nothacking

joined 1 year ago
[–] [email protected] 7 points 4 months ago* (last edited 4 months ago)

Prevent subprocess from killing itself until finished.

[–] [email protected] 6 points 5 months ago

Oh no, public is public. Don't post stuff on the internet you don't want to be saved and possibly indexed forever.

[–] [email protected] 7 points 5 months ago

These services, like most companies will store your data indefinitly, and can be hacked. You cound end up with your name, what ever infromation the service gave you, and contact info on the internet. This is not the end of the world, but something to be aware of.

[–] [email protected] 3 points 5 months ago* (last edited 5 months ago) (7 children)

If it's local, try using over-the-air TV, if your close to a transmitter, you can get away with a fairly cheap antenna. (Or even just a paperclip.)

[–] [email protected] 48 points 5 months ago (1 children)

This is actually how you should declare something that you will never change, but something might change externally, like an input pin or status register.

Writing to it might do something completely different or just crash, but you also don't want the compiler getting creative with reads; You don't want the compiler optimizing out a check for a button press because the "constant" value is never changed.

[–] [email protected] 6 points 6 months ago (4 children)

It pings out to google constantly regardless of where you are. You should be able remove it with adb, or use an app like NetGuard to block it from acessing the internet.

[–] [email protected] 1 points 6 months ago (1 children)

Isn't flying the whole point though?

[–] [email protected] 3 points 6 months ago

Most malware is writen for Windows, but Linux malware exists, and has been found in the wild. The most common infection method, like with windows is running a trojan, theoretically things like browser exploits could also be used, but these are unlikely unless you are a high profile target like a head of state or CEO.

I would personaly be much more worried about someone evesdropping through my microphone. All they would get from my camera is my face and some glances of the room my computer is in, but my microphone would reveal all sorts of private conversations.

[–] [email protected] 1 points 6 months ago (3 children)

Why would you want to drive on the ground? It's a helicopter.

[–] [email protected] 3 points 6 months ago (7 children)

They are called "helicopters" and have existed for a while.

[–] [email protected] 76 points 6 months ago (15 children)

GNU is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX is not UNIX[Maximum call stack size exceeded]

[–] [email protected] 13 points 6 months ago (1 children)

Security from what? Get a threat model.

A NAT will restrict connections from the internet, but won't stop attacks from your local network. As your network grows, it might be a good idea to isolate shitty IOT devices (firmware is often full of holes), home internet and sensitive devices like cameras.

view more: ‹ prev next ›