security – Samsung Galaxy Note 10+ 5G – cellebrite mobile forensics data extractions – locked with pattern

I’ve got a locked Samsung Galaxy Note 10+ 5G (running the latest android 10 and patches)

The phone is locked with a pattern (unknown)

What are my chances of any data extraction with cellebrite or other forensics tools while I can not unlock the phone?

Also how secure is Knox efuse? will it damage the phone/data when an untrusted bootloader is detected?

security – New file on my mack with odd customer permissions. Have I been hacked?

So today I was looking for something on my MacBook Pro and saw folder called library with the customer permissions.

It seems like it has to permissions, systems (read, write) and everyone no access.

I expanded the permissions so that I could view it. However it seems to have an empty folder inside. the empty folder has the same permissions.

The Folder is located in my iCloud > Documents folder and is called Library and the folder inside of it is also Logs.

Additionally I can see that the file was created two days ago.

Moreover, I have all sharing services turned off on may systems preferences > sharing.

There is no user profile currently under the name of systems in systems preferences > users & groups.

Why do I have a new file with custom permissions. Have I been hacked? Is there something I can check to see if there is something wrong going on?

(also got an email recently saying someone tried to reset a bestbuy password but that my be irrelevant for this)

security – Vulnerability Concern From the Plugin or From Not Updating the Plugin?

Our company website has over 40 plugins. That is a lot…way too many. However, each plugin serves a purpose.

When updating all plugins to the recent version we noticed parts of the website break. Yoast stops working, pagination stops working, the slider stops working, and so on…

I spoke with a friend that is a developer at a marketing company and they handle over 100 websites. They do not worry about updating the plugins for that very reason…things break.

Since a plugin is already installed on the website, is it really necessary to worry about updating all 40+ plugins?

Whether the plugin is active or not, in theory shouldn’t we worry more about the plugin itself, and not so much if it is on the most recent version?
I would think that if a malicious attack came through a plugin, it would not be because it was not on the most recent version, but from the plugin itself using hooks to run special purpose code.

security – Karabiner-Elements cannot open new Terminal window unless Terminal already in focus

I am on Catalina 10.15.7 and use Karabiner-Elements 13.3.

When I use the rule shown below for opening Terminal nothing happens unless Terminal is in focus (you can see Terminal on the menu bar).

Seems like something to do with security permissions. When I run the script itself from within iTerm (not Terminal) I got a pop up asking for allowing “access to control”. Once accepted the shortcut worked when either Terminal or iTerm was in focus.

Obviously I want the shortcut to work regardless of what is in focus. How to achieve that?

{
  "title": "Open Terminal",
  "rules": (
    {
      "description": "Open Terminal",
      "manipulators": (
        {
          "type": "basic",
          "from": {
            "modifiers": {
              "mandatory": (
                "left_control",
                "left_alt"
              )
            },
            "key_code": "t"
          },
          "to": (
            {
              "shell_command": "osascript -e 'tell app "Terminal"' -e 'do script "tmux"' -e 'end tell'"
            }
          )
        }
      )
    }
  )
}

security – Are “coin mixers” actually a real thing? Can they be trusted?

Ever since I started hearing about Bitcoin, people have been mentioning “coin mixers” to me, and told me to use them. However, even early on, when they were practically throwing away Bitcoins to the left and to the right for anyone to grab, due to their low market price, these always seemed fishy to me.

I just couldn’t trust them, even for small amounts of Bitcoin. Certainly not with all my coins.

Today, I just could never trust such a service to do anything but simply steal my coins and don’t do anything besides keeping them.

At the same time, I really want privacy. I’ve paid such extra margins for all these years for purchasing Bitcoin in a “P2P” manner, but my name/identity is still known by various individuals with whom I have traded or purchased goods from.

When I start my Bitcoin service, I will necessarily have to send some Bitcoin out to customers every now and then. And then it will pick “pieces” from my wallet which are known to be tied to me! And that will violate my privacy. But I can’t risk losing them entirely, or pay even more than what I’ve already lost from paying all these extra costs and not to mention the huge transaction fees that the Bitcoin network itself charges. Extra fees for “mixing” the coins is more or less unthinkable.

Are these really a thing? Or just another scam? How can I trust them? Do you all use them? Why wasn’t this feature simply built into Bitcoin and automated?

email – Automatic OCR Document Capture Security Risks

We have recently implemented an automated OCR, email scanning program that connects to our exchange email service, This service will open attached invoice and insert them into our accounting software program automatically. This program is installed and run on one of our VM’s on the same subnet as our production machines.

The company implementing has asked for us to bypass our exchange spam and malware filters for the email addresses used for this service. My question is if someone sends an email with malicious content either within the HTML or PDF its self, would this actually cause the malicious code to execute and what other security risks could this create?