- 2 Posts
- 71 Comments
CyberSeeker@discuss.tchncs.deto Technology@lemmy.world•Cyber-crew claims it cracked American cableco, releases terrible music video to prove itEnglish7·4 months agoSigh, clickbait at its finest, why else would we click
I would look at CISA’s Logging Made Easy project, which is based on Wazuh and Elastic with Kibana for visualization and dashboards.
Curious if this is so broadly true without bundled resources; obviously screens are higher DPI, so even buttons are now designed for at least 8K resolutions, even if most consumers are still on 1080p.
Orders of magnitude beyond 640x480 or pre Windows 3.1 resolutions.
CyberSeeker@discuss.tchncs.deto Electric Vehicles@slrpnk.net•Volkswagen ID.4 Motor Teardown: Killed By A Very Simple ProblemEnglish15·4 months agoA failed sealing ring… caused coolant to go where it shouldn’t. Saved you a click.
CyberSeeker@discuss.tchncs.deto Mildly Infuriating@lemmy.world•I'm sure people fall for this type of greenwashing all the time...English30·4 months agoExplain your thought process here, how did you arrive at the larger bottle being 90% more detergent? It’s EXPLICITLY clear that the concentration is higher in the smaller bottle.
You could complain about the form factor or lack of precision in dosing loads using the higher concentration, but “detergent” is mostly water, which they clearly said they reduced by 75% (same solute, with less water/solvent = higher concentration).
Quick search and going by what it says on the label, the cost per load has not significantly changed, a little more than half a penny’s difference:
Ultra Concentrated (left) $15/60 loads = $0.25/load https://mrsmeyers.com/collections/laundry/products/ultra-concentrated-laundry-detergent-rain-water?variant=50673207640338
Standard (right) $18/74 loads = $0.2432/load https://mrsmeyers.com/collections/laundry/products/ultra-concentrated-laundry-detergent-rain-water?variant=50673207640338
CyberSeeker@discuss.tchncs.deto Games@sh.itjust.works•More than 5 years after launch, Control gets a surprise patch that lets everyone play the Hideo Kojima missionEnglish17·4 months agoYou definitely should bump it up the list, especially if you can handle ray tracing, though the raster lighting is also good.
CyberSeeker@discuss.tchncs.deto You Should Know@lemmy.world•YSK: You can install an extension on Firefox (android) that allows you to play YouTube videos with your screen locked: (perfect for listening to obscure music)English291·4 months agoBE WARNED. These extensions are a prime target for purchase and/or hijacking by malicious threat actors, who then use them to gain persistence on your browsers and steal data. There is no reason to increase your browser attack surface for this feature when better alternatives have been posted in this thread.
There are dozens of these articles dating back the last five years or so.
CyberSeeker@discuss.tchncs.deto[Dormant] moved to !space@mander.xyz@lemmy.world•Private lunar lander dead after landing sideways in crater near moon's south poleEnglish10·4 months agoIt is not on Steam; lead developer is apparently adamantly against the Steam monopoly and 30% cut. They literally proposed distributing via torrents and discord.
CyberSeeker@discuss.tchncs.deto Anime@ani.social•What is your best isekai anime?English5·8 months agoRe:Zero, Konosuba, Overworld, and That Time I Got Reincarnated as a Slime are some of the best, alongside SAO which started the modern version of the genre.
CyberSeeker@discuss.tchncs.deto Technology@lemmy.world•Thousands of Linux systems infected by stealthy malware since 2021English811·9 months agoShouldn’t be this hard to find out the attack vector.
Buried deep, deep in their writeup:
RocketMQ servers
- CVE-2021-4043 (Polkit)
- CVE-2023-33246
I’m sure if you’re running other insecure, public facing web servers with bad configs, the actor could exploit that too, but they didn’t provide any evidence of this happening in the wild (no threat group TTPs for initial access), so pure FUD to try to sell their security product.
Unfortunately, Ars mostly just restated verbatim what was provided by the security vendor Aqua Nautilus.
Only the cyber truck. Model S and 3 refreshes are still on the legacy platform, with a lithium ion 12V.
CyberSeeker@discuss.tchncs.deto Cybersecurity@sh.itjust.works•A root-server at the Internet’s core lost touch with its peers. We still don’t know why.English16·1 year agoThis server, maintained by Internet carrier Cogent Communications
Found the problem!
CyberSeeker@discuss.tchncs.deto Technology@lemmy.world•On self-driving, Waymo is playing chess while Tesla plays checkersEnglish7510·1 year agoSo the article repeats, several times, “waymo relies on remote operators”. I don’t think the author knows what “self-driving” means.
CyberSeeker@discuss.tchncs.deto Ukraine@sopuli.xyz•Ukraine’s Usyk beats Fury to become undisputed heavyweight boxing world champion3·1 year agoYahoo search is just reskinned Bing, if that matters to you.
CyberSeeker@discuss.tchncs.deto cybersecurity@infosec.pub•Is it possible to use zero knowledge proofs to verify journalism sources?English4·1 year agoPossible? Yes. Likely? Not at all.
To perform a zero knowledge proof, you’d have to have structured data to support the claim, which most whistleblowers would not have. If a whistleblower already had the hard evidence in hand, e.g., serial numbers and timestamps, they could have just provided those anonymously, and someone could follow up. The problem is, you can’t always get a copy of the hard evidence without revealing your intent to the employer, or at least, other employees.
Presumably most whistleblowers are making unsubstantiated claims that something happened, or maybe with light evidence. Based on who they are, a journalist or investigator may then elect to follow up and dig up the hard evidence to support the claim. This requires revealing your name and position/relationship to at least one person. Rarely, they would be willing to put themselves out there to provide an affidavit under oath, which itself is not enough to pursue criminal charges (though it could help build a case around intent or willful neglect, or help support a warrant or discovery).
It’s illegal, but not unheard of, to try to force journalists to reveal their sources, but the same protections are not universally in place if you reported a finding to a company’s internal affairs, for example. But unlike attorney-client privilege, or shield law protections, the risk in signing an affidavit is, as we’ve seen in recent US trials, that records will not stay sealed, and your name will be revealed to the defense and/or public.
CyberSeeker@discuss.tchncs.deto [Dormant] Electric Vehicles (Moved to !electricvehicles@slrpnk.net)@lemmy.world•MG EXE181 electric hypercar can go 0-62 mph in 1.9 seconds3·1 year agoThe Model S Plaid, MG, Rimac Niverra, etc are increasingly limited by regulations more than anything. Quite literally, they are at the limits of rolling friction for street legal tires, which is why you’re not seeing a lot of variance at the top of the market.
CyberSeeker@discuss.tchncs.deto cybersecurity@infosec.pub•Has ethernet become illegitimate? A librarian flipped out after spotting me using ethernetEnglish163·1 year agoAs far as people I’d trust to not just make shit up, I’d say Librarian, aka, professional fucking researcher is high on the list.
For encryption, the client and server need to share their private keys.
This is incorrect, for asymmetric (public-private) encryption. You never, ever share the private key, hence the name.
The private key is only used on your system for local decryption (someone sent a message encrypted with your public key) or for digital signature (you sign a document with your private key, which can be validated by anyone with your public key).
For the server, they are signing their handshake request with a certificate issued by a known certificate authority (aka, CA, a trusted third party). This prevents a man-in-the-middle attack, as long as you trust the CA.
The current gap is in inconsistent implementation of Organization Validation/Extended Validation (OV/EV), where an issuer will first validate that domains are legitimate for a registered business. This is to help prevent phishing domains, who will be operating with TLS, but on a near-name match domain (www.app1e.com or www.apple.zip instead of www.apple.com). Even this isn’t perfect, as business names are typically only unique within the country/province/state that issues the business license, or needed to be enforced by trademark, so at the end of the day, you still need to put some trust in the CA.
CyberSeeker@discuss.tchncs.deto Technology@lemmy.world•Net neutrality is back as FCC votes to regulate internet providersEnglish1·1 year agodeleted by creator
This isn’t directly due to industrial air pollution, but rather is the much harder to solve downstream impact of climate change.