henfredemars

joined 1 year ago
[–] [email protected] 9 points 12 hours ago (1 children)

I wish this was a thing when I was writing application essays. They’re a great example of virtually meaningless content that needs to fit a certain shape.

LLMs are great at generating exactly this type of garbage.

[–] [email protected] 3 points 12 hours ago (2 children)

Hey, I thought it was already funny without the last panel!

[–] [email protected] 84 points 14 hours ago (3 children)

It's a shame that stupid people are so easily manipulated. We shouldn't be so permissive and accepting of blatant lies.

[–] [email protected] 2 points 1 day ago

Really cool! I didn’t know the name comes from the same phenomenon as will-o-wisps.

[–] [email protected] 30 points 1 day ago

One should not be able to waive one’s rights.

[–] [email protected] 15 points 2 days ago (4 children)
[–] [email protected] 57 points 2 days ago (2 children)

Like I needed another reason with this guy.

It's astounding how one person manages to be so deeply unlikable.

[–] [email protected] 199 points 2 days ago (9 children)

Can we please stop with the privitization? It's absolutely not been working out very well for the people.

[–] [email protected] 8 points 2 days ago

You’d think at some point they would learn their lesson but they seem to love footing the bill.

[–] [email protected] 5 points 2 days ago

I thought I was told just a year or two ago it was supposed to be the future of manufacturing.

[–] [email protected] 14 points 2 days ago* (last edited 2 days ago) (1 children)

It is highly unlikely that you have malware sophisticated enough to do something like compromise installation media (already exceedingly rare) yet not sophisticated enough to bypass secure boot.

The purpose of secure boot is to verify that the boot loader and kernel are approved by the manufacturer (or friends of such). There are certainly ways to inject software into a system that doesn’t reside in those locations. It just makes boot sector viruses and kernel mode rootkits slightly more technically challenging to write when you can’t simply modify those parts of the operating system directly. If malware gets root on your installation it’s game over whether or not you have secure boot enabled. Much of the software on a computer is none of those things protected by secure boot.

Plus, take another wager: most systems today ship with secure boot enabled. If you were a malware author, would you still be writing malware that needs secure boot turned off to run? Of course not! You would focus on the most common system you can to maximize impact. Thus, boot sector viruses are mostly lost to time. Malware authors moved on.

Overall, it’s a pretty inconsequential feature born of good intentions but practically speaking malware still exists in spite of it. It’s unlikely to matter to any malware you would find in the wild today. Secure boot keys get leaked. You can still get malware in your applications. Some malware even brings its own vulnerable drivers to punch into the kernel anyway and laugh in the face of your secure boot mitigation. The only thing secure boot can actually do when it works is to ensure that on the disk the boot loader and kernel look legit. I guess it kind of helps in theory.

[–] [email protected] 19 points 3 days ago* (last edited 3 days ago)

This is good advice in general. Think of it like penetration testing. You really should verify what you can actually access remotely on a device and not assume you have any level of protection until you’ve tried it.

Log files can also contain signs of attack like password guessing. You should review these on a regular basis.

 

This article goes into more detail about how these new measures will actually work compared to the blog post earlier this year from Google. Namely:

  1. Enabling the OEM unlocking setting will no longer prevent FRP from activating.
  2. Bypassing the setup wizard will no longer deactivate FRP. FRP restrictions will apply until you verify ownership of the device by signing in.
  3. Adding a new Google account is blocked.
  4. Setting a lock screen PIN or password is blocked.
  5. Installing new apps is blocked.
 
50
Adding 16 KB Page Size to Android (android-developers.googleblog.com)
 

In this post, we’ve discussed the technical details of how we are restructuring memory in Android to get faster, more performant devices. Android 15 and AOSP work with 16 KB pages, and devices can now implement 16 KB pages as a development option.

 

Save a few words. Make life easier. How can this possibly go wrong?

 

I have a large DVD collection containing lots of niche titles that don’t appear to be on any public tracker. I would like to share my love of these films with the world.

I have access to a server that’s online 24/7 with a symmetric link and no data cap. My plan is to use a docker container with a web transmission instance to seed all of my material through a VPN provider (for my own safety). My server was last rebooted 200 days ago; I intend to rack lots of uptime seeding with my server. I have technical skills and I can ensure I’ll have an open port to accept connections.

Questions: what steps should I take to protect myself in seeding these DVDs? Is there a guide or some recommendations you can provide to get the best quality out of the many hours I’m going to spend ripping? Is it possible to trace the DVD reader that made the rip? Are the cool kids still uploading torrents or is there a better technology I should be using?

Overall, I have plenty of content to share, but I don’t want to put myself at risk when I do.

 

Article refrains from drawing conclusions, instead presenting the data. Android is doing better at moving users to newer versions, but the overwhelming majority of users don't have the current Android OS version nor the previous version, combined.

 

Bullet points stolen from the linked article:

  • Code suggests the satellite connectivity feature on Pixel devices could be called “Pixel Satellite SOS.”
  • We’ve also found a clue suggesting that the feature will be offered for free for two years, which would match Apple’s current offer on the iPhone 14 and 15 series.
 

I want to share this post because I was disappointed to see this popular smartphone cracking tool works very well across Android versions and devices while iPhone enjoys relative security.

The graphic also shows premium devices specifically are vulnerable to their tools, so one cannot argue that the problem is funding or cheap devices getting owned because of dumb changes by the vendor -- premium devices fare not much better. Even Google controlling the hardware and the software of their Pixel line remains vulnerable to data extraction while the latest iPhone versions aren’t.

To me, this sounds like the state of Android physical security might be inferior. Why? What can be done to fix this? Perhaps is it because Android is more popular globally so they get more work targeting Android?

It could also be coincidental that at the time the documents leaked, the iPhone stuff was being finished up and there is actually not that much difference if you have an attacker who has lots of time and money.

EDIT: Removed wrong information. EDIT: Added more material for discussion.

 

So much pony on the canvas! Where are all you guys and gals coming from? MLP has always seemed fairly quiet on the fediverse, but the proof is in the pudding, apparently!

It warms my old, nerdy heart.

view more: next ›