called onionscan, which is a tool that can be used for mapping the dark web.
This particular talk I found rather interesting
Sarah Jamie Lewis: OnionScan: Practical Deanonymization of Hidden Services
Among other things it gives rise to the fact that if you want security you should find your self a great Sys admin! Put simply a lot of sites on the “Dark Web” are not well configured and if you use such services you could be at risk.
She covers such topics as why you should be careful if you use apache as a dark web server. Why not to use a google analytics id (don’t use the same id for all your sites) and be aware that if your using it in the real world as well as the dark web this is a rather incriminating vector!
Other things discussed are exif metadata (from photographs for instance) that give away your geolocation, phone type etc!!
Most importantly though she mentions a lot of the good things that the dark web can be used for including, that a lot of the dark web is blog sites, forums that help drug users with regards catching addiction before it happens and harm reduction. Also that the dark web is used to monitor human rights abuses, and censorship data gathering.
She sums up buy proposing that peer to peer may be the future of creating secure communications due to the fact that the client server model is rather difficult to secure and anonymise. Some very interesting, important and thought provoking work. Her twitter feed is also an interesting read and rather humorous but probably NSFW!
Source for onionscan
Ganesha is widely revered as the remover of obstacles
So from what I can work out your humble Sys Admin is a bit like a dentist! You know it’s good for you but no one likes pain, let alone paying for that pain.
But lets just hold it there for a minute can we? Lets just stop and think about this.
John Podesta recently had his email account hacked. Of that we have evidence, have a look at this.
There is some discussion that his account password was, or may have been “password”, or something simple and easy to hack. What ever his password was, it probably was not that difficult to hack see this information.
But guess what? If a System administrator had been looking after that email server properly this shouldn’t have happened.
So we now have a major question over the outcome of the political leadership of arguably the most powerful country on earth. Just so you know sysadmin appreciation day this year falls on Friday, 28 July.
Think about that! Especially if you have a good Sys admin who is looking after you and your network, and your email, and stays up late re booting the server doing stuff you never have to worry about, often stuff you don’t even care about until – whoops! Where did the election go?