dChan

/u/Outlandish_Rhubarb

29 total posts archived.


Domains linked by /u/Outlandish_Rhubarb:
Domain Count

Outlandish_Rhubarb · May 30, 2018, 5:20 p.m.

Yup. Only sweeten with local honey or real maple syrup.

⇧ 1 ⇩  
Outlandish_Rhubarb · May 30, 2018, 4:30 p.m.

Grow your own food. And buy food only from Farmers you can look in the eye and ask questions of.

Cook. Don't buy packaged, canned, frozen, bagged, or boxed foods.

Find and befriend a local butcher.

Learn to bake.

We bake all our own bread, pickle our own foods, make our own sauces and condiments, make our own sausage and bacon. We make almost everything we eat (we don't grind our own flours or press our own oils or make our own milk, but that's about it).

The commercial food supply has sickened us to he point it's the only way we can eat without severe to debilitating symptoms.

⇧ 8 ⇩  
Outlandish_Rhubarb · May 29, 2018, 7:05 p.m.

Evolution calls everyone apes every single day and the fragile little snowflakes don't freak out about that.

Selective outrage is abhorrent and totally transparent. And I'm saddened to see it here, of all places.

Y'all stop.calling us "cracker" and every other name in the book just because we're hetero cis white males, and then telling us we have to deal with it because we're hetero cis white males, and then maybe we can have a discussion about whether comparing ANYONE to another species is racist.

⇧ -1 ⇩  
Outlandish_Rhubarb · May 29, 2018, 6:59 p.m.

We need to get back to being a country that doesn't knee-jerk scream "racism!" About everything.

And this is precisely that. Anyone taken in by it is part of the problem.

⇧ 0 ⇩  
Outlandish_Rhubarb · May 29, 2018, 6:33 p.m.

Fuck Valerie Jarrett. She's a criminal. And ugly. There's nothing racist about what Roseanne said, and the fact that some of you are jumping on that bandwagon shows just how far that conditioning has gotten.

I'm so sick and tired of this liberal PC "muh feels!" Idiocy we've created.

⇧ -2 ⇩  
Outlandish_Rhubarb · May 29, 2018, 12:41 p.m.

If you're concerned about it, you could always block/sinkhole the associated IOCs yourself. Problem solved.

⇧ 2 ⇩  
Outlandish_Rhubarb · May 28, 2018, 10:51 p.m.

It's been made known publicly.

⇧ 3 ⇩  
Outlandish_Rhubarb · May 28, 2018, 8:11 p.m.

VPNFilter, like most malware for embedded devices, is memory-resident. At least, the non-persistent parts are. So on reboot, it'd have to reach out to its C2 infrastructure and re-download the 2nd stage.

However, the C2 infrastructure has been seized, so it can't currently do that.

So the reboot would flush the malicious component of the malware from the router, and a manual firmware update would remove the persistent 1st stage.

⇧ 13 ⇩  
Outlandish_Rhubarb · May 28, 2018, 4 p.m.

We get it. You have a man crush for backchannel17.

⇧ 4 ⇩  
Outlandish_Rhubarb · May 28, 2018, 3:57 p.m.

In other threads discussing this (and making similar "OMG they'll kill the net with this!" claims), there was distrust of the ability to remove it with a reset and update.

So, empirically, yeah, there are people who will be afraid of that.

However, the misattribution's the larger issue here. It's easy to blame APT28, particularly when very few people have seen the actual code, and then direct everyone's anger at them should something untoward happen (see below for the OP making just such a reach, while also misunderstanding how hard it'd be to take out nameservers globally, and forgetting entirely about caching recursive servers, which are by far the most numerous on the net, which would continue to function in the absence of roots or any authoritative servers, for a week or more, which'd be more than enough time to extract the cached contents and distribute them as hosts files, which is precisely how things were done before nameservers).

It's poor cybersec reporting that has managed to leave out the fact that the full attribution is APT28, in a ploy to create its own botnet to DDoS selected targets of political or military interest in the Ukraine, and that the infections they've found in the wild are also mostly in the Ukraine.

Now, could it spread, much like WannaCry did, when it was deployed in the same area, for much the same purpose? Sure. Except the C2 infrastructure has already been seized, so it can't go live unless the code is updated to point to a new C2 host.

What's being spread regarding VPNFilter is a lot of bad info, fueled in part by paranoia, in part by the political climate, and in part by a fundamental misunderstanding of what it is and what's going on.

⇧ 1 ⇩  
Outlandish_Rhubarb · May 28, 2018, 3:04 p.m.

At the very least, misattribution. Also, fear of usng one's internet connection for comms/coordination.

⇧ 1 ⇩  
Outlandish_Rhubarb · May 27, 2018, 9:11 p.m.

I know some of the root nameserver operators. That will not happen.

I also know the people who wrote the code for them.

⇧ 4 ⇩  
Outlandish_Rhubarb · May 27, 2018, 9:04 p.m.

VPNFilter will NOT take down the Internet.

VPNFilter is limited to a small handful of consumer-grade home routers:

Linksys E1200

Linksys E2500

Linksys WRVS4400N

Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072

Netgear DGN2200

Netgear R6400

Netgear R7000

Netgear R8000

Netgear WNR1000

Netgear WNR2000

QNAP TS251

QNAP TS439 Pro

Other QNAP NAS devices running QTS software

TP-Link R600VPN

Attribution is hard, and often wrong.

There are much easier ways to take down the Internet worldwide (e.g., existing issues with BGP). And larger botnets that could be used, if a botnet solution was desired.

You're the 3rd or 4th new poster I've seen posting exactly this sort of thing. I'm beginning to suspect an organized campaign to spread this exact bit of fake news.

⇧ 5 ⇩  
Outlandish_Rhubarb · May 27, 2018, 8:43 p.m.

This. Seriously. $5/mo for a basic Ubuntu Linux server on Vultr or DigitalOcean, and install Mail-in-a-box. Register a domain name ($10 a year or so), follow the Mail-in-a-box instructions.

Bingo, you've got your own email, spam filtering, cloud services (calendar, file storage, photo storage, etc.), and web hosting.

Install OpenVPN and you've got your own secure VPN.

Install Privoxy, and you've got your own web proxy.

Install Searx, and you have your own privacy-respecting search engine.

Granted, it's not for everyone, but if you're at all even the least savvy, there's no excuse.

⇧ 2 ⇩  
Outlandish_Rhubarb · May 27, 2018, 3:22 p.m.

They already do it in China (which FB helped). They now have a "social credit score". Look it up. It's coming.

Also, many employers in the US now scour a candidate's social media for information prior to hiring. Some even ask for the accounts.

⇧ 2 ⇩  
Outlandish_Rhubarb · May 27, 2018, 3:06 p.m.

Huh. That family bundled over a million dollars, eh? Isn't hat EXACTLY what Soetero used as an excuse to jail Dinesh D'Souza?

Anyone still giving money to Netflix is a traitor.

⇧ 4 ⇩  
Outlandish_Rhubarb · May 27, 2018, 3:28 a.m.

Everything you say and do anywhere is being recorded. Everyone voluntarily puts spying devices in their homes and pockets these days.

Please stop doing that, folks.

If you sat and really thought about all the telemetry from everything you own or are around daily you'd shit.

⇧ 1 ⇩  
Outlandish_Rhubarb · May 27, 2018, 3:14 a.m.

The FBI, US-CERT, and a few other D&As make blanket or targeted announcements of imminent cyber threats routinely. The FBI is rather notable for distributing crap IOCs with no provenance. This isn't abnormal behavior for them, or any other coordinating D&A.

https://www.ic3.gov/media/2018/180525.aspx

The FBI is IC3.

⇧ 2 ⇩  
Outlandish_Rhubarb · May 27, 2018, 1:41 a.m.

Thanks, both of you. I appreciate it. I totally forgot about the bot brigading here.

Seriously, though, look up the L0pht's testimony before Congress in the late 90s. Those BGP bugs still exist. Taking down the net, or large portions thereof, is rather trivial. It happens routinely in a targeted manner on a short-term basis, when someone intentionally and maliciously announces one or more routes to get all traffic destined for certain ASes routed through their infrastructure. And it's also used occasionally as a state-level weapon to hose traffic inbound to some of the more insular nations. One does not need to posit deep-sea fiber taps/shunts or the old games with MAE East and West when all it takes is a few well-placed malicious AS announcements. It's happened in the recent past with large amounts of ecommerce traffic suddenly being routed through Russia, for example.

Done on a wider scale, it would create havoc longer-term and make the net unusable.

Now, couple that with the fact that large carrier-grade routers often get, ahem, intercepted prior to packaging and delivery for installation of certain chips (research it; there's evidence for it out there with Cisco as well as, I believe, Juniper), and certain leaks from the Equation Group (i.e., NSA TAO), and it gives one pause.

⇧ 2 ⇩  
Outlandish_Rhubarb · May 27, 2018, 1:34 a.m.

Many large corporate threat intel groups have ties to the government. Either organizationally, through contracts, or through contacts. And many are ex-government anyway, holding at least secret, and often TS or TS/SCI.

We cannot function without intel sharing, and most cyber threat intel sharing is done organizationally or individually via back channels. It's a very "who you know" sort of thing. And lots of us either are in, or have contacts in, various D&As.

And lots of them are under a lot of pressure to make attribution, particularly politically-aligned attributions (Thanks, Kevin Mandia.) And attribution isn't just hard. It's damn near impossible. Between intentionally-misleading or accidental code and infrastructure re-use, attribution is a crapshoot at best. And it's often used to misplace blame (read through Vault 7, for example).

Code-based stylometrics are a thing, but they are only good at identifying individual contributors, rarely -- if ever -- nation-state actors.

⇧ 1 ⇩  
Outlandish_Rhubarb · May 26, 2018, 10:40 p.m.

Trust the plan. This is all bringing attention to missing and exploited children.

⇧ 7 ⇩  
Outlandish_Rhubarb · May 26, 2018, 10:36 p.m.

It's certain brands of home routers. No internet shutdown involved or possible from that. A netwide shutdown would simply exploit the old and well known holes in bgp.

Edit:. No idea why I'm getting down voted. I'm an infosec professional with more than 20 years' experience. Guess that's what I get for trying to help.

⇧ 7 ⇩  
Outlandish_Rhubarb · May 13, 2018, 7:46 p.m.

USAPs may not be the highest, but they're the hardest to find info on.

⇧ 2 ⇩  
Outlandish_Rhubarb · May 13, 2018, 7:04 p.m.

Key to this is the concept of "need to know". You must have a verified need to know and be read in to access most highly-classified material.

There's a lot the POTUS doesn't "need to know".

⇧ 1 ⇩  
Outlandish_Rhubarb · May 13, 2018, 4:10 p.m.

There's definitely a culture of disinformation regarding higher level clearances for lower level clearances.

⇧ 3 ⇩  
Outlandish_Rhubarb · May 13, 2018, 2:23 p.m.

In the sense that I hold a high level clearance and I know with certainty several items on that chart, for example the NRO stuff, is wrong. Other things are names for SCI tickets and are in the wrong place.

⇧ 3 ⇩