bestov.io

a tech bläg

A security post-mortem & the (shamefully) flimsy security of Meta, Inc.

Andrea has a small content creation business. They’re what the youngsters call an influencer, and as such, among their equity, they possess very valuable social accounts with a valuable follower count. A few days ago, one of those accounts was hacked, using a classic vector: a stolen password, either leaked or phished, combined with 2FA phishing. This article is a post-mortem (and in a way a post-vitae), showing what we did to recover access to the account, and to secure it...

Streaming video with commodity links, part 2: let's (try to) do it (and fail)

In the previous installment of the series, we analyzed the problem of near-istantaneous Internet connection failover without breaking existing connections for live video streaming. The solution we devised consists in setting up L2 GRE tunnels to a fixed gateway with a very reliable internet connection (think a dedicated machine in a datacenter), and using the Linux Bonding Driver’s link monitoring functionality to manage the failover for us. Now we are going to try and make it work...