Marcin
@marcinw
Followers
2K
Following
2K
Media
112
Statuses
6K
because tweeting and blogging is a full time job
New York, NY
Joined July 2008
You'd be hard pressed to find someone in the hacker community that you could have deep tech conversations with & also turn everything they touch into fun. @aloria is a legend that I am privileged to call a friend. We will remember! Photo from 15th anniversary of "Hackers" party.
When speaking with @aloria my spirits would lift. Her wit and brilliance were stuff of legend and she would often make me smile and think at the same time. You will be missed and this is how I will remember you:
0
14
48
“Code signing” as sold by CAs is a Microsoft only offering. It doesn’t really belong in CA/Browser Forum at all. Doing so just shunts Microsoft’s responsibility to evolve its own code signing practices to commercial CAs. This is problematic for several reasons.
The Code Signing Working Group recently improved requirements for code signing. Effective Nov. 15, 2022, key protection requirements for OV code signing certificates are harmonized to be the same as EV code signing certificates.
2
9
28
Where else in our lives do we actively create and promote the infrastructure that allows malicious actors scalable and frictionless destruction? Why run AD, which enables scalable ransomware? So that we can automatically deploy EDR to maybe detect (but not stop) that ransomware?
0
2
5
My scooter was stolen last week. Unknown to the thief, I hid two Airtags inside it. I was able to use the Apple Find My network and UWB direction finding to recover the scooter today. Here’s how it all went down:
226
3K
12K
There's a focus that comes with protecting cryptocurrency. Security theater doesn't play at all, there are real direct consequences for breaches, and you can't keep them a secret. There is real useful innovation happening and the rest of infosec ignores it to their own detriment.
For years I’ve avoided anything to do with cryptocoins. Initially it was because people assumed being in security meant I knew about it & kept pestering me. Later it was because I saw the greed derail a couple of good hackers careers. Then it was some of the unpleasant community.
4
10
48
Big congratulations to @brian_armstrong, @FEhrsam and the entire @coinbase team on a monster debut today! Huge moment for crypto. To the moon! 👍🏻🚀🍾🥂🥳🎉🎈🎊
58
214
3K
I wrote a smart card token driver for MacOS to interface with identities backed by Secure Enclave
github.com
A Secure Enclave Token Driver Smartcard Extension. Contribute to mwielgoszewski/SecureEnclaveToken development by creating an account on GitHub.
0
3
7
Windows crypto API makes it easy to use keys on hardware eg HSMs Example: ADFS with SAML signing key on AWS CloudHSM v2 (Marvel Nitrox née Cavium) Sometimes showing the key is on an HSM is the hard part 🤷♂️ Key container → CSP → certificate → ADFS settings
1
1
1
Common pattern in infosec: 1. Fail at threat modeling (In this case: conflate risks of non-constant time comparison of HMACs vs password hashes) 2. Attempt at "fix" for said "problem" 3. Introduce a more serious & real vulnerability 🤦♂️
0
1
1
Alternative view: given that enterprise IT is a market for lemons, it is the buyer responsibility to manage that risk by making sure untrusted vendor code (read: all except a handful such as MSFT/Google/AWS…) is properly sandboxed & contained assuming it *will* fail
0
1
0
My take: if you have the team on-staff to invent ALTS, use that. Otherwise, use mTLS for your service-to-service communication. You should still use other authn/authz mechanisms that are closer to end-to-end, though.
5
4
15
I grew up on software exploitation, but always thought crypto was beyond me. In the ~5 yrs since finding Cryptopals, I’ve found & exploited critical crypto bugs in products like secure messengers, and helped design secure protocols. Thanks @tqbf @spdevlin @marcinw @iamalexalright
Periodic reminder that you should check out https://t.co/I49bqsYoFG if you’re involved in making or breaking software that uses cryptography
1
14
69
This is why using credentials bound to hardware— smart-cards, USB tokens, TPMs— is crucial You can not paste them into Slack or share with another colleague even if you wanted to 🤷♂️ 1/2
1
3
10
Twitter, meet Streisand Effect PS: If my account mysteriously disappears from Twitter after this, that is your cue the company is escalating efforts to silence discussion of its internal security features 🤷♂️ https://t.co/bBibWyAIv9
vice.com
After a wave of account takeovers, screenshots of an internal Twitter user administration tool are being shared in the hacking underground.
2
16
22
Gemini is now the first #crypto exchange to offer support for hardware security keys across both Android and iOS #mobile devices via WebAuthn! Add a hardware #security key to your Gemini account for the strongest level of protection. More on our blog ⬇️
gemini.com
A Simple and Secure Place to Buy, Sell, and Store Bitcoin and Cryptocurrency. Easy, Free, and Secure. Get Started Today.
9
22
123
From past experience using a setup like this on Ubuntu 18, here is what can go wrong Setup script seals LUKS key to TPM state including PCR0. https://t.co/perALLt30r Firmware updates change that PCR → TPM key is no longer usable → LUKS partition can not be unsealed
1
2
4
"Hipster cryptography"? Or "not-invented-in-Mountain-View"? Problem is PKCS#11 works just fine & enables a whole host of scenarios besides SSH including VPN, TLS client authentication, disk encryption & S/MIME…
What should we call this? It's an ssh-agent for YubiKeys (and other PIV tokens) that just works out of the box. (Hat tip to @dominikhonnef for sshubikey!)
0
3
11