Discussion
Loading...

Post

  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
d@nny disc@ mc²
@hipsterelectron@circumstances.run  ·  activity timestamp last month

printing a shirt with "my lack of adequate financial compensation constitutes a supply chain security risk" and wearing it to conferences

  • Copy link
  • Flag this post
  • Block
webhat
@webhat@infosec.exchange replied  ·  activity timestamp 10 hours ago

@hipsterelectron I'll buy that shirt

  • Copy link
  • Flag this comment
  • Block
van der Verve دينامو غ
@eljas@eliitin-some.fi replied  ·  activity timestamp last month

@hipsterelectron Goood idea as it is an security risk in itself

  • Copy link
  • Flag this comment
  • Block
jufajardini
@jufajardini@infosec.exchange replied  ·  activity timestamp last month

@hipsterelectron Reminds me of the recent-ish attack in Brazil where they exploited an underpaid worker into selling work credentials that allowed for $$$$$$$ BRL to be transferred in a short period of time.https://www.msn.com/en-us/money/markets/devastating-pix-payment-system-hack-drains-100-million-from-brazilian-banks/ar-AA1I6mRU

MSN

  • Copy link
  • Flag this comment
  • Block
d@nny disc@ mc²
@hipsterelectron@circumstances.run replied  ·  activity timestamp last month

@jufajardini there is indeed one intended interpretation about actively compromising security for financial gain, because suits think everyone else is as selfish as they are!

but the SBOM remark was intended to identify how the SBOM is designed around a view of software as static and frozen in time, even though the term "artifact" from scholars of history is not about the importance or utility of the object, but what can be inferred about the processes that generated the object. a software artifact could try something similar, though

  • Copy link
  • Flag this comment
  • Block
d@nny disc@ mc²
@hipsterelectron@circumstances.run replied  ·  activity timestamp last month

@jufajardini a "sustainability SBOM" that identifies the transitive funding sources behind each dependency would begin to look a lot more like a tax return

  • Copy link
  • Flag this comment
  • Block
d@nny disc@ mc²
@hipsterelectron@circumstances.run replied  ·  activity timestamp last month

"put that in your SBOM" on the back

  • Copy link
  • Flag this comment
  • Block
Bruce Elrick
@virtuous_sloth@cosocial.ca replied  ·  activity timestamp 6 days ago

@hipsterelectron
...and smoke it!

  • Copy link
  • Flag this comment
  • Block
d@nny disc@ mc²
@hipsterelectron@circumstances.run replied  ·  activity timestamp last month

charlie marsh didn't want to compensate me for the zip extraction work i did and got CVEd because you can't expect to just use a trick without the context that led up to figuring it out in the first place https://astral.sh/blog/uv-security-advisory-cve-2025-54368 so this is no longer like a joke it's just the facts

uv security advisory: ZIP payload obfuscation

We're releasing a security advisory for uv due to ZIP parsing differentials which allow an attacker to bypass common Python security scanners.
  • Copy link
  • Flag this comment
  • Block
Log in

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.0 no JS en
Automatic federation enabled
  • Explore
  • About
  • Members
  • Code of Conduct
Home
Login