<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on Big Muddy</title><link>https://muddy.jprs.me/tags/security/</link><description>Recent content in Security on Big Muddy</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Sat, 28 Mar 2026 08:43:00 -0400</lastBuildDate><atom:link href="https://muddy.jprs.me/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Opt out of very new Python package versions with uv</title><link>https://muddy.jprs.me/notes/2026-03-28-opt-out-of-very-new-python-package-versions-with-uv/</link><pubDate>Sat, 28 Mar 2026 08:43:00 -0400</pubDate><guid>https://muddy.jprs.me/notes/2026-03-28-opt-out-of-very-new-python-package-versions-with-uv/</guid><description>&lt;p&gt;In light of several recent Python package compromises (&lt;a href="https://snyk.io/articles/poisoned-security-scanner-backdooring-litellm/"&gt;&lt;code&gt;litellm&lt;/code&gt;&lt;/a&gt;, &lt;a href="https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm"&gt;&lt;code&gt;telnyx&lt;/code&gt;&lt;/a&gt;), here is a useful tip from Hacker News commenter &lt;a href="https://news.ycombinator.com/item?id=47547140"&gt;mil22&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;For those using &lt;em&gt;uv&lt;/em&gt;, you can at least partially protect yourself against such attacks by adding this to your &lt;em&gt;pyproject.toml&lt;/em&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;[tool.uv]&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;exclude-newer = &amp;quot;7 days&amp;quot;&lt;/code&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;or this to your &lt;em&gt;~/.config/uv/uv.toml&lt;/em&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;exclude-newer = &amp;quot;7 days&amp;quot;&lt;/code&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;This will prevent &lt;em&gt;uv&lt;/em&gt; picking up any package version released within the last 7 days, hopefully allowing enough time for the community to detect any malware and yank the package version before you install it.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Commenter &lt;a href="https://news.ycombinator.com/item?id=47547405"&gt;notatallshaw&lt;/a&gt; follows up with how to achieve similar behaviour in *pip*:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Pip maintainer here, to do this in pip (26.0+) now you have to manually calculate the date, e.g. &amp;ndash;uploaded-prior-to=&amp;quot;$(date -u -d &amp;lsquo;3 days ago&amp;rsquo; &amp;lsquo;+%Y-%m-%dT%H:%M:%SZ&amp;rsquo;)&amp;quot;&lt;/p&gt;
&lt;blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;In pip 26.1 (release scheduled for April 2026), it will support the day ISO-8601 duration format, which uv also supports, so you will be able to do &amp;ndash;uploaded-prior-to=P3D, or via env vars or config files, as all pip options can be set in either.&lt;/p&gt;
&lt;/blockquote&gt;</description></item><item><title>Democratizing voice cloning scams</title><link>https://muddy.jprs.me/links/2026-02-18-democratizing-voice-cloning-scams/</link><pubDate>Wed, 18 Feb 2026 22:26:00 -0500</pubDate><guid>https://muddy.jprs.me/links/2026-02-18-democratizing-voice-cloning-scams/</guid><description>&lt;p&gt;Jamie Pine has launched Voicebox, a new voice cloning studio built upon the open weight &lt;a href="https://github.com/QwenLM/Qwen3-TTS"&gt;Qwen3-TTS&lt;/a&gt; model. The project is positioned as a free, local alternative to the well-known ElevenLabs voice generator. A &lt;a href="https://voicebox.sh/"&gt;short demo video&lt;/a&gt; is available.&lt;/p&gt;
&lt;p&gt;Obviously, there are legitimate uses for voice cloning technology. But in practice, this will be used to enable AI impersonation scams and spam on a massive scale. The GitHub page for this release isn&amp;rsquo;t exactly encouraging on this front. &lt;a href="https://github.com/jamiepine/voicebox/blob/eb2cd861b19baa16720fd31747071c187c054bc5/README.md"&gt;Demo screenshots&lt;/a&gt; show voice clones of YouTuber Linus Tech Tips, Minecraft creator Markus &amp;ldquo;Notch&amp;rdquo; Persson, and deceased streamer twomad.&lt;/p&gt;
&lt;p&gt;Make sure you have a secret passphrase set up with your family, since your voice is no longer uniquely your own.&lt;/p&gt;</description></item><item><title>How do you regain access to your computer if you lose your memory?</title><link>https://muddy.jprs.me/links/2026-02-07-how-do-you-regain-access-to-your-computer-if-you-lose-your-memory/</link><pubDate>Sat, 07 Feb 2026 22:05:00 -0500</pubDate><guid>https://muddy.jprs.me/links/2026-02-07-how-do-you-regain-access-to-your-computer-if-you-lose-your-memory/</guid><description>&lt;p&gt;I read this interesting discussion this morning on Hacker News on the question of how to regain access to your computer if you lose your memory. As always, it starts with figuring out your threat model and responding accordingly.&lt;/p&gt;</description></item></channel></rss>