[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


>https://www.theregister.com/security/2026/05/13/disgruntled-researcher-releases-two-more-microsoft-zero-days/5239758
Imagine relying on microslop for 'security' lmao
>>
>>108818786
kek, anti OSS shilljeets suddenly very quiet.
>>
File: lej5qkszb3kc1.png (549 KB, 3238x1689)
549 KB PNG
>>108818814
>anti OSS shilljeets
>>
Microsoft needs to change tack now and stop hiding their problems.
>>
>>108818814
>please respond
What can I help you with?
>>
File: 1775946993654450.png (1.24 MB, 2048x2048)
1.24 MB PNG
>>108818786
irrelevant
>>
>>108818786
will ms be banned now like huawei and zte?
of course not, cisco and juniper aren't banned either despite knowingly adding backdoors to their systems too
>>
>that YellowKey can be mitigated by implementing a BitLocker PIN and a BIOS password lock.
so if you implement bitlocker correctly this shit doesn’t even work kek
>>
>>108820681
he said on his blog that TPM+PIN is still vulnerable, he just didn't release that part of the exploit
if you implemented bitlocker correctly though, you turned off TPM when you set it up and used conventional password authentication
>>
File: 2026-05-14-14:01:38.png (66 KB, 1459x227)
66 KB PNG
>>108820693
TPM are vulnerable, what's new..
All you need to do is to get the TPM's trust when booting (e.g signed os), once it's unlocked you can literally read secrects from it.
https://en.wikipedia.org/wiki/Cold_boot_attack
>>
i think i know this tranny. this guy have a recorded publishing 0day for logic bug such as privilege escalation in the past.

he also been employed in infosec industry. must be the same guy with unstable mental.

i but he's unemployed now, that's why he published them.
>>
>>108820693
what is his blog?
>>
>>108820758
https://deadeclipse666.blogspot.com/2026/05/were-doing-silent-patches-now-huh-also.html
>Second thing is, No, TPM+PIN does not help, the issue is still exploitable regardless, I asked myself this question, can it still work in a TPM+PIN environment ? Yes it does, I'm just not publishing the PoC, I think what's out there is already bad enough.
>>
>>108818786
I mean it's actually been proven that when you get to a certain userbase in the US, you have to create a backdoor or other access to user data to the federal government. Everyone who doesn't comply did or will get shut down.

Microsoft had to do this in the early 00s, as did anyone else since.
>>
File: lmao.jpg (1.77 MB, 2562x7875)
1.77 MB JPG
>>108818914
you lost
>>
>>108818970
This kind of anti-Indian sentiment really has to stop.
>>
>>108820787
>no demo of it in a TPM+PIN enviroment
so has he actually done it? or just stirring the pot trying to rile up some hazors to do it for him?



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.