this post was submitted on 07 Apr 2025
28 points (100.0% liked)

Cybersecurity

6978 readers
89 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 4 days ago* (last edited 4 days ago) (1 children)

Most if not all file systems have features that include metadata. For example, ext4 will have a create and modify timestamp, as well as permissions on the file and ownership of the file. Fat also has timestamps but they are less precise. Zfsbootmenu uses zfs metadata to find your key file for encryption.

Your gut reaction of "metadata is over-complication" is not only bizarre (metadata is extremely common in file systems as well as for a variety of file formats - try using musicbrainzpicard without metadata), but makes you look very petulant.

[–] [email protected] 1 points 4 days ago (1 children)

Most file systems have a very limited footprint of metadata. Static information. And they are usually following basic POSIX standards, to ensure that file transfers between mediums are as cross-compatible as possible.

This Alternative Data Stream is now creating this entirely new variable data stream for hackers to hide shit in. No longer can just you scan a file's data to make sure nothing malicious is in there. Now you need complex logic to be able to both read this new stream, interpret the flags and other metadata, and take all of those different pieces of information and figure out if it's even worth opening the damn file.

Data is data. Keep data in the data layer. Everything else is secondary, and should be kept tiny.

[–] [email protected] 1 points 4 days ago

So you acknowledge metadata is useful but you draw a line because you think it's too much metadata? Or just the wrong kind, because the POSIX standard is the defining document for your life, a set of rules so perfect that nobody need add functionality past that standard?