in reply to Seirdy

Fixed the typos. Regarding SPDX headers:

I think that the robots.txt file itself isn’t a significant enough creative work to warrant copyright protection regardless of the license I put on it, and to put a license on such a trivial work would instead communicate that it’s meant to be reused.

It’s not meant to be reused as-is anymore now that I have a longer article that actually explains how and why I block what I block, but it doesn’t make sense to enforce non-reuse either.

In other words: I’m not sure that the file can receive copyright protections, and to act as if it does by giving it e.g. a CC license would simply encourage people to re-use it when they should be thinking for themselves and applying the nuance I hoped to inspire in my article.

I would rather not use restrictive licenses on my site, especially on works that I don’t think do or should receive copyright protections. and i would rather not advertise that the robots.txt be copied. A bit of a tricky place to be.

NLS Lays Out Its New Digital Player | News October–December 2024 - National Library Service for the Blind and Print Disabled (NLS) | Library of Congress loc.gov/nls/about/news/news-oc…

I accidentally found another security vulnerability in fdroidserver whilst working on something related to IzzyOnDroid.

We warned them months ago but were ignored *sigh*

"Another fdroidserver AllowedAPKSigningKeys certificate pinning bypass"

openwall.com/lists/oss-securit…

#IzzyOnDroid #Security

in reply to Fay 🏳️‍🌈

They are now claiming they can't use my patches as-is because of "code quality issues" (private apis). Which... applies to exactly one patch, the one they actually merged 8 months ago.

Because the only way to fix the vulnerability was to monkey patch androguard (and an updated version is still not available in Debian, nor has the Debian stable fdroidserver package received any patches, despite those packages being maintained by the F-Droid team, so that monkey patch is still needed).

They are also downplaying the impact by insisting this vulnerability is only a problem for third party repositories relying on fdroidserver; which even if true is showing a concerning disregard for the security of repositories of other projects relying on fdroidserver.

I have no words to describe how little remaining faith I now have in F-Droid's security and code review processes.

in reply to Fay 🏳️‍🌈

I wrote an overview of the situation (without technical details of the exploits themselves as that's covered by the README):

github.com/obfusk/fdroid-fakes…

Should someone stumble upon the security vulnerability disclosure at openwall.com/lists/oss-securit… – be assured the patches have already been applied at #IzzyOnDroid (and also that androguard is already aware: github.com/androguard/androgua…)

Also see the toot by the original finder: tech.lgbt/@obfusk/113765201775…

#security

in reply to IzzyOnDroid ✅

@eighthave (2/2)

¹ I can follow it, but not create such on my own
² we would need time to set up a script for that; remember we're just a very small team with no grants; most work is still on my shoulders, next to a full-time $dayjob
³ we didn't use your implementation for fdroidserver back in spring but applied the patches provided by Fay, so signing key rotation is still supported at IzzyOnDroid

in reply to IzzyOnDroid ✅

@eighthave (3/2)

"I'd need to see a v2-signed APK that is installable on Android that demonstrates the exploit it in order to consider this an actionable security vulnerability."

I'd rather not wait until an exploit is out-and-about. The patch is easy and not complex. Better safe than sorry. And one should fix (even potential) vulnerabilities *before* they become exploits.

in reply to IzzyOnDroid ✅

I understand your concern. From what I know, the IzzySoft repo relies much more on AllowedAPKSigningKeys to provide a secure repo than f-droid.org or guardianproject.info (the repos I'm involved in running). Both had extra verification before AllowedAPKSigningKeys existed, so there, its just an extra layer of protection. The goal of AllowedAPKSigningKeys is to make it easy for non-technical people to manage binary APK repos securely. That is a work in progress, and your reports help
in reply to IzzyOnDroid ✅

Good to hear you have more layers of verification. I'd like to read about what you're doing, since you've been handling the auto-download of APKs for a long time, so perhaps there is more we could add to `fdroid update`. Could you point me to them? There is a good foundation for us to build on: APK v2+ signatures are quite robust and APK signing keys tend to be quite stable over time. That makes it possible to automate checks so repo operators don't have to know all about signing.
in reply to Hans-Christoph Steiner

@eighthave android.izzysoft.de/articles/n… outlines several of our layers. And you still have one of our scanners in your issuebot – though for some reason that seems not have to be run anymore for quite a long time (I never saw it in issuebot reports for about 2 years now).

You can find our scanning scripts at gitlab.com/IzzyOnDroid/repo (look at the Readme in the lib/ directory). We plan to make them available as Docker/Podman image, but no ETA yet.

in reply to Hans-Christoph Steiner

@eighthave It's not just about F-Droid and Guardian, Hans. You are promoting fdroidserver for all those decentralized repositories, it's your software. IzzyOnDroid has not a single grant (wouldn't your Mobifree grant cover that?), our team is much smaller than yours (~3 vs ~30) – and not a single one here at IoD is being paid vs. 2+ full-time at F-Droid (we're all doing all this in our spare time, I spend 4+ hours each day after my regular 9h $dayjob for example, not counting weekends. (1/5)
in reply to IzzyOnDroid ✅

@eighthave (5/5) And looking at Mobifree, from nlnet.nl/mobifree/

> Our goal is to help mobile technology evolve to a more healthy state, provide people with concrete new tools and more reliable infrastructure, in order to provide better security and allow users more agency and choice.

"Better security". Should be the perfect fit for a security issue, no? 😉

in reply to Hans-Christoph Steiner

@eighthave I was just wondering, as the corresponding issue carries the Mobifree label. And sorry, we have all hands full with work on IzzyOnDroid – so all we can contribute are those patches, we cannot help you rolling them out at F-Droid.org.

The patches work fine, we use them ourselves. Not sure though how they harmonize with your alternative implementation, which we didn't merge at our end (we use the patches we proposed back then). But we even provide a patch for that variant, please test.

in reply to IzzyOnDroid ✅

Things with the Mobifree label are things that are being considered as part of that grant. It is definitely not a promise. It is quite likely we will work on AllowedAPKSigningKeys as part of Mobifree, I'd like to, but no guarantees. Currently, I'm thinking of making AllowedAPKSigningKeys only support v2+ signatures, since v1 signatures are deprecated, on their way out, and really overly complicated. I see no sense in trying to build security guarantees on top of them.
in reply to Hans-Christoph Steiner

@eighthave Thanks Hans! But you are aware that you still have v1-only APKs in the repo, right? Not saying AllowedAPKSigningKeys is active for them. And yes, it's older apps (just random findings). A full scan could reveal them all (we need to do the same here at IoD as well, have that on our list, but we are even more "understaffed" than you and still without any grants).
in reply to Hans-Christoph Steiner

@eighthave Isn't that what fdroidserver promises to provide to those using it to maintain a repository? We do not "invest a lot of effort into AllowedAPKSigningKeys" – we simply apply it consequently. Signature pinning is expected to be done by fdroidserver; we *accidentally* found flaws there, we even provided patches which were refused. We still have v1-only APKs as the F-Droid.org repo has them, yes. But we don't write/maintain fdroidserver. Are you saying it is unsafe for use by other repos?
in reply to IzzyOnDroid ✅

I'm saying v1 signatures should not be something that anyone relies on any more. Our current thinking is to remove support for v1-only signatures from AllowedAPKSigningKeys because of the weakness of v1 signatures means we cannot provide good security, so it would only provide a false sense of security. For distributing v1-only signed APKs, I'd recommend verifying them via an alternate method other than certificate pinning.
in reply to IzzyOnDroid ✅

fdroidserver is fully safe for the tasks it was built for. It has been independently audited as well (we have two more audits coming up). If you have a trusted collection of APKs, then fdroidserver provides the entry point to a trustworthy pipe to the F-Droid client. It cannot protect against malicious upstreams, upstreams losing their signing keys, etc. It cannot fix the deprecated v1 signatures. Require v2+ signatures, and AllowedAPKSigningKeys works with no known weaknesses.
in reply to Matija Nalis

@mnalis Same as IzzyOnDroid most likely: older apps which have long-time seen no updates anymore. At IoD, we've just removed several of those (which were additionally using weak keys, or had other issues as well), leaving only those in that have strong enough keys etc. Some were left for further investigation, in one case (app still actively maintained) we reached out to the devs asking for additional v2 signing. @eighthave
in reply to IzzyOnDroid ✅

@eighthave Would it make sense (if those abandoned v1 apps are still useful so should not be archived/removed) to recompile and re-sign those abandoned apps with F-droid.org keys (I'm assuming they're not RB), so people who install them from F-droid these days won't be vulnerable to fake upgrades elsewhere on the net (as I'm understanding is the risk currently)?
Or maybe tag them with that "Vulnerable" flag that F-droid apps (esp. browsers) get occasionally?
in reply to Matija Nalis

@mnalis I guess none of us have tried those old ones for RB – and with the projects dead and their devs no longer around, that would not help anyway (as with RB, both F-Droid & IoD would ship the upstream APK, which has that signing issue). Wile at IoD we build apps from source FOR RB, we don't sign ourselves. But (most of) the v1-only apps at F-Droid just needed to be re-signed (adding v2) as they are signed by F-Droid – right, @eighthave ?
in reply to daniel:// stenberg://

@jimfl

Really not a #ChuckTingle book cover?

Can only recall few software tools keeping backwards compatibility many protocols versions, with forward versions implementations. Then such security new/old reports, unavoidable?

AFAIK still no VSC http3 plugin, and only few for http2 ...While anyone just can test http3 from win/mac/lin shell default curl installs:

HT Curl Team!

Every year, the Dutch government adjusts taxes on electricity, gas, water as well as other things.
They publish a table on the official website here:
belastingdienst.nl/wps/wcm/con…

On Jan 1, there was no data about 2025 at all. Yesterday, on Jan 2, data appeared, stating the electricity tax to be € 0,10512 per kWh. Today, this number changed to € 0,10154 without any notice of change on that website. 😐

We're going to dive in with more depth on this, exploring why Bluesky's content tools are the second worst we've encountered in a long, rich history of internet censorship (just behind Meta, which are *awful).

The long and short of it is: language matters. masto.ai/@vagina_museum/113758…

in reply to Vagina Museum

Now here's a fun fact: it's not only adults that have vaginas and vulvas. Most of you probably don't need to know this, but about 50% of children have this part of the anatomy, too. And most of these children came out of a vagina. Instagram/Meta is particularly egregious for flagging and shadow-banning anything that even so much as uses anatomically correct language, thus obscuring content which, frankly, young people probably *should* be able to access.

Link to USpol, net neutrality, potential for discrimination against trans people, porn bans

Sensitive content

This entry was edited (11 months ago)

'50 years of giving the money to the wealthy people resulted in the poor people getting no money,' is not a terribly surprising result. 🤡

"50 years of tax cuts for the rich failed to trickle down, economics study says"

cbsnews.com/news/tax-cuts-rich…

This entry was edited (1 year ago)

The world's richest man has joined a growing chorus of right-wing voices attacking Wikipedia as part of an intensifying campaign against free and open access information. Why do they hate it so much?

citationneeded.news/elon-musk-…

#Wikipedia #ElonMusk #USpolitics #USpol

Social Democracy, an alternate history game set in the Weimar Republic. You control the SPD and fascism is on the rise.

In my playthrough, I tried to ally with the far left and built a strong leftist paramilitary force, leading to civil war against Hitler.

This game is fucking hard.

red-autumn.itch.io/social-demo…

Sigo insistiendo: Deberían prohibir todo tipo de estufas en la calle.
El que tenga frío que venga abrigado de casa. Ya bastante calentamos el planeta como para desperdiciar energía calentando a unos caprichosos.

Las estufas de gas se resisten a desaparecer de las terrazas de Barcelona

lavanguardia.com/local/barcelo…

in reply to Justin Macleod

the difference is still in RVC vs multi-modal real-time speech and lyrics generation. For simple voice output with multiple sentences it's lesss of an issue as they can either use a pre-created file to RVC and transform the voice into another, or direct TTS without the burden of actually needing to generate the final noise atmosphere and mechanics, which falls more squarely in the territory of general transformer models.
This entry was edited (11 months ago)

🚨 Gmail’s AI Security Risk 🚨

A @Forbes article reveals a Gmail vulnerability @Google has CONFIRMED but WON’T FIX.

Security researchers find that Gemini AI which is integrated into Gmail and other Workspace tools, is susceptible to indirect prompt injection attacks.

So why did Google issue a “Won’t Fix (Intended Behavior)” ticket?

🔗Read more forbes.com/sites/daveywinder/2…

#googlegemini

Das sollte man in Bezug auf die Nutzung von kommerziellem #SocialMedia und #Kommunikation nicht unbeachtet lassen, vielleicht auch besonders in #digitaleKirche:

#Meta unterstützt #Trump Amtseinführung finanziell mit großer Summe:
bbc.com/news/articles/c8j9e1x9…
#Instagram #Facebook #WhatsApp #FediKirche

This entry was edited (11 months ago)
in reply to Winter blue tardis

@tardis @pcdevil I totally agree that there are not too much to choose from, and I really believe in everyone's right to choose what they want to (based on their focus and needs).
But there are some cool projects for smartphones that are worth the look (@GrapheneOS , @calyxinstitute , @LineageOS), and also some great alternative software to use in replacement of the apps and services of the big players.

USA uvalily sankce na advokáta, jehož firmy sponzorovaly Zemana
seznamzpravy.cz/clanek/domaci-…