x1gma

joined 1 year ago
[–] x1gma@lemmy.world 10 points 1 week ago* (last edited 1 week ago)

The smallest footprint for an actual scripting probably will be posix sh - since you already have it ready.

A slightly bigger footprint would be Python or Lua.

If you can drop your requirement for actual scripting and are willing to add a compile step, Go and it's ecosystem is pretty dang powerful and it's really easy to learn for small automation tasks.

Personally, with the requirement of not adding too much space for runtimes, I'd write it in go. You don't need a runtime, you can compile it to a really small zero dependency lib and you have clean and readable code that you can extend, test and maintain easily.

[–] x1gma@lemmy.world 10 points 1 month ago

haven't actually proven to be effective at stopping cheaters

This is what OP said, and it's completely correct. It's not that much impact in comparison to "regular" anti cheat systems. And both of those only detect either cheap/bad or known hacks.

Server-sided and data based anti cheats is what would actually be a huge step up. You're running a 8 K/D in a game where the best players are between 1-2? Banned. You just flicked two enemies within 100ms? Banned. Suspicious activity that's not that blatant needs to be reviewed.

The thing is - that's fucking expensive, complicated and needs to be done one a per-game basis, and since its just cheaper to throw you under the bus with a kernel anticheat and claim it's the best one, that's being done.

Read up on the dangers.

[–] x1gma@lemmy.world 12 points 1 month ago (2 children)

Anything is beatable, hackable and abusable given the time and resources, and it shouldn't be my system because some idiotic management took the decision to enforce ring0 access anti cheat to ban some percent more hackers.

No one said that anti cheat efforts do not make an impact, but the impact of ring0 anti cheats is massively overrated

[–] x1gma@lemmy.world 13 points 1 month ago

I'm very interested to hear what went wrong.

We'll probably never know. Given the impact of this fuck up, the most that crowdstrike will probably publish is a lawyer-corpo-talk how they did an oopsie doopsie, how complicated, unforseen, and absolutely unavoidable this issue has been, and how they are absolutely not responsible for it, but because they are such a great company and such good guys, they will implement measures that this absolutely, never ever again will happen.

If they admit any smallest wrongdoing whatsoever they will be piledrived by more lawyers than even they'd be able to handle. That's a lot of CEO yachts in compensations if they will be held responsible.

[–] x1gma@lemmy.world 2 points 1 month ago

Right, completely forgot that locking exists in SVN, and I guess it definitely makes sense if you're collaboratively editing unmergeable files.

Thanks!

[–] x1gma@lemmy.world 13 points 1 month ago (7 children)

Serious question, why do they use SVN, as in what does SVN better than Git for the department using it?

[–] x1gma@lemmy.world 19 points 1 month ago (2 children)

It's not surprising per se, but it's something that people should be more aware of. And a lot of this consumption is not providing global services (like the Google search or workspace suite) but the whole AI hype.

I didn't find numbers for Google or Microsoft specifically, but training ChatGPT 4 consumed 50 GWh on its own. The daily estimates for queries are estimated between 1-5 GWh.

Given that the extrapolation is an overestimate and calculating the actual consumption is pretty much impossible, it's still probably a lot of energy wasted for a product that people do not want (e.g. Google AI "search", Bing and Copilot being stuffed into everything).

[–] x1gma@lemmy.world 1 points 1 month ago

Chrome cookies are encrypted, for exactly the reasons stated. If malware gains access to your system and compromises it in a way that DPAPI calls can be replicated in the way Chrome does it, then your sessions will also be compromised. But this is way harder to do, and at least prevents trivial data exfiltration.

[–] x1gma@lemmy.world 108 points 1 month ago

Please don't take personal offense, but you have merely a project scaffold with an unrealistic goal that will be blocked and C&D'd into the ground, without any other projects created.

It doesn't matter how hard you're working on your anonymity, this project will be ripped apart by a horde of lawyers in seconds. You're not only doing something questionable or against ToS, you're directly attacking and sabotaging their monetization. This will not be taken lightly by the legal team of reddit.

You want to provide a better, cooler, more robust and other random buzzwords API than the own of reddit. So, you alone, want to provide a better API than the whole team of reddit does for their absolute core product, all by scraping. This is simply not realistic.

While we're at the topic of monetization, scraping, ETL into your own model and providing the API - for the amount of content that reddit has (quantity, not quality) this will be a highly resource intensive task. How do you plan to fund that, since your API will be better than the official one, I can expect at least the same performance as well, right?

And also, most importantly, even if you magically achieve working around all that and get that working - why? Who is your expected user group? Pretty much every software using reddit moved away from reddit or simply has died. AI gen content is rampant, and most discussions seem like bots talking to bots. There is literally nothing to gain from an API to reddit - so why would anyone bother using it?

[–] x1gma@lemmy.world 14 points 2 months ago (2 children)

The third option is to use the native secret vault. MacOS has its Keychain, Windows has DPAPI, Linux has has non-standardized options available depending on your distro and setup.

Full disk encryption does not help you against data exfil, it only helps if an attacker gains physical access to your drive without your decryption key (e.g. stolen device or attempt to access it without your presence).

Even assuming that your device is compromised by an attacker, using safer storage mechanisms at least gives you time to react to the attack.

[–] x1gma@lemmy.world -1 points 2 months ago* (last edited 2 months ago)

Yes, in your head, and in your second factor, if possible, keeping derived secrets always encrypted at rest, decrypting at the latest possible moment and not storing (decrypted) secrets in-memory for longer than absolutely necessary at use.

[–] x1gma@lemmy.world 6 points 2 months ago

Been a few days since using electron, but AFAIK electron can't be used as a wrapper for android apps, or can it? Or is their android app a web app wrapped into a "native" android app too?

Also, since this seems to be an issue since 2018, 6 years should be plenty to rewrite using a native secure storage...

 

Been looking for ages for a 75/80% compact keeb with aluminum body, ISO-DE and 2.4Ghz Wireless.

Finally got my package with the IQUNIX Super Zonex 75. Gateron Silent MX Reds and Keychron Developer Cap Set to replace my old Corsair K70.

Super happy with the Zonex 75, decently heavy, looks and feels very nice. 6000mAh, VIA support, and great lighting, absolutely in love. Gateron reds feel very well, but I've had several broken pins in my batch and had to swap several switches since they have not been working. No idea if I screwed up, since it's my first custom build, or just a bad batch. Keychron keycaps are also feeling super nice.

view more: next ›