sapporo

joined 3 months ago
[–] sapporo@sopuli.xyz -1 points 1 month ago

You know already? Teach me

[–] sapporo@sopuli.xyz 1 points 1 month ago
2
submitted 1 month ago* (last edited 1 month ago) by sapporo@sopuli.xyz to c/chatgpt@lemmy.world
 

Free account of ChatGPT

Yesterday, all All the chats for the last or even 2 months -- no more.

No notification before hand, no notification whether it's bug or they want me to upgrade. Nothing. I've cleared the cookies and local storage in the browser, re-logged in. To no avail.

What the fucking wtf-king fuck?

 

A fresh installation of Merkuro Contacts - 24.08

CardDAV

When trying to create a new contact - “error, invalid parent collection”

a

What’s the matter?

 

Is there a standard or well-known, de-facto uitility for this?


Arch Linux, EndeavourOS

[–] sapporo@sopuli.xyz 0 points 2 months ago (2 children)

but an attacker isn't obliged to take on all the open ports, he could work with some of them - the ones that may seem the most interesting to him

[–] sapporo@sopuli.xyz 1 points 2 months ago* (last edited 2 months ago) (4 children)

Ok, back to this then:

If everything reports open then what ports do you focus on first?

I don't see an issue here. An attacker would be overwhemed with choise and excitement so that he wouldn't be able to decide which port to choose first, get stuck for a several months unable to decide? He'd toss a coin then.

[–] sapporo@sopuli.xyz 1 points 2 months ago

My ports are always open for you, my son. And doors, and windows.

[–] sapporo@sopuli.xyz 1 points 2 months ago* (last edited 2 months ago) (1 children)

You can’t pretend-close it and still have that service work.

indeed, a service on a port would no longer properly work. However, pretending that an open port is closed is possible the same way when pretending that's open

[–] sapporo@sopuli.xyz -5 points 2 months ago (2 children)
[–] sapporo@sopuli.xyz -1 points 2 months ago* (last edited 2 months ago) (6 children)

Do you youself understand what you're talking about?

then focus on those ports with more expensive/slower scans to find out what is running on those ports.

What do you mean by "focus on those ports"? What are "more expensive/slower scans"?

If everything reports open

not every port gets reported to be open but only some of them

what ports do you focus on first?

me? or an attacker? he could work with any ports he wishes

[–] sapporo@sopuli.xyz 1 points 2 months ago (8 children)
[–] sapporo@sopuli.xyz 0 points 2 months ago

it has nothing to do with it. Welcome to the real English

 

I've read an article which describes how to simulate the close ports as open in Linux by eBPF. That is, an outside port scanner, malicious actor, will get tricked to observe that some ports, or all of them, are open, whereas in reality they'll be closed.

How could this be useful for the owner of a server? Wouldn't it be better to pretend otherwise: open port -> closed?

[–] sapporo@sopuli.xyz 0 points 2 months ago* (last edited 2 months ago)

It's got CLI too - alright. But is it any de-facto, mature, well-known, widely used? What gurantees that it's as secure as openssl or gpg? It might have plenty of bugs and vulnerabilies.

 

Namely, de-facto, or one of, in Linux. Mature. No GUI. Open-source and free.

What is it? GPG or anything else?

For a separate file(s), or directory(ies), and not for the entire disk or partition.

 

Our sanctions full of holes at play, guys. Even in LNG

view more: next ›