What aspects of image preparation workflows can lead to accidents like Boris Johnson’s No. 10 tweet’s ‘hidden message’?

The BBC reports that the image Boris Johson posted on Twitter to congratulate Joe Biden contains traces of the text "Trump" in the background. The BBC article links to a Guido Fawkes’ article, and when I download the tweet’s JPEG… Continue reading What aspects of image preparation workflows can lead to accidents like Boris Johnson’s No. 10 tweet’s ‘hidden message’?

Posted in Uncategorized | Tagged

Even More Firmware in your Firmware

There are many ways to update an embedded system in the field. Images can fly through the air one a time, travel by sneaker or hitch a ride on other passing data. OK, maybe that’s a stretch, but there are certainly a plethora of ways to get those sweet update …read more

Continue reading Even More Firmware in your Firmware

Putting the Firmware in your Firmware

Performing over-the-air updates of devices in the field can be a tricky business. Reliability and recovery is of course key, but even getting the right bits to the right storage sectors can be a challenge. Recently I’ve been working on a project which called for the design of a new …read more

Continue reading Putting the Firmware in your Firmware

Potential vulnerability in JSON response returning base 64 encoded image data, with the response being vulnerable to MIME sniffing

A JSON response in the API of a webapp is returning the base64 of a user-uploaded image, and there’s no X-Content-Type-Options Header to prevent MIME sniffing.
Could this be a potential vulnerability such as an XSS for the webapp by using … Continue reading Potential vulnerability in JSON response returning base 64 encoded image data, with the response being vulnerable to MIME sniffing

If malware can be attached to an image file, then why aren’t images a common attack vector?

For example, if someone uploads a malicious image on website like Instagram or Facebook, and then hundreds of people viewed this image, wouldn’t that be an easy way to infect the devices of hundreds or thousands of people? If so, why do pe… Continue reading If malware can be attached to an image file, then why aren’t images a common attack vector?