brombek

joined 4 years ago
[–] brombek@lemmy.ml 8 points 1 year ago

The only private payment method is cash.

[–] brombek@lemmy.ml 5 points 1 year ago

Thanks for the video link. Very interesting. This is how all computers will be built eventually. So seize the means of computation until we can...

[–] brombek@lemmy.ml 11 points 1 year ago (3 children)

Google will just say that pages with DRM will rank higher in their search and it's all done.

[–] brombek@lemmy.ml 8 points 1 year ago (3 children)

You could try destination NAT with netfilter/iptables (DNAT) and terminate TLS on your home server.

This way packets will be forwarded to the home server without beign decrypted on the VSP.

[–] brombek@lemmy.ml 3 points 1 year ago* (last edited 1 year ago)

I used to rip Amiga game soundtracks by putting a tape recorder near the TV speaker. This will work for any DRM content :) Obviously it is lossy, you would need a recorder of some form and it will take a long time for audiobooks. My tape deck had a turbo feature... you could try playing audiobooks faster and then reduce the speed of the recording if such option exists.

If you have a computer with line-in input this will work better than acoustic-coupling :)

[–] brombek@lemmy.ml 1 points 1 year ago

I bet. That was 20 years ago :D

[–] brombek@lemmy.ml 8 points 1 year ago (5 children)

As the old Gentoo mantra goes: stuff breaks so you can learn things :D

[–] brombek@lemmy.ml 8 points 1 year ago (1 children)

If you put all the effort and learning needed to keep Windows from fucking you over, into learning Linux you would not only be an expert user buy now, but also potentially could build a good career around that knowledge as it is actually useful.

[–] brombek@lemmy.ml 4 points 2 years ago

I think that all this ad driven businesses did in the last decade was to undermine trust in technology in general. Nothing can function without trust...

[–] brombek@lemmy.ml 2 points 2 years ago (3 children)

"Murderer Fail Spectacularly at Keeping his Victim Alive"

[–] brombek@lemmy.ml 1 points 2 years ago (1 children)

Good reason to demand free software Wi-Fi firmware.

[–] brombek@lemmy.ml 1 points 2 years ago

I just learned how Google makes all their money.

 

So one could have replace a JS file with one fetched from attacker controlled server for any site behind Akamai like LastPass or PayPal. That JS could have exfiltrated all the secrets from these sites on the client side (post decryption) or replace account numbers with their own on behalf of the user.

 

Like NVIDIA, Microsoft was able to stanch some of the bleeding, cutting off LAPSUS$’s illicit access while the group was in the process of downloading all of the available source code repositories alphabetically (the group publicized their access to Microsoft at the same time they were downloading the software giant’s source code). As a result, LAPSUS$ was only able to leak the source for Microsoft products at the beginning of the code repository, including Azure, Bing and Cortana.

 

EU data protection authorities find that the consent popups that plagued Europeans for years are illegal. All data collected through them must be deleted. This decision impacts Google’s, Amazon’s and Microsoft’s online advertising businesses.

All data collected through the TCF must now be deleted by the more than 1,000 companies that pay IAB Europe to use the TCF. This includes Google’s, Amazon’s and Microsoft’s online advertising businesses.

 

“Norton is pretty much amplifying energy consumption worldwide, costing their customers more in electricity use than the customer makes on the mining, yet allowing Norton to make a ton of profit,” tweeted security researcher Chris Vickery. “It’s disgusting, gross, and brand-suicide.”

 

...when combined with a vulnerability, it does have the ability to emulate circuits of arbitrary logic gates operating on arbitrary memory. So why not just use that to build your own computer architecture and script that!? That's exactly what this exploit does. Using over 70,000 segment commands defining logical bit operations, they define a small computer architecture with features such as registers and a full 64-bit adder and comparator which they use to search memory and perform arithmetic operations.

 

The report notes the HSE’s hospital network had over 30,000 Windows 7 workstations that were deemed end of life by the vendor.

view more: next ›