qqq

joined 1 year ago
[–] [email protected] 1 points 1 week ago (1 children)

I almost never use Windows, but aren't commands and variables in PowerShell case insensitive?

[–] [email protected] 9 points 1 week ago

Hm I always remember hearing this:

In a confidential memo to the Republican party, Luntz is credited with advising the Bush administration that the phrase "global warming" should be abandoned in favour of "climate change", which he called a "less frightening" phrase than the former.

https://en.m.wikipedia.org/wiki/Frank_Luntz

https://www.theguardian.com/environment/2014/may/27/americans-climate-change-global-warming-yale-report

[–] [email protected] 14 points 1 month ago* (last edited 1 month ago) (2 children)

This is a real exploit chain in cups-browsed. The tl;dr is that it will add basically anything that knows the correct protocol to your list of available printers, and this can be exploited for RCE if you print to the malicious printer. The service listens on all interfaces by default on UDP 631.

It is not as horrible as it was marketed, but it's real and not great. You may or may not have this service running by default; I didn't on Fedora.

His full write-up is here: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/

[–] [email protected] 3 points 2 months ago* (last edited 2 months ago) (1 children)

This is not true at all. https://en.wikipedia.org/wiki/Post-quantum_cryptography good place to start if you're genuinely interested. Most password managers that are worth while will be using symmetric cryptography which just requires longer key lengths to survive in the quantum age. AES256 should be fine for the foreseeable future.

[–] [email protected] 1 points 2 months ago* (last edited 2 months ago) (1 children)

Replying to this pretentious comment for the sake of others reading this:

Run history | grep genpasswd for why this is not a good password storage solution. One must image skill issue.

If you think the CLI is the cool kid way to go, use https://www.passwordstore.org/, but tbh I don't recommend that either.

[–] [email protected] 2 points 5 months ago* (last edited 5 months ago)

You can use ~/.local/lib and LD_LIBRARY_PATH for shared libs.

Or better yet just give in and use the nix package manager, it is basically a virtual environment for your C programs.

[–] [email protected] 4 points 6 months ago* (last edited 6 months ago) (1 children)

Yes for example Python implements them using semaphores.

[–] [email protected] 11 points 6 months ago

It doesn't violate any rules.. Imagine both the "speaker" and the "text" are being updated by separate threads. A program that would eventually display the behavior in this meme is simple, and I'm a bit embarrassed to have written it because of this comment:

#include <pthread.h>
#include <stdio.h>

char* speakers[] = {
    "Alice",
    "Bob"
};
int speaker = 0;

void* change_speaker(void* arg)
{
    (void)arg;

    for (;;) {
        speaker = speaker == 0 ? 1 : 0;
    }
}

char* texts[] = {
    "Hi Bob",
    "Hi Alice, what's up?",
    "Not much Bob",
};
int text = 0;

void* change_text(void* arg)
{
    (void)arg;
    for (;;) {
        switch (text) {
        case 0:
            text = 1;
            break;
        case 1:
            text = 2;
            break;
        case 2:
            text = 0;
            break;
        }
    }
}

int main(int argc, char* argv[])
{
    pthread_t speaker_swapper, text_swapper;

    pthread_create(&text_swapper, NULL, change_text, NULL);
    pthread_create(&speaker_swapper, NULL, change_speaker, NULL);
    for (int i = 0; i < 3; ++i) {
        printf("%s: %s\n", speakers[speaker], texts[text]);
    }
}
[–] [email protected] 7 points 1 year ago

They were very clear it was for research in my memory. That was the reason I did it.

[–] [email protected] 7 points 1 year ago

I've never had an issue using banking apps from Lineage. I use 3 different pretty mainstream ones

[–] [email protected] 1 points 1 year ago

This is not necessarily true.

For example, consider the case of a 1Password vault falling into the hands of an attacker. They do not have the option to just crack your password, as the password is mixed with a randomly generated value to ultimately derive the key. They would need to simultaneously brute force your password and that random value. This should almost be impossible. However, given access to a client that already has knowledge of the secret value, it would fall back to brute forcing the password.

view more: next ›