Hacker Newsnew | past | comments | ask | show | jobs | submit | subudeepak's commentslogin

This is consistent with expected behavior from my point of view. A bug in safari's controls would not infect the website. The site clearly sends a policy and safari clearly follows it. Perfectly sensible behavior.

Of course CSP does not allow a way to say -> browser controls are okay. Hence, a debate is quite welcome on whether such a specification is needed.


Hardware attacks cannot be prevented by secure boot...


The most plausible hypothesis of how this attack works is by corrupting firmware loaded at power-on time over SPI. Secure boot would absolutely protect from that by rejecting the signature of the modified code. By hey, I get that Newsy groupthink means secure boot bad.


>is by corrupting firmware loaded at power-on time over SPI. >Secure boot would absolutely protect from that by rejecting the signature of the modified code. Why couldn't you also change out the keys so the signature does match?


Doing so means compromising the TPM on the BMC module which is much harder to do. It's not something that can be done downstream in the supply chain, as this attack is purported to have been.


Secure boot is in no way bad :-) Ofcourse, it must in fact be the first point on any sane security checklist.

And one of the most common attacks aka. malicious firmware is prevented by using secure boot.

Many other classes of attacks like forcing the microcontroller to delete all its data, opening up the debug JTAG port of the microcontroller, preventing the log of certain security events etc. can be achieved with the right settings.

Though these are just remote possibilities with high levels of complexity, so is changing a production design of a board.


> Hardware attacks cannot be prevented by secure boot...

But by Trusted Computing (at least in some implementations).


Thanks for sharing. I was wondering, why do we need the sleeve ? Can the voltage boosting module be part of the remote itself ? Isn't that what a dc-dc module does ?


In case the remainder of the electronics can not work with the low voltage directly, often a boost converter is integrated in the device. Remotes mostly don't: their electronics can run at very low voltage, at the end of the battery life, the range is reduced because the ir led produces less light.


There's no reasons you can't put a voltage boost circuit into a device other than it would be cheaper not to and consumers will blame the batteries, not your device, if you don't. (also, if your device functions fine with low voltage batteries there is no need to.)


> if your device functions fine with low voltage batteries

Probably not a good idea. Really spent batteries tend to leak and damage the device.

Not working makes the owner change the batteries.


Even with a boost converter, it'll still stop working


>There's no reasons you can't put a voltage boost circuit into a device

It will kill rechargeable lithium batteries.


A single cell AA lithium likely already has a 3.7v (IIRC) to 1.5v step down, but also likely has a cut-off voltage to protect the internal cell too.

If it's built-in lithium then you're as likely put in a step-down or a buck-boost to regulate raw lithium cell pack voltages to whatever the device needs internally, but that also needs a self-protection cutoff.


There's also an efficiency loss from the extra circuitry, particularly when the batteries are good enough that there's no benefit yet.


They could add a bypass circuit around their boost converter, which would give virtually 100%[1] efficiency until the booster actually fires up.

Something like the TI TPS61291[1] draws only 15nA in bypass operation, and maybe 85% efficient in boost.

[1] The bypass switch itself will have some resistance, the part below is ~1.2ohm, which might be significant depending on your load.

[2] http://www.ti.com/lit/ds/slvsbx9a/slvsbx9a.pdf


The sleeve is to get access to the other terminal, the booster circuit needs to see both terminals to work.


I understand what you mean. But in my remote, the batteries are not arranged in serial; they are arranged in parallel. That being the case, my remote can see both terminals of a given battery. Hence, I fail to see, as to why the mechanism cannot be implemented as part of such devices..

The same applies to my wall-clock (which uses a single battery)


They can be. And in fact, in plenty of electronic devices they are since operating from a variable supply voltage is not an option so the typical battery powered device uses dc-dc converter like the one in the article only it does not operate on a single cell but on all cells in series. And that works just fine.


> But in my remote, the batteries are not arranged in serial; they are arranged in parallel

Are you sure? That's pretty uncommon. Are the poles oriented in the same direction or opposite ones? Is one set of poles connected to a pair of terminals shared by a single conductor and the other set using two distinct terminals?



Yeah, that's in series.


This question and more on the previous discussion: https://news.ycombinator.com/item?id=9644931


Why not put it in the battery?


What kind of email account do you need ?

> For disposable addresses you have mailinator.com

> For normal ids, there are quite a lot from mail.com .. or you could go to yahoo or outlook ...

> Your ISP must have provided you an id to you too.

All of them work.


I need a general purpose email. I am about to sign up an IRC nick. Not sure if I actually have to retain the address so I am hesitant to use guerilla mail etc?


I still don't understand HN's algo. The current 1st post has 301 points in 7 hrs while this post has 301 points in 3 hours but is in the second page ??


Posts like this get massive upvotes but they also get massive flags. The upvotes make the post go up and the flags make it go down. That's what happened here.


My guess is that it's being flagged (see the current top comment)


Really made me laugh. Service to bridge a gap between a customer and a customer service :)

But yet it is brilliant !


Any other projects affected ? Would be nice to start a list of all affected projects. This could also be a case of targeted attack on the gimp account.


http://sourceforge.net/u/sf-editor1/profile/

Nice list. Got Audacity there, for instance.


Several of those are projects that were never hosted at SourceForge, aren't they? Firefox, for example, I don't believe was ever an SF project. WordPress, I don't recall ever seeing on SourceForge. Are they altering the binaries they are posting on their "mirror"?

This is very confusing.


Bitcoin is on there also. Now that is worrying.


It doesn't neccessarily mean all of them are affected, but I think it's a call for a close inspection.


I download the bitcoin .exe, and it came clean, with the right signatures, but who knows how they are distributing the stuff. I have a Ubuntu computer. If they're at least a bit smart they will use their download redirects to serve the spyware only to Windows computers or something, so that could be why I got a clean binary. Bitcoin devs investigated, at my request. They removed the sf-editor1 user from the project owners and checked the binaries to see if sigs matched, and they did. But like I said, they could be filtering who they serve the "spyware" to.


Firefox, cgminer, zotero, etc.. Yikes.


These are all affected repos ! Damn !!!


The account that the GIMP-WIN project got "moved" to from it's official maintainer (jernej), is called "sf-editor1".

Having a look through that accounts project history is a little fishy (http://sourceforge.net/u/sf-editor1/profile/)....


Does not look like something they would have done intentionally. Explanations will come soon I guess.


The safest thing to do would be to assume that all software there is similarly afflicted and to never use Sourceforge again.

People who host software there should move to a different platform.


The only issue is that Sourceforge made nice binaries available. Most people have no idea how to use git and/or build their own binaries.


The official win32 gimp installers were not made by sourceforge, but by the GIMP contributor now locked out of managing the relevant sourceforge account. The same win32 installers that used to be provided on sourceforge are now provided from gimp.org directly http://download.gimp.org/pub/gimp/v2.8/windows/ the problem is the nice binaries being replaced by sourceforge made installers that also install adware.


Even before they started adding malware installers, downloads redirected through an extra ad page (and interfered with curl, wget, etc).


SourceForge has worked with wget, NSIS's inetc, etc for at least the last 10 years. We've been using it with PortableApps.com.


wget at least isn't affected, as long as you copy the link from the files page (the one that normally displays ads and a countdown timer in browser - it'll download the file directly with wget, since they apparently do user-agent sniffing).


GitHub supports releases w/ binary attachments[0]. I think the only thing they're missing at this point is shell access.

[0] https://github.com/blog/1547-release-your-software


What does the SourceForge shell access get you? If it's only the ability to edit your website and maybe your code (and not install, compile, etc. things), is it valuable in a world with git-push-to-deploy and with web-based editors?


Surely hosting static files on the internet is trivial to accomplish these days, even without the help of Malwareforge.


Trivial, technically, but can still be an unwanted cost for projects that push a lot of bits out. Our software at SF.net burns through several terabytes of bandwidth each year for several million package downloads. We've always appreciated their network of mirrors. But, it seems like it's time to move away from SourceForge.

We already relocated our revision control to github (though I'm considering another move to a self-hosted thing on Phabricator or gogs or gitlab, as I'm more cautious about using third party services for this kind of stuff these days).


The thing is, it's not exactly "their" network of mirrors. They mostly rely on third-party mirrors run by universities and other organisations that offer mirroring for free to a bunch of major open source projects and sites.


GitLab CEO here, glad to hear you're considering using it, please let me know if we can help in any way.


Or you can just stop getting anything from sourceforge since their MO is now to distribute crapware.


Even apache openoffice is using SourceForge for their downloads. There are quite a lot of s/w there at this moment.


OpenOffice has not been relevant for a while; development has moved to LibreOffice. See https://lwn.net/Articles/637735/


They're distributing LibreOffice now too, presumably without bothering to ask for the permission of the actual developers.


They technically don't need permission to perform the redistribution, seeing as LibreOffice is FOSS and distribution of software is permitted.

However, they do need permission to claim to be representatives of the LibreOffice developers.


And whether they need permission or not, bundling malware into the installer is evil.


:) Agree on that ! [Have not used any office in a while now - Markdowns have been sufficient]



You are not paranoid. You could use Chromium which has relatively fewer connections to google servers. You could also look at alternative browsers that have been forked from the chromium project with an emphasis on privacy.

For example: WhiteHat Aviator.

If you are comfortable changing settings of the browser, you could disable most of the google connections from the browser. [The first things I recommend changing is the search URL, disable auto-completion, bad site checking etc.] Then you have the do not track header ..

Of course, if browsing privacy is your biggest concern, the safest browser is Lynx ;) [Though not truly practical for most cases]


Thanks for the reply. Ofcourse, I disabled all the privacy settings that I can through settings in Chromium. But still, I could not avoid connections on startup on Chromium. It generally is not a problem, but I do not want Google to know whenever I open the browser :)


It would be nice to see how Iridium fares against WhiteHat aviator https://www.whitehatsec.com/aviator/

I personally find aviator to be more trustworthy at this point though.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: