Avatar

qqq

qqq@lemmy.world
Joined
0 posts • 29 comments
Direct message

Related and interesting podcast: https://podcasts.apple.com/us/podcast/search-engine/id1614253637.

According to what he found that is somewhat the way it works: two fake candidates and the one with more yard signs got way more votes. Doubt that generalizes to the US presidency though; especially with this election.

permalink
report
parent
reply

I almost never use Windows, but aren’t commands and variables in PowerShell case insensitive?

permalink
report
parent
reply

As long as it’s installed on a device you control it’s pretty easy to sniff TLS traffic from an Android application, even if they’re pinning certs. I do this all the time for work. Frida makes it extremely easy, even giving you the ability to edit boringssl if something important is happening in native code. I’ve had to do this a couple times.

If you don’t have root you’ll have to recompile the application though which could matter if you need the signature to not change, but that isn’t a common requirement.

It’d be nice to have a better way to test though; I’ve wanted to check out Waydroid. Some coworkers just use an emulator which works great if it doesn’t need specific hardware.

permalink
report
parent
reply

Oh oof I misunderstood because of the parent comment talking about NixOS oops

permalink
report
parent
reply

Hm I always remember hearing this:

In a confidential memo to the Republican party, Luntz is credited with advising the Bush administration that the phrase “global warming” should be abandoned in favour of “climate change”, which he called a “less frightening” phrase than the former.

https://en.m.wikipedia.org/wiki/Frank_Luntz

https://www.theguardian.com/environment/2014/may/27/americans-climate-change-global-warming-yale-report

permalink
report
parent
reply

This is not legal; you have a right to vote. Call those numbers if you have an issue and don’t leave the line.

We don’t all have to be activists, but one day of the year we can spend a little extra time ensuring we remain a democracy.

permalink
report
parent
reply
Deleted by creator
permalink
report
parent
reply

This is a real exploit chain in cups-browsed. The tl;dr is that it will add basically anything that knows the correct protocol to your list of available printers, and this can be exploited for RCE if you print to the malicious printer. The service listens on all interfaces by default on UDP 631.

It is not as horrible as it was marketed, but it’s real and not great. You may or may not have this service running by default; I didn’t on Fedora.

His full write-up is here: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/

permalink
report
reply

Redox also takes some inspiration from Plan9 and https://doc.redox-os.org/book/ch05-00-schemes-resources.html is interesting. Also reading https://drewdevault.com/2022/11/12/In-praise-of-Plan-9.html made me a bit more interested in things trying to be more Plan9-like than Unix-like.

permalink
report
parent
reply