• Cephalotrocity@biglemmowski.win
    link
    fedilink
    English
    arrow-up
    26
    ·
    2 days ago

    They also suggest organizations deploy additional security layers beyond Windows Defender, particularly solutions that can monitor behavior at the kernel level.

    Anything like this for the typical home user?

    • 0x0@lemmy.zip
      link
      fedilink
      English
      arrow-up
      30
      arrow-down
      1
      ·
      2 days ago

      Sure, bring back Crowdstrike, that went well…

      Btw I wasn’t aware XOR was encrytion…

      • Neverclear@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        21
        ·
        edit-2
        2 days ago

        XOR cleartext once with a key you get ciphertext. XOR the ciphertext with the same key you get the original cleartext. At its core this is the way the old DES cipher works.

        A bit of useful trivia: If you XOR any number with itself, you get all zeros. You can see this in practice when an assembly programmer XOR’s a register with itself to clear it out.

        • Quazatron@lemmy.world
          link
          fedilink
          English
          arrow-up
          13
          ·
          2 days ago

          That’s how it was done in the old days to save a few cycles in Z80 assembly. XOR A instead of LD A, 0.

        • PetteriPano@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          2 days ago

          Apple had this undocumented function for screenshotting back on iOS 3.1, and kind of let you use it while waiting for better frameworks in iOS 4.0

          At some point they started rejecting your app automatically if they found the symbol for that function in your app. I didn’t want to leave my 3.1 users in the dust for no reason, so I did the same trick to obfuscate the symbol name before dynamically linking it in.

          It worked right up until they stopped supporting iOS 3.1 completely.

        • Malfeasant@lemm.ee
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          2
          ·
          edit-2
          2 days ago

          an x86 assembly programmer

          Ftfy. not all CPUs have an xor register with itself instruction.

          • Q*Bert Reynolds@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 day ago

            There are a lot more architectures than just x86 that are capable of XORing a register with itself (ie. ARM and RISC-V), and if you took OP to mean the accumulation register specifically, pretty much all CPUs going back as far as I can think have had that functionality.

      • Zwuzelmaus@feddit.org
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        1
        ·
        2 days ago

        Btw I wasn’t aware XOR was encrytion…

        It’s even better than ROT13, because you always need to apply ROT13 twice for getting the good results…

  • ilmagico@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    2 days ago

    According to the research published by Hackmosphere, […]

    I cannot find a link to the original research, anybody has the link to the original research?

  • mbirth@lemmy.ml
    link
    fedilink
    English
    arrow-up
    10
    ·
    2 days ago

    Wasn’t there something a few months ago about Microsoft handing out secret API calls to developers of other antivirus products so they can quietly disable Defender during the installation of their product? Some guy had this reverse engineered from an installer…