| ▲ | guessmyname 7 hours ago |
| I don’t get it, why don’t you all—absolutely all of you reading—use Little Snitch? [1] It really doesn’t compute in my head why would any macOS user not use a network firewall like this, or similar, to block unwanted outgoing HTTP(s) requests. You can easily inspect the packet with tools like Wireshark or Burp Suite Professional (or Community) edition, or any other proxy tool, of which there are many in the macOS ecosystem. And this is not unique to macOS, this is all possible in Windows, Linux and any other OS. [1] https://www.obdev.at/products/littlesnitch/index.html |
|
| ▲ | drum55 7 hours ago | parent | next [-] |
| It’s a false sense of security, more or less. If an application wants to talk to a C2 they don’t have to make a connection at all, just proxy a connection through something already allowed, or tunnel through DNS. Those juicy cryptocurrency keys? Pop Safari with them in the URL and they’re sent to the malicious actor instantly. If you’re owned Little Snitch does nothing at all for you except give you the impression that you’re not. |
| |
| ▲ | 6 hours ago | parent | next [-] | | [deleted] | |
| ▲ | nickorlow 6 hours ago | parent | prev | next [-] | | Especially in this case where the attackers could've proxied you to their malicious servers through npp's good/trusted servers | |
| ▲ | g-b-r 3 hours ago | parent | prev | next [-] | | That's at the very least harder and less likely; security is not all or nothing. | |
| ▲ | worthless-trash 6 hours ago | parent | prev [-] | | I find it difficult to believe that there is levels of cooperation between different companies that would allow this to work. Source. I work for a company for longer than the internet has been alive. | | |
| ▲ | drum55 6 hours ago | parent | next [-] | | My example is “living off the land”, safari already has access to everything, open it and use it to communicate. Needs no permissions, bypasses little snitch entirely. | | | |
| ▲ | dfc 5 hours ago | parent | prev [-] | | You have worked for the same company for >55 years? That's wild. Can you share the industry? | | |
| ▲ | worthless-trash 2 hours ago | parent [-] | | IBM, although I consider internet and arpanet different things. Like saying pstn and fiber are different things. |
|
|
|
|
| ▲ | scratchyone 6 hours ago | parent | prev | next [-] |
| It wouldn't protect against this attack though. The Notepad++ update servers were hijacked. Presumably you would allow Notepad++ updates through Little Snitch so you would be equally as vulnerable. |
| |
| ▲ | guessmyname 6 hours ago | parent [-] | | No, why would you allow automatic updates? It makes no sense. You should audit every update as if each payload could contain malware. It’s a paranoid way to live, but that’s what it takes. We also need better computer science education in high schools, teaching students how to inspect network packets, verify SSL certificates, and evaluate whether a binary blob might contain malicious code. People have gotten complacent about the internet, which is why they still get hacked, when it should be the other way around. With everything we’ve learned over the years, why are breaches more common than ever? I don’t understand why people are so careless about online security today, compared to decades ago when we were taught not to share personal information and not to trust anything on the internet. | | |
| ▲ | drum55 6 hours ago | parent | next [-] | | Do you go by the smell of the executable or just general vibes? Nobody has never reviewed even a tiny fraction of the software they run, closed source or open source. | | | |
| ▲ | kemotep 6 hours ago | parent | prev | next [-] | | So you only run software on an operating system and on hardware that you have personally vetted each line of code for? | |
| ▲ | velcrovan 5 hours ago | parent | prev | next [-] | | Tell me about your auditing workflow and procedures. | |
| ▲ | eviks 4 hours ago | parent | prev | next [-] | | You don't understand because you compare a mythical view of the past with the current reality | |
| ▲ | knowitnone3 6 hours ago | parent | prev [-] | | [dead] |
|
|
|
| ▲ | jonas21 7 hours ago | parent | prev | next [-] |
| Isn't Little Snitch exactly the sort of application they're worried about? |
| |
| ▲ | 3eb7988a1663 6 hours ago | parent [-] | | Zing! The state of the world is such that I have started running everything inside VMs. Baseline OS install + virtual machine management and that is it. Which is still not immune, but makes me feel a lot better than core OS utilities are probably getting better vetting than nifty-utility-123 on which I depend. | | |
|
|
| ▲ | efreak 23 minutes ago | parent | prev | next [-] |
| I used to love Zone Alarm's ability to notify me on an application's first attempt to connect to the internet, and allow me to approve or deny it. I really wish there was still such an interface today. Having said that, I absolutely despised the implementation that stole keyboard focus; if it popped up when I was typing it frequently disappeared before I head a chance to read it and I had to go into settings to try and find what had changed. Nothing should ever steal keyboard focus unless it's urgent, and then it should website that you can't accidentally manipulate it with a keyboard (see UAC prompt where it opens in the background if the calling program is in the background, and where once you activate it, you have to hold alt+y/n or tab to a button before it accepts the input; just hitting the y/n key alone won't do anything). |
|
| ▲ | sjnonweb 3 hours ago | parent | prev | next [-] |
| Now you have to worry about Little snitch not "snitching" on all your traffic. |
| |
|
| ▲ | g947o 5 hours ago | parent | prev | next [-] |
| If an application wants to talk to AWS, how am I supposed to know if it's legit or not? |
| |
| ▲ | g-b-r 3 hours ago | parent [-] | | If it began doing it after an update, you know that it's better to check if it's supposed to do it |
|
|
| ▲ | 93po 6 hours ago | parent | prev [-] |
| because i dont want to deal with constant whitelist management and i simply don't install applications i don't trust. if there's anything really absolutely essential or damaging if it were to leak i would not put it on a internet connected device to begin with |