![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://lemmy.ml/pictrs/image/q98XK4sKtw.png)
This should have been much more well thought out The wording, image, buttons, specific wording for each page.
They really screwed the pooch.
Another 4-6 months minimum before release. But quarterly numbers must be met.
This should have been much more well thought out The wording, image, buttons, specific wording for each page.
They really screwed the pooch.
Another 4-6 months minimum before release. But quarterly numbers must be met.
wget toteslegitdebian.app/installer.sh & chmod +x && ./installer.sh
was I not supposed to do that? but staxoverflown said it’s OK.
That does go a long way towards explaining why there are so many Bluetooth vulnerabilities, thanks for the info. Looking at the list of Bluetooth protocols wiki page gives me a headache. Surely there is a better standard, and I see things like HaLow, ZigBee, Z-Wave and other custom protocols, but it seems like there should be a very cleanly well-documented alternative to do the basics that everyone expects BT to do. This, coming from a total noob, speaking completely out of my anus. I just know that as a BT user, it’s a crapshoot whether there will be major audio delay, and pause/play actually worked, that’s if pairing works in the first place. But if something did come along I wonder if there would even be adoption among consumer devices.
Is it true the Bluetooth network stack is larger than the WiFi network stack? If so, why? I don’t know much about BT besides pairing, allowing calls and audio in/out, transferring files, and… is there more? It takes a day of reading documentation to understand all the advanced options on my ASUS router interface, and that’s without anything proprietary.
I’m just surprised and curious and never got a satisfying answer.
Honeypot? Dunno. Good discussions about it on hacker news.
And have eyes good enough to look very closely and detect any small . or `s that are out of place, and be current on all methods of sanitization, catching any and all confusing variable names doing funny things, and never getting mentally overloaded doing it.
I wouldn’t be surprised at all if teams at NSA & co had game months where the teams that find the highest number of vulns or develop the most damaging 0day exploits get a prize and challenge coin. Then you have the teams that develop the malware made to stay stealthy and intercept data for decades undetected, and the teams that play mail agent and intercept packages containing core internet backbone routers to put hardware ‘implants’ inside them.
These are the things Snowden showed us a small sliver of in 2013, over a decade ago, some of which was well aged by that point.
The days of doing illegal things for funsies on the internet, like learning how to hack hands-on, are over if you don’t want to really risk prison time. Download vulnerable virtual machines and hack on those.
But if you’re worried about a random maintainer or packager inserting something like a password stealer or backdoor and letting it hit a major distro with a disastrous backdoor that doesn’t require a PhD in quantum fuckography to understand, chances are likely big brother would alert someone to blow the whistle before it hit production, as they likely did with xzutils.
Chances are this is a kid or NEET and all his friend wants is a super simple website with basic info for his local business. Dad is either doing him a favor, or giving him some pocket change so he’ll stop bothering him for money for a month. This is what happens when you don’t teach your children to be adults, and give them everything instead. Seen it too many times.
Based on this interaction alone and his dad deciding the price for him, I’m going to make the wildly assumptious assumption this is a 20s/30s(/40s?) unemploymed guy living at his dad’s house rent free.
If my assumptions are incorrect, sorry mate, you did not win the dad lottery.
That was supposed to be or, not of.
In turn it compromises ssh authentication allows remote code execution via system(); if the connecting SSH certificate contains the backdoor key. No user account required. Nothing logged anywhere you’d expect. Full root code execution.
There is also a killswitch hard-coded into it, so it doesn’t affect machines of whatever state actor developed it.
It’s pretty clear this is a state actor, targeting a dependency of one of the most widely used system control software on Linux systems. There are likely tens or hundreds of other actors doing the exact same thing. This one was detected purely by chance, as it wasn’t even in the code for ssh.
If people ever wonder how cyber warfare could potentially cause a massive blackout and communications system interruption - this is how.
What are we talking about here?
Emotional detachment of things one has no personal involvement in, in order to see the situation as clearly as possible. If you are living in Gaza or have family or a good friend there then yes it’s much harder and maybe nearly impossible. I can also understand the need for emotional attachment to feel purpose by campaigning against something, but again, attachment is the enemy of objectivity.
It’s impossible to avoid bias completely. It’s very much possible to recognize your bias and train yourself to have emotional detachment from a given subject. Ask a Buddhist monk, or a seasoned intelligence analyst.
Philosophical ramble below, you can stop reading here if you’re not in the mood.
Most people unfortunately never get to the stage of realizing they can detach themselves from emotional bias, so they read and believe whatever they have already read and believe and want to be true.
Side note: it’s much easier when you’re on the spectrum, or learned as a child to shut your emotions off (I’m not sure this can be learned in adulthood). It seems like many victims of childhood abuse take it in the other direction - emotional overreaction.
I’m quite positive going to Russia would be dangerous for me regardless of my ethnicity or background 😄. They really do have some neat brutalist art and architecture, but I can see that from the safety of my couch with Bald & Bankrupt.
I’m a Russian spy, and the FBI agent is pulling out their identification when questioning me.
Fully agree. I’m taking a trip to Russia soon. It’s my families homeland, such a beautiful country with a rich history. People keep calling me a spy, and it’s hurtful, especially when they pull out their identification. – Jokes aside I really do agree. Internet culture has come up with some of the greatest, and dumbest, collectivist thoughts and this meme is a great example of the latter.
Mama always said, two wrong ain’t make a right. My father said that complex geopolitical games are not won with bias, but with detached foresight.
Is docker virtualized or otherwise emulating something? It’s just a way to package things, like an installer? Then it’s bare metal.
I had to look this up too, I thought docker containers were virtualized.
I assume the problem is hardware. Matt’s hardware didn’t work well with LM, therefore Matt thinks LM sucks… I do wish there was better hardware support but it’s the reason apple went with 1 product = 1 OS = 1 general set of hardware. Sure not every iPhone has the same hardware, but that’s why they have the model numbers, and it’s so much easier to test 200 model mixes than 2,000,000 (Android). Windows gets all the debug info sent directly to them like the others but they also have a huge stack of hardware they can use or they can buy it to test.