archomrade

joined 1 year ago
[–] [email protected] 4 points 4 hours ago

Facebook, Instagram, Twitter, Reddit....

[–] [email protected] 7 points 12 hours ago

Uhhh, because these were bombs - bombs that were remotely and indiscriminately detonated. Some of the people were driving, some standing next to children or on busses full of people. There are reports of children who died because they were standing next to a target at head-level with the pager.There's no guarantee they were even being carried by "Hezbollah's guys".

I don't even know why anyone would assume otherwise. This was a loosely targeted terror attack

[–] [email protected] 27 points 21 hours ago (5 children)

Likely because the bulk of those wounded by this attack were not Hezbollah

I don't even know how you'd reasonably expect to only injure your targets in an attack as widespread and remote as this one. Seems blatantly indiscriminate at best.

[–] [email protected] 24 points 1 day ago (11 children)

I'm honestly surprised peertube has lasted as long as it has as it is

[–] [email protected] 2 points 4 days ago

Who are you responding to, bud?

[–] [email protected] 4 points 5 days ago (2 children)

Meanwhile billionaires are still laughing at the poors fighting each other thinking one job is better than other or villifying entire professions still.

Landlording isn't a job.

[–] [email protected] 6 points 1 week ago

I wish people would stop comparing those uses of copyright to nonprofits like Internet Archive

While I understand AI training exemptions to copyright are controversial, and think most people here would side with IA on ebook lending.

[–] [email protected] 0 points 3 weeks ago* (last edited 3 weeks ago)

It depends on the attack vector. Typically you're right, but malicious .lnk files are often paired with other malicious methods to infect machines. Sometimes they're configured as a worm that copies and spreads when a flash drive is connected, sometimes they're configured to download a remote payload when another script or program is started. The problem is that it's a type of file that's often overlooked because it seems innocent.

It isn't necessarily the case that the Trojan needs to be interacted with by the user in order to execute the malicious code. Just having the file on your machine opens the door for all kinds of attacks (especially if you're using a headless setup: you wouldn't necessarily know you have the .lnk file in the system unless you're manually unpacking your downloads yourself). All it needs is for another piece of infected code to run and look for that file, and it can open the door for more traditional malicious code.


Edit: just as a for-instance - If I was a black hat and wanted to spread some malicious code, I could include this .lnk file in a torrent (innocuous enough to slip by unnoticed by most people/unscrupulous pirates), and then maybe place a line of code in a jellyfin plugin or script that looks for that file and executes it if it's found. Because the attack isn't buried in the plugin or script itself (most people wouldn't think much of a line of code that's simply pointing to temp file already on your system), it could theoretically go unnoticed for long enough to catch a few hundred or thousand machines.

[–] [email protected] 8 points 3 weeks ago (2 children)

I believe the torrent included both an .mkv and a malicious .lnk file.

.lnk files are dangerous because they can evade detection and automatically open other files or executable on a computer; AFAIK you would not have had to open the .lnk file yourself.

[–] [email protected] 5 points 3 weeks ago (1 children)

Libs just so badly want to be left alone

[–] [email protected] 0 points 3 weeks ago

If you put up any guards at all against data tracking, they get pretty bad pretty quick. They get skewed toward the one or two datapoints that you didn't shore up, so they think "huh, this user must really like phone games because they played doodlejump in 2016 and still has it installed on their phone". Or at least I think. My wife gets ads that are far more on-the-nose than I do, but she doesn't lock down her tracking data at all.

But I don't even like them trying to match me to ads, I don't want to incentivize their data collection practices.

 

edit: a working solution is proposed by @[email protected] below:

So you’re trying to get 2 instances of qbt behind the same Gluetun vpn container?

I don’t use Qbt but I certainly have done in the past. Am I correct in remembering that in the gui you can change the port?

If so, maybe what you could do is set up your stack with 1 instance in, go into the GUI and change the port on the service to 8000 or 8081 or whatever.

Map that port in your Gluetun config and leave the default port open for QBT, and add a second instance to the stack with a different name and addresses for the config files.

Restart the stack and have 2 instances.


Has anyone run into issues with docker port collisions when trying to run images behind a bridge network (i think I got those terms right?)?

I'm trying to run the arr stack behind a VPN container (gluetun for those familiar), and I would really like to duplicate a container image within the stack (e.g. a separate download client for different types of downloads). As soon as I set the network_mode to 'service' or 'container', i lose the ability to set the public/internal port of the service, which means any image that doesn't allow setting ports from an environment variable is stuck with whatever the default port is within the application.

Here's an example .yml:

services:
  gluetun:
    image: qmcgaw/gluetun:latest
    container_name: gluetun
    cap_add:
      - NET_ADMIN
    environment:
      - VPN_SERVICE_PROVIDER=mullvad
      - VPN_TYPE=[redacted]
      - WIREGUARD_PRIVATE_KEY=[redacted]
      - WIREGUARD_ADDRESSES=[redacted]
      - SERVER_COUNTRIES=[redacted]
    ports:
      - "8080:8080" #qbittorrent
      - "6881:6881"
      - "6881:6881/udp"
      - "9696:9696" # Prowlarr
      - "7878:7878" # Radar
      - "8686:8686" # Lidarr
      - "8989:8989" # Sonarr
    restart: always

  qbittorrent:
    image: lscr.io/linuxserver/qbittorrent:latest
    container_name: "qbittorrent"
    network_mode: "service:gluetun"
    environment:
      - PUID=1000
      - PGID=1000
      - TZ=CST/CDT
      - WEBUI_PORT=8080
    volumes:
      - /docker/appdata/qbittorrent:/config
      - /media/nas_share/data:/data)

Declaring ports in the qbittorrent service raises an error saying you cannot set ports when using the service network mode. Linuxserver.io has a WEBUI_PORT environment variable, but using it without also setting the service ports breaks it (their documentation says this is due to CSRF issues and port mapping, but then why even include it as a variable?)

The only workaround i can think of is doing a local build of the image that needs duplication to allow ports to be configured from the e variables, OR run duplicate gluetun containers for each client which seems dumb and not at all worthwhile.

Has anyone dealt with this before?

 

Anyone else get this email from Leviton about their decora light switches and their changes to ToS expressly permitting them to collect and use behavioral data from your devices?

FUCK Leviton, long live Zigbee and Zwave and all open-sourced standards


My Leviton

At Leviton, we’re committed to providing an excellent smart home experience. Today, we wanted to share a few updates to our Privacy Policy and Terms of Service. Below is a quick look at key changes:

We’ve updated our privacy policy to provide more information about how we collect, use, and share certain data, and to add more information about our users’ privacy under various US and Canadian laws. For instance, Leviton works with third-party companies to collect necessary and legal data to utilize with affiliate marketing programs that provide appropriate recommendations. >As well, users can easily withdraw consent at any time by clicking the links below.

The updates take effect March 11th, 2024. Leviton will periodically send information regarding promotions, discounts, new products, and services. If you would like to unsubscribe from communications from Leviton, please click here. If you do not agree with the privacy policy/terms of service, you may request removal of your account by clicking this link.

For additional information or any questions, please contact us at [email protected].

Traduction française de cet email Leviton

Copyright © 2024 Leviton Manufacturing Co., Inc., All rights reserved. 201 North Service Rd. • Melville, NY 11747

Unsubscribe | Manage your email preferences

 

Pretend your only other hardware is a repurposed HP Prodesk and your budget is bottom-barrel

 

Does anyone know if this enables any kind of tracking (either through WiFi device logging or network activity)? I've typically used my own networking modems and routers, I'm a little weary of a required smart device that I don't have control over.

So far I haven't been able to find much information beyond what's available from century-link

view more: next ›