fubo

joined 1 year ago
[–] [email protected] 9 points 5 days ago
  • Margaret "Peg" M. Harder
  • Joy S. Cummings
  • Mona Little
[–] [email protected] 6 points 6 days ago (2 children)

I think Odyssey is a pretty cool guy. Eh trojans hores and doesnt afraid of anything.

[–] [email protected] 10 points 1 week ago

Fun fact: While mudita is Pali for "vicarious joy", it's also Spanish for "little mute girl".

[–] [email protected] 12 points 1 week ago (1 children)

You don't kill zombies; a zombie is already dead. You wait for or reap zombies. (A zombie process is just a process table entry with its exit status; it goes away once the parent process has read that exit status.)

[–] [email protected] 154 points 1 week ago* (last edited 1 week ago) (16 children)

If your kids' school laptops are surveilled, they're surveilled by someone. Let's call that someone Joe. Joe is a person who took a low-paying job that lets him surveil your kids. Joe likes his job, because he gets to surveil your kids. He gets to turn on the camera and look in your kids' room. He gets to read the chat messages your kids send to their classmates.

Your kids would be better off without Joe in their lives. Joe is not a source of security. Joe is not protecting your kids; Joe is a threat to them.

[–] [email protected] 2 points 2 weeks ago

I'm gonna smoke me a Mary J. Wana
Y'all ain't can stop me, I'm totally gonna
Bake me a stoned like a sunny iguana
I'm gonna smoke me a Mary J. Wana

I'm gonna hash pipe to high me my head
Mellow my jello from born until dead
Teq' me no 'quila, no pills blue and red
I'm gonna hash pipe to high me my head

I'm gonna weed me some grassical pots
Look you my dime bag 'cause that's what I gots
Ain't gonna shoot me no heroin shots
Just gonna weed me some grassical pots

[–] [email protected] 10 points 2 weeks ago (7 children)

Pot, weed, grass, ganja, herb, trees, green, chronic, reefer, doobage, dagga, dank, tea, ...

[–] [email protected] 17 points 2 weeks ago (1 children)

It's from a political cartoon depicting a corrupt districting plan as a salamander.

[–] [email protected] 39 points 3 weeks ago (4 children)

“A story shared by Jack Dorsey, the founder of Twitter, uncovered that the current leaders of Signal, an allegedly ‘secure’ messaging app, are activists used by the US state department for regime change abroad,” Durov wrote on his own Telegram channel.

In fact, the folks running Signal — notably Moxie Marlinspike and Meredith Whittaker — have a long history of effective security & privacy activism. Whittaker was one of the organizers of the Google Walkouts, one of the more effective pieces of tech worker activism in recent history. And Moxie has bumped heads with the US intelligence community more than once, and famously with the Saudis too.

[–] [email protected] 28 points 3 weeks ago

Regulating a money scam that uses art as a token isn't regulating art, it's regulating money scams.

[–] [email protected] 5 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Yeah, spoken "lol" in place of saying "that's funny" or, y'know, actually laughing.

[–] [email protected] 10 points 3 weeks ago (4 children)
 

Similar to the previous campaign TAG reported on, North Korean threat actors used social media sites like X (formerly Twitter) to build rapport with their targets. In one case, they carried on a months-long conversation, attempting to collaborate with a security researcher on topics of mutual interest. After initial contact via X, they moved to an encrypted messaging app such as Signal, WhatsApp or Wire. Once a relationship was developed with a targeted researcher, the threat actors sent a malicious file that contained at least one 0-day in a popular software package.

[...]

In addition to targeting researchers with 0-day exploits, the threat actors also developed a standalone Windows tool that has the stated goal of 'download debugging symbols from Microsoft, Google, Mozilla and Citrix symbol servers for reverse engineers.' The source code for this tool was first published on GitHub on September 30, 2022, with several updates being released since. On the surface, this tool appears to be a useful utility for quickly and easily downloading symbol information from a number of different sources. Symbols provide additional information about a binary that can be helpful when debugging software issues or while conducting vulnerability research.

But the tool also has the ability to download and execute arbitrary code from an attacker-controlled domain. If you have downloaded or run this tool, TAG recommends taking precautions to ensure your system is in a known clean state, likely requiring a reinstall of the operating system.

[...]

As part of our efforts to combat serious threat actors, TAG uses the results of our research to improve the safety and security of Google’s products. Upon discovery, all identified websites and domains are added to Safe Browsing to protect users from further exploitation. TAG also sends all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity and encourages potential targets to enable Enhanced Safe Browsing for Chrome and ensure that all devices are updated.

 

spoilerBecause they're ear-ier.

view more: next ›