bcrypt Profile Banner
yan Profile
yan

@bcrypt

Followers
76K
Following
26K
Media
2K
Statuses
20K

security engineering @brave / helped build Let's Encrypt, Privacy Badger, and HTTPS Everywhere @eff / physics alum @mit / rabbit enthusiast

Joined November 2012
Don't wanna be here? Send us removal request.
@bcrypt
yan
3 years
could not for the life of me figure out how to buy a bus ticket in Milan. it was literally easier to get a shell 😆
Tweet media one
91
646
7K
@bcrypt
yan
4 months
long thread about a phishing attack that has proper headers from google’s domain but for true DKIM stans, the interesting part starts here.
@nicksdjohnson
nick.eth
4 months
Here's how it works: First, they register a domain and create a Google account for 'me@domain'. The domain isn't that important but it helps if looks like some kind of infra. The choice of 'me' for the username is clever, as you'll see in a minute.
6
20
146
@bcrypt
yan
5 months
RT @mer__edith: 📣🚨 BAT SIGNAL: A law in France that would mandate a backdoor in end to end encrypted communications is set for a vote withi….
0
875
0
@bcrypt
yan
6 months
(this is the sort of tweet that would have absolutely slapped on infosec twitter circa 2015, RIP).
0
1
72
@bcrypt
yan
6 months
ecdsa private key leak due to nonce reuse strikes again, this time in the elliptic npm library
Tweet card summary image
github.com
Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string)
1
34
166
@bcrypt
yan
7 months
prices delivery items based on your local store setting, not your delivery address, so if you live in SF just set your local store to Missouri or something lol
Tweet media one
Tweet media two
5
15
226
@bcrypt
yan
8 months
RT @scumitchell: I benchmarked over 100 HTML tags so you don't have to and here are the visualized results. Not all HTML tags are created….
0
501
0
@bcrypt
yan
8 months
RT @chrisrohlf: A little over 10 years ago I and @dugdep stood up the first Yahoo! Red Team when I joined the Paranoids under @alexstamos.….
0
11
0
@bcrypt
yan
9 months
70 mb/24 hours, call it hurricane comcast.
@RyanMaue
Ryan Maue
9 months
A massive "bomb cyclone" is set to explode off the U.S. West Coast with hurricane force winds, flooding rains, and enormous mountain snow from Category 5 atmospheric river. Central pressure will fall almost 70 mb / 24 hours reaching 942 mb -- similar to Category 4 hurricane.
5
7
73
@bcrypt
yan
9 months
just drove by the same people we drove by 4 hours ago. proof the universe is running out of memory.
8
3
107
@bcrypt
yan
9 months
(despite my username i have nothing to do with the design of bcrypt, this is just a password hashing stan account).
8
3
532
@bcrypt
yan
9 months
reminder that the bcrypt hash function ignores input above a certain length! so if you do bcrypt(username || password) for some reason, a sufficiently long username will make it accept any password. to fix this you can sha256 the input first.
@kmcquade3
Kinnaird McQuade 💻☁️💥
9 months
Okta allowing login bypass for any usernames with 52+ characters is insane. Official Security Advisory:
Tweet media one
63
1K
6K
@bcrypt
yan
9 months
between this and the two “hide my email” buttons on this form (one of which loads the email hiding feature, the other of which autofills the string “hide my email”), apple has been killing it lately!
0
4
39
@bcrypt
yan
9 months
i need to know more about the 38 pics classified as “rabbit” but not “Rabbit” by the apple AI
Tweet media one
6
3
71
@bcrypt
yan
10 months
some cool things i've learned since posting:. 1. many other universities have the same issue.2. lots of MIT folks know about this already; see this 2013 article for example IMO this problem is not going away anytime soon so more ppl should be aware of it.
Tweet card summary image
thetech.com
A fake email that appeared to be sent by President L. Rafael Reif addressing all of MIT was sent to all MIT dorms at 1 a.m. this morning, announcing that all classes would be cancelled for Wednesday,...
17
23
744
@bcrypt
yan
10 months
no idea how many other legacy SMTP setups have the same issue but it's easy to detect in this case; just inspect the email headers and check if the "authenticated as" user is the same as the address in the "from" field.
Tweet media one
11
33
1K
@bcrypt
yan
10 months
i discovered this because i received a VERY convincing phishing email sent from "me". it turns out the attacker compromised another acct and was using it to send email as arbitrary users. that acct has been reported and suspended.
9
19
1K
@bcrypt
yan
10 months
PSA i can spoof any email and it will pass all DKIM/SPF/etc. checks. here's an email i sent to myself pretending to be a famous MIT-affiliated podcaster - thanks gmail for auto-inserting the profile pic :) . MIT may fix this someday but in the meantime
Tweet media one
193
741
12K
@bcrypt
yan
10 months
example
0
2
15
@bcrypt
yan
10 months
there is a scam going around where someone says they are interested in hiring you, but insist on using "brave talk" / "wechat" / etc. to do a call. when you click to join the call, it says you have to download an installer which is actually malware.
@brave
Brave
10 months
⚠️ Friendly reminder: Brave Talk will never ask you to download software. Anyone, or any sites, asking you to download Brave Talk are trying to trick you into downloading malware. Brave Talk is only available through
6
73
223
@bcrypt
yan
10 months
RT @IroncladDev: docker users
Tweet media one
0
191
0