resiliency – epm.jonhwilliams.com http://epm.jonhwilliams.com i build custom EPM systems that work Thu, 15 Nov 2018 20:39:07 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.3 melting security boundaries and speculative execution http://epm.jonhwilliams.com/melting-security-boundaries-and-speculative-execution/ http://epm.jonhwilliams.com/melting-security-boundaries-and-speculative-execution/#respond Fri, 05 Jan 2018 16:56:37 +0000 http://epm.jonhwilliams.com/?p=601 you are almost certainly affected (Thursday, January 4, 2017)

A growing number of reliable sources (like Intel, Apple Support, Azure Blog, Amazon, Red Hat, Xen, among many others) provide details regarding major security vulnerabilities that affect modern microprocessors, and two specific exploits, called Meltdown & Spectre.

Meltdown dissolves the barriers between user applications and the operating system; This allows a program to access the memory of other programs and the operating system.

Spectre breaks the isolation between different applications on a system, allowing even well-designed programs that operate without error to leak their secrets.

Such exploits would likely include passwords or sensitive data held in memory.


]]>
http://epm.jonhwilliams.com/melting-security-boundaries-and-speculative-execution/feed/ 0
Loxodo: Passwordsafe v3 archive compatible reader in pure python http://epm.jonhwilliams.com/495-2/ http://epm.jonhwilliams.com/495-2/#respond Sat, 22 Oct 2016 19:53:39 +0000 http://epm.jonhwilliams.com/?p=495 We recommend staying away from fancy online password managers so Password Safe is our long-time go-to solution for securing logons. If Passwordsafe is part of your kit on OS X (or Ubuntu, Red Hat, et cetera) this will be useful.

Install wxPython:

brew install wxpython

Download Loxodo for OS X or (even better):

git pull https://github.com/sommer/loxodo.git

(you did remember git is context sensitive right?)

To run, cd into the location of loxodo.py and execute:

./loxodo.py

We prefer to execute from command line, so in /usr/<username> create a symbolic link:

ln -s  /usr/local/some/obscure/location/loxodo.py /Users/<username>/loxodo.py

Now one can open a terminal to run:

<computername>:~ <username>$ ./loxodo.py

“Cristoph Sommer’s pure Python Password Safe v3-compatible Password Vault Loxodo is a thing of beauty, especially when accessing the same v3 psafe archive file from multiple operating systems.”

“Renowned security technologist”[1] Bruce Schneier, author of many books designed Password Safe for simple and secure password management. Password Safe is maintained at https://pwsafe.org/.

From git the source is open.

On Windows, each formal release of  Password Safe is digitally signed with the project administrator’s gpg key. To verify the signature, use this public key (key fingerprint = A703 C132 8EAB C7B2 0175   3BA3 9194 6451 5CCF 8BB3).


Posted by: Jon H. Williams
[1] https://pwsafe.org/index.shtml
]]>
http://epm.jonhwilliams.com/495-2/feed/ 0