USG.NSA And Microsoft Push "Emergency" Windows Crypto Update While Depreciating Windows 7

Yesterday's "Patch Tuesday" for Microsoft Windows included a "fix" promoted loudly through USG alligned media outlets that allegedly repairs X.509 "PKI" certificate validation in Microsoft's crypt32.dll (archived). The usual suspects are loudly herding Windows users to update in a way that strongly suggests geopolitical considerations may have pushed the USG.NSA to burn a number of their cultivated backdoors as they tend to do from time to time.

Past behavior of the actors involved suggests that as before, the patch is not going to be an actual fix so much as a subtle rekeying of the orfice. Serendipitously this patch was released immediately after Microsoft stopped issuing patches for Windows 7 creating an intense opportunity for Microsoft to collect "upgrade license" revenue with the endorsement of the USG "National Security" apparatus using the pitch that the USG already adopted the upgrade for its machines. The line between USG agency and USG "enterprise" continues become increasingly squishy.

The is the first time the USG.NSA has allowed itself to be explicitly named in Microsoft marketing materials as the contributor to a "fix" suggesting an ongoing marketing partnership between the two may be budding.

One Week After Grave Vulnerability Revealed, WireGuard Moving Into Linux Kernel For 5.6

Linux kernel network stack maintainer and GCC steering committee member David S. Miller has committed WireGuard VPN into the net-next tree all but assuring that the VPN software will become part of the Linux 5.6 kernel release (archived). This comes less than one week after revelations that most VPN implementations, including WireGuard, are vulnerable to session hijacking on most *nix network stacks. At this time WireGuard is being implemented into kernel as a standalone module with CONFIG_WIREGUARD and CONFIG_WIREGUARD_DEBUG menu options.

Linus Torvalds stepped down from his former position actively shaping Linux kernel development back in September 2018 after he took his intersectional daughter's suggestions seriously.

VPN Breaking Zero Day Effective Against Many *nix Systems Burned

RecentlyBurnedWorkandLivingVanA zero day that allows nearby network actors to detect and inject payloads into VPN tunnels has been revealed (archived). All VPN implementations appear to be affected including allegedly "hardened" ones like WireGuard and IKEv2/IPSec while the vulnerability hits numerous *nix TCP/IP stacks including those by Apple, Google, OpenBSD, and Linux. Linux appear to be most gravely affected when running versions of systemd published after November 28th, 2018 when the default "reverse ip path filtering" default was changed to more easily facilitate hijacking VPN sessions in this manner.

The original disclosures to the Openwall oss-security mailing lists are presented in full below: Continue reading

Python Runtime Differences Across Platforms Do Different Math

A group of chemists at the University of Hawaii published a paper in Organic Letters documenting numerous ways that the math performed by Python differs across the operating systems Python code can be run on (archived). The scripts revealing Pythonistic mathematics to be operating system dependent were intended to process nuclear magnetic resonance spectroscopy data. The scripts were originally described in Nature Protocols in 2014 went so far as to offer differing results across Mac OS X releases. This is far from the first indictment of misapplying computing tools in the modeling of reality.

Richard Stallman Targeted For Depersoning And MIT Eviction Over Defense Of Minsky

Microsoft featured speaker and human mushroom Richard Stallman has been targeted for depersoning and eviction at MIT over his defense of Minsky's enjoyment of friendship with Jeffery Epstein (archived, archived). Stallman erred by engaging the new leftist insanity within the pedantic framework of his old leftist insanity. The cultural revolution in the Anglo colonies appears to be continuing its pursuit of passive, derealized purity.

Another Open BMC Bung: Virtual USB Open To Anywhere

Yet another set of "Baseband Management Controllers" has been documented to compromise the systems in which they are implanted (archived). This latest batch of openings allows access from the network to a "virtual USB hub", and that vitual USB hub allows all of the mischief possible with a physical USB port. Or, almost all of it. The virtual USB port can't be meaningfully plugged with virtual epoxy to the same effect a real port can be plugged with real epoxy.