Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)DR
drspod @lemmy.ml
Posts 8
Comments 293
Ryujinx Pulls Their Source Code From GitHub And Shuts Down
  • Isn't that exactly what copy protection is supposed to prevent? If you can read data from the cartridge and then put it on some other medium that still works in original hardware then what you've done is copied the game.

  • West should set its own red lines, not just accept Putin’s, argues veteran diplomat
  • I'm no "veteran diplomat" but in my experience it is only the people without real power who make threats. When you have power, you don't need to make threats. You just respond to events with whatever proportionate response is necessary and within your capability. You don't need to provide a preview of what those responses will be.

    Setting "red lines" looks to me like weakness because it is essentially a plea to the other side not to do those things that you don't want them to do, and it invites them to push up to those red lines, do anything but, and test their boundaries to test your commitment to them.

  • This is why it's not mainstream
  • Back in the 00’s we had to fiddle with ifconfig and friggin’ /etc/network by hand. Things have gotten a lot better.

    I was just thinking that I've never had any problems with either WiFi or Ethernet connectivity since NetworkManager became a standard part of modern distros. Before that I was having to install windows drivers with ndiswrapper and configure interfaces manually in ifup and ifdown scripts, and I haven't had to do that for at least 15 years now.

  • Asmongold Roasts the Weird Charracter Design in Dragon Age: The Veilguard: “This Is Just Awful”
  • I hate to be the one to break it to you, but railing against "forced diversity" is just a dog-whistle for rejecting actual diversity.

    Normal people don't actually care about it. If something is shit because it's badly written with bad character design then we say "it's shit because it's badly written and has bad character design," not "it's bad because it has women and minorities."

  • Crypto bros have discovered idle games, and the results are incredibly boring
  • You clicked the tree somewhere and it would tell you either to try again, or you would win something. I think most people who won got $5 and a monkey plush toy. I'm not sure anyone ever won the jackpot. You could just click over and over again trying to remember where you had previously clicked, like a treasure hunt. Meanwhile they're showing banner ads on the page.

    It worked using the ismap attribute on the image which tells the browser to add the x,y coordinates of the user's click to the link when fetching the result.

  • I'm seeing "just a moment" in the first box below article title
  • Isn't it the Cloudflare bot detection page that says "Just a moment" (... while we check that you're human)?

    It's probably because lemmy servers are constantly loading a bunch of websites to generate previews and Cloudflare decides that those clients look like bots.

  • A chat app using state-of-the-art cryptography
  • I read the source code and this is a hobby-project that you could write in an afternoon with no knowledge of cryptographic protocols.

    There are dozens of obvious deficiencies even to me and I am no expert in cryptography. An easy example to point out is that there is no input validation and no error checking or exception handling. Both the client and server just assume that the other side is a well-behaving correct implementation.

    The author should not be posting this around as if it's a serious tool for people to use. If anything it's a starting point for OP to get advice from experts on how real systems do this properly. I'd recommend that the author spends a LOT of time reading before doing. There are numerous design documents of real systems and protocols, and some good comprehensive books too.

  • Revival Hijack supply-chain attack threatens 22,000 PyPI packages

    > Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks. > > The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

    If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

    This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

    Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

    It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

    1

    have you ever had a rule

    30

    Vladimir Kramnik admits to VIOLATING Fair Play Policy

    Description: "Featured is a playthrough of a blitz chess game between Rodrigo Vasquez and Vladimir Kramnik from an Early Titled Tuesday event which was held on October 17th, 2023. Kramnik recently admitted, via a YouTube comment on this topic of fair play surrounding him, that he played several tournaments under someone else’s chess\.com account. This act violates chess\.com’s Fair Play Policy. Kramnik played under Denis Khismatullin’s account, “Krakozia”. I share reasons why this is a violation of fair play policy, how a player can be negatively impacted because of it, and provide Kramnik’s YouTube comments where he attempts to explain it all."

    0

    Malicious Google Search Ads can now fake the displayed URL to push malware downloads

    cross-posted from: https://lemmy.ml/post/4912712

    > Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users. > > If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware. > > Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place! > > !

    16

    Malicious Google Search Ads can now fake the displayed URL to push malware downloads

    Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

    If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

    Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

    !

    24

    Free Download Manager site redirected Linux users to malware for years

    A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

    The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

    Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

    60
    Lemmy Support @lemmy.ml drspod @lemmy.ml

    My previous post does not appear in the (local) community that I posted it to

    [SOLVED]: The issue was caused by having "Show read posts" unticked in Settings. This will hide your own posts from you!

    I recently made a post[1] to this community about a bug that I experienced and reported.

    The post does not appear in the New feed for /c/lemmy_support nor does it appear in my user profile under Posts [2].

    However the post does have 3 replies (from users on multiple different instances) which means that other users can see it across the fediverse, so it's not a federation issue. (Also, my account and the community are both hosted on the same instance - lemmy.ml).

    I was not subscribed to /c/lemmy_support at the time I made that post, but I am subscribed now to see if that affects my visibility of this post.

    Is this a bug, or am I misunderstanding how lemmy works?

    Interestingly, if I view my profile while logged out, it does show the posts that I made, but when logged in it shows zero posts in my profile.

    [1] https://lemmy.ml/post/1394597

    [2] !

    10
    Lemmy Support @lemmy.ml drspod @lemmy.ml

    Another user's name is appearing on my lemmy.ml front page

    github.com [Bug]: Lemmy.ml - profile menu had another user's username · Issue #1375 · LemmyNet/lemmy-ui

    Requirements Is this a bug report? For questions or discussions use https://lemmy.ml/c/lemmy_support Did you check to see if this issue already exists? Is this only a single bug? Do not put multipl...

    [Bug]: Lemmy.ml - profile menu had another user's username · Issue #1375 · LemmyNet/lemmy-ui

    See the images attached to the linked bug report. Where it usually says my username in the top-right, another user's name appeared. This happened twice in the last two days.

    I submitted the bug to the lemmy-ui project, but I'm not certain if this is a lemmy-ui problem, or a problem with the specific infrastructure setup of lemmy.ml, or even a backend issue.

    Any advice on whether I should post this bug report to somewhere else for greater visibility would be welcome. This could be indicative of a fairly serious security issue (or it could be a completely cosmetic bug).

    2