• 0 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: July 7th, 2023

help-circle
  • In a centralized management scenario, the central controlling service needs the ability to control everything registered with it. So, if the central controlling service is compromised, it is very likely that everything it controlled is also compromised. There are ways to mitigate this at the application level, like role-based and group-based access controls. But, if the service itself is compromised rather than an individual’s credentials, then the application protections can likely all be bypassed. You can mitigate this a bit by giving each tenant their own deployment of the controlling service, with network isolation between tenants. But, even that is still not fool-proof.

    Fundamentally, security is not solved by one golden thing. You need layers of protection. If one layer is compromised, others are hopefully still safe.


  • If we boil this article down to it’s most basic point, it actually has nothing to do with virtualization. The true issue here is actually centralized infra/application management. The article references two ESXi CVE’s that deal with compromised management interfaces. Imagine a scenario where we avoid virtualization by running Kubernetes on bare metal nodes, and each Pod gets exclusive assignment to a Node. If a threat actor has access to the Kubernetes management interface, and can exploit a vulnerability to access that management interface, it can immediately compromise everything within that Kubernetes cluster. We don’t even need to have a container management platform. Imagine a collection of bare-metal nodes managed by Ansible via Ansible Automation Platform (AAP). If a threat actor has access to AAP and exploit it, it then can compromise everything managed by that AAP instance. This author fundamentally misattributes the issue to virtualization. The issue is centralized management and there are significant benefits to using higher-order centralized management solutions.


  • After briefly reading about systemd’s tmpfiles.d, I have to ask why it was used to create home directories in the first place. The documentation I read said it was for volatile files. Is a users home directory considered volatile? Was this something the user set up, or the distro they were using. If the distro, this seems like a lot of ire at someone who really doesn’t deserve it.



  • I’m not saying they were purposefully cheating in this or any tournament, and I agree cheating under that context would be totally obvious. But, it is feasible that a pro worried about their stats might be willing to cheat in situations where the stakes are lower outside of tournaments.

    What I also don’t understand is, if this hacker has lobby wide access, why was it only these two people who got compromised? Why wouldn’t the hacker just do the entire lobby? Clearly this hacker loves the clout. Forcing cheats on the entire lobby would certainly be more impressive.

    PS. This is all blatant speculation. From all sides. No one, other than the hacker and hopefully Apex really knows what happened. I am mostly frustrated by ACPD’s immediate fear mongering of a RCE in EAC or Apex based on no concrete evidence.







  • First, let’s assume we’re all intelligent people here and not be condescending.

    I am not saying it’s not possible to view high resolution content at 25 mbps. I am saying that certain content just can’t encode at full fidelity at 25 mbps. In my experience, high action scenes with tons of entropy to encode do not compress well. And those scenes degrade and become muddy or pixelated at lower bitrates. Do you need it for the entire stream? No. But sadly, to save on bandwidth many streaming services also severely limit how much buffering their clients will do.

    Even all this said. We’re talking about 10’s of megabits of difference. Significant portions of the world have managed to offer gigabit internet to practically everyone in their jurisdiction. And yet, we’re here in the dark ages with 25/3. And sure, you could say “American has significantly more rural areas, those customers are hard to serve.” But, I’ve got family in coal-country West Virginia that have gigabit fiber. There are no technical hurdles. These companies just don’t want to upgrade their infrastructure.