vapourminer
Legendary
Offline
Activity: 4606
Merit: 4298
what is this "brake pedal" you speak of?
|
 |
February 26, 2020, 06:19:54 PM |
|
What protects your BIOS/FW? What protects your hypervisor?
OK if you are an idiot with only 1 PC don't do it. I agree at this point everyone here should have a few throwaway laptops lying around for sacrificial moments. no hd or wireless, use a live cd on r/o optical if you really want to inspect random flashdrives. even then it can get a persistent infection that survives power cycling.
|
|
|
|
jbreher
Legendary
Offline
Activity: 3080
Merit: 1688
lose: unfind ... loose: untight
|
 |
February 26, 2020, 06:24:25 PM |
|
Btw last time we past Vegeta we went up pretty fast, remember Vegeta is an iconic character with some real dragon ball Z powers.... One that doesn't let himself to be taken easily... Never saw the episodes? The guy is extremely powerful, probably BTC will be the only one to truly defeat him, time will tell when.
Wait... what? Now, I never was much interested in Dragon Ball Z, but my kid used to watch it all the time, so I’ve been exposed. Accordingly, I may be laboring under a misconception. But... My understanding is that it is not Vegeta whose power is over 9000. Rather, Vegeta is describing the power of some other character. No? Correct https://www.youtube.com/watch?v=eT7u8R2d8hc / https://www.youtube.com/watch?v=17zNW-wz35E (dont click if you have epiletic seizures  ) Goku he is the one on my hat for reference. And to keep it stable. Someone suggested it being him in his Ultra Instinct blue.  We need another hero to emerge for $10,000! Maybe the Hoff? https://www.youtube.com/watch?v=ZTidn2dBYbY David Hasselhoff - True Survivor from Kung Fury... "hear the ticking of the countdown clocks tonight" "We need some action, if we want to take our love from here!"  " The phoenix rises again!" Haha. That’s spectacular. Never seen that before - thanks. By some odd conincidence, last night was the first time I became aware of this: https://www.youtube.com/watch?v=3MMMe1drnZYDip? In these times of hardship, always remember. We. Are. Groot.
|
|
|
|
Globb0
Legendary
Offline
Activity: 2702
Merit: 2053
Free spirit
|
 |
February 26, 2020, 06:34:18 PM |
|
What protects your BIOS/FW? What protects your hypervisor?
OK if you are an idiot with only 1 PC don't do it. I agree at this point everyone here should have a few throwaway laptops lying around for sacrificial moments. no hd or wireless, use a live cd on r/o optical if you really want to inspect random flashdrives. even then it can get a persistent infection that survives power cycling. I mean I'm not picking up random drives. But if I did what they gonna hijack? just my latest Gerald Celente video or something. Maybe wall observer. If I start acting weird assume I'm burned.
|
|
|
|
AlcoHoDL
Legendary
Offline
Activity: 2646
Merit: 5058
Addicted to HoDLing!
|
 |
February 26, 2020, 06:36:50 PM |
|
When I want to read a "dangerous" USB stick, I launch my "test VM" in VMware and mount it there. AutoRun is disabled on both the host and the guest OS. Never had any issues in 25 years of Windows computing.
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Well, I must admit that I don’t know all the possible attack vectors. But as one potentially eye-opening matter, your example of ‘AutoRun’ indicates you are assuming that the device identifies only as a storage class device, and that said storage device contains only a filesystem that is know to Windows. Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB? What you're saying makes sense, I did assume that we were talking about a storage class device. I admit I wasn't aware of the "BadUSB" exploit. Will look it up, thanks for this. I guess I was lucky enough to not receive a "BadUSB" device (or maybe I did, and not aware of it?). As others have pointed out, the best option is a separate, clean PC, with everything sanitized after use by restoring from known, clean images. @jojo69, @xyzzy099, @vapourminer, also thanks -- merited.
|
|
|
|
rdbase
Legendary
Offline
Activity: 3150
Merit: 1640
Join the world-leading crypto sportsbook NOW!
|
 |
February 26, 2020, 06:38:28 PM |
|
Btw last time we past Vegeta we went up pretty fast, remember Vegeta is an iconic character with some real dragon ball Z powers.... One that doesn't let himself to be taken easily... Never saw the episodes? The guy is extremely powerful, probably BTC will be the only one to truly defeat him, time will tell when.
Wait... what? Now, I never was much interested in Dragon Ball Z, but my kid used to watch it all the time, so I’ve been exposed. Accordingly, I may be laboring under a misconception. But... My understanding is that it is not Vegeta whose power is over 9000. Rather, Vegeta is describing the power of some other character. No? Correct https://www.youtube.com/watch?v=eT7u8R2d8hc / https://www.youtube.com/watch?v=17zNW-wz35E (dont click if you have epiletic seizures  ) Goku he is the one on my hat for reference. And to keep it stable. Someone suggested it being him in his Ultra Instinct blue.  We need another hero to emerge for $10,000! Maybe the Hoff? https://www.youtube.com/watch?v=ZTidn2dBYbY David Hasselhoff - True Survivor from Kung Fury... "hear the ticking of the countdown clocks tonight" "We need some action, if we want to take our love from here!"  " The phoenix rises again!" Haha. That’s spectacular. Never seen that before - thanks. By some odd conincidence, last night was the first time I became aware of this: https://www.youtube.com/watch?v=3MMMe1drnZYDip? In these times of hardship, always remember. We. Are. Groot.Yeah, he is an 80's icon we can all be certain his legacy will never die in the face of destruction.  Grabbed it from the playlist here of many other retro tunes. https://www.youtube.com/watch?v=ZTidn2dBYbY&list=RDZTidn2dBYbY&index=1Here is one you will like since they have a bear at the beginning which bares a strikingly resemblance to you! Just a bit more happier.  https://youtu.be/PJQVlVHsFF8
|
|
|
|
Last of the V8s
Legendary
Offline
Activity: 1652
Merit: 4393
Be a bank
|
 |
February 26, 2020, 06:41:17 PM |
|
@jojo69, @xyzzy099, @vapourminer, also thanks -- merited.
those guys are like 150 years old each
|
|
|
|
VB1001
Legendary
Offline
Activity: 938
Merit: 2540
<<CypherPunkCat>>
|
 |
February 26, 2020, 06:47:49 PM |
|
Another Trilegendary.  edit: I don't know what I was thinking, I seemed to see 2997 
|
|
|
|
jbreher
Legendary
Offline
Activity: 3080
Merit: 1688
lose: unfind ... loose: untight
|
When I want to read a "dangerous" USB stick, I launch my "test VM" in VMware and mount it there. AutoRun is disabled on both the host and the guest OS. Never had any issues in 25 years of Windows computing.
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Well, I must admit that I don’t know all the possible attack vectors. But as one potentially eye-opening matter, your example of ‘AutoRun’ indicates you are assuming that the device identifies only as a storage class device, and that said storage device contains only a filesystem that is know to Windows. Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB? What you're saying makes sense, I did assume that we were talking about a storage class device. I admit I wasn't aware of the "BadUSB" exploit. Will look it up, thanks for this. I guess I was lucky enough to not receive a "BadUSB" device (or maybe I did, and not aware of it?). As others have pointed out, the best option is a separate, clean PC, with everything sanitized after use by restoring from known, clean images. @jojo69, @xyzzy099, @vapourminer, also thanks -- merited. Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable? What does your sanitization consist of? Just filesystem drive? Just disk? How do you know you’ve not been victim of a BIOS hack, which is unlikely to be recovered from, and may propagate to other machines if you are not careful never to use same storage device between machines. In the end, there is no perfect security. This is true. It is all a tradeoff. I guess all I’d like to advocate for are: have some idea of the risks, and; I doubt the proabability of finding satoshi’s private keys on some rando USB device found in the street is anywhere near the probability of falling victim to a simple intentional exploit.
|
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
Remember guys, it's time in the market, not timing the market.
|
|
|
|
Globb0
Legendary
Offline
Activity: 2702
Merit: 2053
Free spirit
|
 |
February 26, 2020, 07:08:27 PM |
|
BEG, borrow or steal
|
|
|
|
Dabs
Legendary
Offline
Activity: 3416
Merit: 1912
The Concierge of Crypto
|
 |
February 26, 2020, 07:15:42 PM |
|
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB? Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable? There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt. https://shop.hak5.org/products/usb-rubber-ducky-deluxeAs for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated. Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way. In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday. If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was.
|
|
|
|
|
cygan
Legendary
Offline
Activity: 3430
Merit: 9404
icarus-cards.eu
|
 |
February 26, 2020, 07:18:11 PM |
|
|
|
|
|
OutOfMemory
Legendary
Offline
Activity: 1820
Merit: 3629
Man who stares at charts (and stars, too...)
|
 |
February 26, 2020, 07:26:56 PM |
|
Hard to get some beans, noodles and rice already. Came home and i saw that i already advanced to Jr. Member!!! ...again  Again? This is mainly for VB1001:  I'm just going to eat McDonald's food if there's a crisis. No bacteria or virus can live in that stuff anyway and the probability of dying from SARS-2 is likely higher than the probability of dying from eating only McDonald's food for a few weeks. As an added bonus, there won't be a queue. Uh, oh, no... Sorry, bro! According to a testing from last year, the bacterial and fungal density, count and variety of the bottom side of the grips on McDonald's trays are higher than on their toilet seats! No joke, mister. You probably get in contact with SARS-CoV-2 from an asymptomatic carrier this way, either directly or indirectly via the wiping cloths that do not get exchanged for several days. You're better off by getting their "food" through the McDrive instead.
|
|
|
|
d_eddie
Legendary
Offline
Activity: 2772
Merit: 4027
|
 |
February 26, 2020, 07:29:07 PM |
|
I'm buying like crazy. My DCA schedule got on sort of a quick track. The main thing, as some absent peep would point out, is making sure I don't run out of dry powder should the need for a big shot arise. So I got a few more sats today - couldn't resist placing a couple limit orders in this area, and both triggered - and I will keep at this.
However, as the same absent peep would suggest, I've got an emergency stash. It amounts to ~40% of the fiat I'd allocated for Q1. You bears want to try your hands at the high 7k's? Even lower? Go for it, I'm ready.
|
|
|
|
El duderino_
Legendary
Offline
Activity: 2786
Merit: 13781
BTC + Crossfit, living life.
|
 |
February 26, 2020, 07:33:08 PM |
|
Me an total unaffected HODLer... though the 10.5K to 8.6K-ish in a few days is a decent drop... Still why? I only have one answer---> Normal BTC market behavior, n00bs better get used to it, if one can appreciate a HUGE pump, then the same peep should be aware there are some decent drops as well!
|
|
|
|
AlcoHoDL
Legendary
Offline
Activity: 2646
Merit: 5058
Addicted to HoDLing!
|
 |
February 26, 2020, 07:34:25 PM |
|
The 1st I haven't heard yet. The 2nd is epic. Smartest and most hilarious lyrics on a Bitcoin song I've ever heard.
|
|
|
|
d_eddie
Legendary
Offline
Activity: 2772
Merit: 4027
|
 |
February 26, 2020, 07:37:16 PM |
|
Right, it’s low enough now. Logging onto laptop to buy 0.5BTC.
Thank you for your service. I’ve bought 4 BTC so far this week. Because incremental ladder trading. Wow, 4 whole coins this week. You wrote btc - as in bitcoin, with no other qualifiers. If I got it right, there goes a little haiku for you. That's just, like, you know five days and a weekend, man Congratulations!
|
|
|
|
OutOfMemory
Legendary
Offline
Activity: 1820
Merit: 3629
Man who stares at charts (and stars, too...)
|
 |
February 26, 2020, 07:40:12 PM |
|
How can mounting a USB stick on an AutoRun-disabled VM affect your host's BIOS? Honest question, I want to know.
Don’t lost track of the fact that USB is an acronym for Universal Serial Bus. That device could contain any number of USB endpoints, each implementing a different device class. What if one of the endpoints identifies as a Human Interface Device — for example a keyboard — and injects a number of commands to the system? From the users perspective, invisibly. Or even deeper, a bridge device, giving it access to the underlying I2C bus - maybe even the SMB? Yeah, but who is going to maintain the discipline required to ensure any potential infection does not spread from the separate PC to others in your stable? There is the Yubikey which types for you like a USB keyboard. There is that Rubber Ducky, which types like a USB keyboard and can type like it was there at 100 words per second or something as fast as a keyboard will accept, such as Windows-R, CMD, and do any number of commands from the command prompt. https://shop.hak5.org/products/usb-rubber-ducky-deluxeAs for virgin clean PC's, I used to (and still do) use something called Deep Freeze, reboot to restore thing. If the host computer it's installed on gets infected, before it can propagate any problems to the rest of the network (assuming you disconnected it physically from the rest of the network), you just reboot, and it's back as new, as if it was never updated. Most malware is unaware of it's existence. It's great for setting up kiosks that provide internet access through regular browsers. At the end of the session, reboot, it's back to the way it was. If you need to update anything, reboot, turn it off, update, reboot, and it will stay that way. In theory, it can still be hacked, but in practice it's as if the whole computer is one giant VM. Reboot, and it's back to the way it was yesterday. If you need to save data or files or documents, you save them on a different drive or partition or folder designated as such. But the rest of the OS, reboot, and it goes back to the way it was. Most linux distributions can be run on read-only filesystems (same as from cd) BUT the only true security hole is running them as root, because volumes can be remounted in rw mode on the fly. I'm using this strategy on my raspberryPi that is running the game console emulators for the kids. They don't do no shutdown, they just pull the plug/wallwart. Roms are stored on etx4 USB, mounted read-only. This one is just mounted in rw mode on the PC, to manage the roms and emulator binaries. Just make sure you run linux as unprivileged user. Privilege escalation is a thing though, but unlikely on patched systems. However, when you're not connected to the net, i doubt there is a fair chance of catching a successful exploit via USB.
|
|
|
|
Gyrsur
Legendary
Offline
Activity: 2856
Merit: 1520
Bitcoin Legal Tender Countries: 2 of 206
|
 |
February 26, 2020, 07:45:42 PM |
|
|
|
|
|
|