• 2 Posts
  • 18 Comments
Joined 2 years ago
cake
Cake day: June 20th, 2023

help-circle








  • Exactly this, the .zip file extension is widely known, and now that it’s also a TLD, it can be confusing for some people. There’s no technical vulnerability, but the existence of .zip TLD just gives more ammo for phishing. For example, someone could register a domain name recent-bank-statements[.]zip (without brackets) and then have a subdomain for chase.com and send someone a link to https://chase.com.recent-bank-statements/[.]zip to “Download your bank statements”. If you’re not looking closely, you might not realize there is a . instead of a / and think that this link would go to chase.com When the site initiates a download of a zip file, you might trust the contents thinking it came from Chase and not a malicious link.



  • Publisher Nexon has now made a statement addressing the situation, saying the ads were submitted by users as part of a ‘TikTok Creative Challenge’, which TikTok describes as an “official creator monetization program that turns your creativity into cash by creating UGC-style ads for your favorite brands”.

    “All submitted videos are verified through TikTok’s system to check copyright violations before they are approved as advertising content. However, we have become aware of cases where the circumstances surrounding the production of certain submitted videos appear inappropriate. Thus, we are conducting a thorough joint investigation with TikTok to determine the facts.

    How could they not see this coming? Of course this will be gamed and abused. This is what happens when you fire your marketing department and outsource it to TikTok.





  • The code being public helps with spotting issues or backdoors.

    A recent example of this is to see the extent that the TALOS group had to do to reverse engineer Dell ControlVault impacting hundreds of models of Dell laptops. This blog post goes through all of the steps they had to take to reverse engineer things, and they note fortunately there was some Linux support with publicly available shared objects with debug symbols, that helped them reverse the ecosystem. Dell has all this source code, and could have identified these issues much more easily themselves, but didn’t and shipped an insecure product leaving the customers vulnerable.



  • Agree on both points, but gerrymandering doesn’t apply to the function of the EC. Even with Ranked Choice voting, they would still be susceptible to gerrymandering. Independent redistricting commissions seem like the best compromise, but then you get into a situation where not all states are playing by the same rules, and actually supporting your citizens rights is bad for the country if an equally large state can gerrymander the shit out of districts.

    The article does suggest also having “proportional representation, in which parties win seats based on their share of the statewide vote, rather than in winner-take-all districts” which remove a lot of the fuss about districts maps, but would still probably still disenfranchise some voters. I also can’t imagine a ballot in a big state like CA or TX having to rank 70+ representatives for your house seat.

    The unfortunate reality is the politicians currently in power would rather pull up the ladder and secure their seat than make things more fair and add more ladders.