[-] [email protected] 48 points 2 days ago* (last edited 2 days ago)

Canva is on the traditional corp Extend, Embrace, Extinguish mission to snuff Digital Content Design that is local only and has no AI. Canva bought Affinity Design Suite, which was the reaction of the non-corp creative world to not have to Adobe Creative Cloud, may it burn.

I believe we are in the era of "the great rug pull" of consumer empowered technology, moving to corp empowered technology stack, with them in control at all levels.

[-] [email protected] 78 points 1 week ago

Quote from the subtitle of the article

and you can’t stop it.

Don't ever let life-deprived, perspective-bubble wearing, uncompassiontate, power hungry manipulators, "News" people, tell you what you can and cannot do. Doesn't even pass the smell test.

My advice, if a Media Outlet tries to Groom you to think that nothing you do matters, don't ever read it again.

[-] [email protected] 21 points 2 weeks ago* (last edited 2 weeks ago)

So proud of you NetBSD, this is why I sponsor you, slam dunk for the future. I'm working on a NetBSD hardening script and Rice as we speak, great OS with some fantastically valuable niche applications and I think, a new broad approach I'm cooking up, a University Edition. I did hardening for all the other BSD, I saved the best for last!

[EDIT 5/16/2024 15:04 GMT -7] NetBSD got Odin lang support yesterday. That totally seals the NetBSD deal for me if I can come up with something cool for my workstation with Odin.

If you would like to vote on whether, or by what year, AI will be in the Linux Kernel on Infosec.space:

https://infosec.space/@wravoc/112441828127082611

28
submitted 2 weeks ago* (last edited 2 weeks ago) by [email protected] to c/[email protected]

I revised the title many times. Am I giving the impact breadth of what it could be without veering into click-bait?

Bluetooth Low Energy MESH Network, it is built into the OS without any noted country exemption. Although there be will many air gaps, that is not what I mean.

https://www.apple.com/newsroom/2024/05/apple-and-google-deliver-support-for-unwanted-tracking-alerts-in-ios-and-android/

Some questions that came to mind reading it?

  • Can China even pull it out of the OS for good measure, hack it?
  • Even with topology of some enable, others disable, others wanting security will be reading bluetooth MAC addresses of un-consenting, disabled, for tracking of others whom have enabled, even if they are not being targeted. See below screenshots from the Internet Engineering Task Force presentation.
  • Is the Bluetooth freqz and combinatory fields bio-active in any regard of it's function? Do plants stay healthy around "high intake" Bluetooth whatever that may be?
  • They mentioned other devices and Industry being involved, how many devices to we expect to also use this protocol in the future?
  • If we mapped it out, all of these devices thus operating, mapped out of the whole network with a Supercomputer, real-time, how much energy do you think it would be? How many BLE pulses per second, in a busy metropolitan area?
  • Who pushed for this TRACKING NETWORK I will be partcipating in whether I like or NOT (uptake)?
  • Where was the pre-planning market and socio-economic research on this presented beforehand?
  • If entities very intent on tracking you, will just disable/refuse the protcol, then why instead would Apple and Alphabet whom introduced the vulnerability, just ...make thier own implementation secure?

So we're going to skip this useless marketing-speak on 9to5 Mac - Here’s how the new Cross-Platform Tracking Detection works in iOS 17.5

As far as I can tell, there is nothing that says it doesn't perform assessment of the MAC address in range, all of them, for "your" security of course. In fact, it seems in line with what they want to accomplish: Track all the trackers? Later safeguard them with a "Safefilter" online database check when Phone starts?

Did I get it wrong?

[-] [email protected] 49 points 3 weeks ago

Best breadcrumb from article:

I wanted to understand: what kind of human spends their days exploiting our dumbest impulses for traffic and profit? Who the hell are these [SEO/Google] people making money off of everyone else’s misery?

31
submitted 4 months ago by [email protected] to c/[email protected]

I was a big Markdown fan. I think what finally broke me out was list formatting of mixed types, differences in formats across my repo servers, TOC generation software I was using broke, and no good editors suitable for my tastes for asciidoc that are available on BSD or Alpine Linux.

However, I found out that gedit natively supports adoc and even colors the admonitions. Excellent!

All the guides seem to be too skimpy, not robust enough, or out of order. I like to create as I read.

  • Comes with the adoc used to generate the guide and a PDF version.
  • Recommends editors with native asiidoc support.
  • Gives a comprehensive header "template".
  • Enables experimental features, admonition icons, and code highlighting.
  • Shows the best read/write table syntax missing from the official guide.
  • Corrects two errors in the official guide.

Did you know Asciidoc has a counter increment function?

Although it gives a warning saying not to use if possible, I found it works well for simple tasks.

Enjoy.

https://www.quadhelion.engineering/guides/AsciiDocCheatSheet.html

[-] [email protected] 27 points 5 months ago

I recently invented a "People First" Cybersecurity Vulnerability Scoring method and I called it CITE, Civilian Internet Threat Evaluation with many benefits over CVSS. In it, I prioritize "exploit chains" as the primary threat going forward. Low and behold, this new exploit, although iOS, possibly one of the most sophisticated attacks ever using one of the longest exploit chains ever! Proof positive!

Depending on how you define it; I define the Kaspersky diagram has 8 steps. In my system, I define steps that advance the exploit discretely as stages, so I would evaluated Triangulation to be a 4 stage exploit chain. I should tally this attack to see how it scores and make a CITE-REP(ort).

You can read about it if interested. An intersting modeling problem for me was does stages always equate to complexity? Number of exploits in the chain make it easier or harder to intrusion detect given that it was designed as a chain, maybe to prevent just that? How are stages, complexity, chains and remediation evaluted inversely?

https://www.quadhelion.engineering/articles.html

-27
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]

Science is what is, which requires nor benefits from belief. Adding a belief layer is interpreting, exploitable, and leads to believing untrue things as true (Science).

Reduced Logical Form: I believe what is (true) = Oxymoron

Oxymoron: A rhetorical figure in which incongruous or contradictory terms are combined

Explainer: It is impossible to believe what is true.


---Highly Related---


Question: 1 - Is it true or false?

Hint: Is/must/can the number/digit/integer 1 (one) be boolean in [all] cases? What are the conditions in which 1 is false?

Test from OCaml: if 1 then true else false;;

Theorem Pseudocode: if (1 = true) && (2 = 1 + 1) && (2 = true && true) then [true +& true +& ...] = true else nothing else matters

Note my recursive application to all other numbers/physics and inference that if 1 is not true, nothing is true

Postulation: All positive integers are true

[-] [email protected] 63 points 6 months ago

Also, it's the language scam of the decade to have a [privacy] agreement or terms with a "third party" which is basically anonymous/anyone/indeterminate/changing/.

[-] [email protected] 22 points 6 months ago* (last edited 6 months ago)

Huge if true! You could conceivably submit your phone to a Cybersecurity company and share in any reward.

Help us with:

  • Your OS Version
  • OS settings that are possibly related
  • How you obtained Signal
  • Signal version
  • Video proof
  • Steps to reproduce

Who knows how to compute a hash for an installed mobile phone app? We need to compare it with legit.

[-] [email protected] 18 points 6 months ago* (last edited 6 months ago)

If a person breaks into a Industrial Plant and steals $10000 worth of computer hardware and the software that was on it, they go to jail for a long time during which they are not allowed much if any "profits"/income. When a Corporation steals $100million, they pay the other company and gain even more money if they are in market dominate position.

This exchange of money from thief to victim however misses compensating the most aggrieved party, the marketplace > users > you. Really overall though, Civilization loses.

The problem with the Corporate Legal System is that once something like this is found to happen, morally, ethically, and to secure the future of Civlization, the thieving company should be shutdown in 6mos and all assets put up for auction.

Corporations have legal "personhood", but it seems to be just the best parts. Since this is well known to nVidia CEO Jensen Huang maybe he just said to himself, "It's just Business".

[-] [email protected] 13 points 6 months ago

I tried this in my Grasp account, a search engine that is pre-loaded with all the Hacker News blogs and other select technical website, and builds results in associated degrees of relations from there. It came up with 8 repos searching for:

https://usegrasp.com/search?q=github+%E2%80%9Ctnt_select%E2%80%9D+

Also I want to say, your scenario is troublesome that GitHub itself could not come up with a satisfactory answer. Strange.

8
submitted 6 months ago* (last edited 6 months ago) by [email protected] to c/[email protected]

This post with embedded music/videos in one blog page

Groking

White Hat

Frida - I Know There's Something Going On, Bladerunner Mix https://soundcloud.com/thebladerunners/frida-i-know-theres-something

Black Hat

VLF Electro https://soundcloud.com/microdosepromotions/sets/wook-chamers

Gray Hat

Dark + Light Electro https://soundcloud.com/xenondream/do-it-to-it-xenondreamix

Battle

CISA NCISS CODE BLACK – 12 minutes until people die https://soundcloud.com/lil-chromosome-unofficial/andrew-hulshult-davoth-doom-eternal-the-ancient-gods-part-2-extended-gamerip

CISA NCISS CODE RED - 11 minutes, 11 seconds until people lose it https://www.youtube.com/watch?v=vwUejFGol9E

Aftermath

A. Against all odds, you WON in near perfection, and you knew you would; Let us bask in your glow. https://www.youtube.com/watch?v=lEr8Gfa-hsk

B. Against all odds, you WON utilizing any/all available means, and it was chaos the entire time; Let us be in awe of you. https://www.youtube.com/watch?v=_PlSTjgcpa8

Apologies for music that could only be found on YT

✳️ Add your music+-scenario! ✳️

[-] [email protected] 38 points 7 months ago

"Ng said the idea that AI could wipe out humanity could lead to policy proposals that require licensing of AI"

Otherwise stated: Pay us to overregulate and we'll protect you from extinction. A Mafia perspective.

[-] [email protected] 74 points 7 months ago* (last edited 7 months ago)

It gets worse. Not having used my Gmail account for years, old phone died, moved to another state with new number there, and I traveled back to Los Angeles in order to log in on the same network, same laptop, correct password, but I put a new HDD in my Macbook Pro which caused Apple to re-ID the OS, and locked out! No way to recover, I try twice a year. Will not even reset to the correct backup email I have! I just get an email saying I tried to login with no actions possible!

Google stole parts of my life from me, the history in those emails, wow!

STOLEN

I AM NOT MY PHONE

94
submitted 7 months ago* (last edited 7 months ago) by [email protected] to c/[email protected]

Related:

Major cyber attack could cost the world $3.5 trillion - Power Grid, Internet Outage

The one database/file/zip to save humanity, what is it?

Show Lemmy the downloadable URL of a Database or AI you know of so we can have a local backup copy that will improve the resilience and availability of Human Knowledge.

Given the state of AI being Corporatized I think we could definitely use links for whatever comes closest to a fully usable Open Source, fully self-contained downloadable AI.

Starter Pack:

★ Lemmy List

Databases

AI

[-] [email protected] 23 points 7 months ago

Yes, I'm serious about my mission statement in the beginning and I have some more ideas. First there is a Linux OS that installs all kinds of Educational Software, like Encyclopedia, Maps, Learning Tools that is all available offline in the full 17GB Full Version. It's called Endless OS (no affilitions) and here is the excerpt.

Multi-language system, pre-loaded with apps in English including games, productivity software, reference materials like Cooking, Farming, Health, Travel, and educational materials like a robust Encyclopedia.

It would be great if all of us could have some of the civilization important databases on this BSD installation of yours. Please contribute a downloadable database file or file set you know of. I'll start.

Downloadable Wikipedia Database Encyclopedia Britannica All Volumes

288
submitted 7 months ago* (last edited 7 months ago) by [email protected] to c/[email protected]

I'm personally motivated in a non-commercial way to supply everyone with as much cybersecurity as possible in the interests of civlization, especially now. I've just finished what I wanted to releae as "set" 2 days ago and it's time to announce them.

I'm the former Web Application Security Team Lead for the National Computer Center, Research Triangle Park, having been contracted to the EPA by the now defunct Computer Sciences Corporation.

If you have some extra hardware not really being used I would suggest perhaps a great use of it would be to create yourself a hardened platform, just in case, to protect your sensitive data on an emminently stable platform going forward.

Maybe you've always wanted to try a BSD, well now is a great time to do that. They are super stable, super reliable, community drive, and you are in control of everything.

I would also like to mention that if you'd like to go extra hard consider Hardened BSD. Another alternative is using grsecurity/PaX kernel patched Alpine Linux as a Desktop choosing crypt full disk encryption during setup + AppArmor.

Just as an example you can get your hands on a $250 Thinkpad T495 and installing GhostBSD on it is as simple to setup as Linux Mint and runs as fast as a brand new 2023 Windows laptop. If you choose Dragonfly BSD, the fastest BSD, on a T495 (the lastest year fully BSD compatible laptop), my repo will completely configure it for you, complete with all applications needed for a professional developer.

In addition to that I've created a Network Based Firefox hardening solution that wipes the extremely profitable, For-Profit, Mozilla Corporation off your Internet and easily combines with Arkenfox. It removes Mozilla servers from being contacted by any application or service on your machine and does not interfere with web page rendering.

I've created my own Git Repository using Gogs (which Gitea is based on) where you can get all the goods here:

Latest Software

https://quadhelion.dev

Main Website

https://www.quadhelion.engineering

About

https://www.quadhelion.engineering/about.html

Backup GitHub

https://github.com/wravoc

Backup BitBucket

https://bitbucket.org/quadhelion-engineering/workspace/repositories/

104
submitted 7 months ago by [email protected] to c/[email protected]

Hello everyone!

Former Security Team Lead at the National Computer Center here. I'm a Security Professional with decades of experience in most Operating Systems and Web Applications.

Recently I've gotten weary of the Global Mega-Corp $100 Billion Linux Eco-System, which still manages to provide an unstable OS experience. I've turned my attention to the rock solid and predictable BSD/Unix world whenever I can use them.

I've created security hardending scripts for most BSDs except for NetBSD which is next in line. What would normally take an experienced SysAdmin an hour to complete, covering kernel mitigations, file system permission, daemon permissions, password encryption, etc can be done in seonds by a new user, with conf file verifications, backups, logging, and pretty printing the output to console.

  • FreeBSD
  • GhostBSD
  • DragonflyBSD
  • OpenBSD

For Dragonfly BSD, the fastest BSD, with a filesystem in the news lately that recovers itself and provides automatic snapshots down to the file level, I went ever further and created a rice for it using AwesomeWM. You are in luck if you have a Thinkpad T495 because I also wrote a full installation script for it for DF!

In addition to that I did it right and got explicit permission for Logo use or attained sponsorship and included the Wallpaper+Icon pack you see above.

You grab it all for my free on my self-hosted git repo for free at: https://quadhelion.dev/

Although I use a custom License which is somewhere between copyleft and copyright, it is generous enough to allow you to accomplish whatever task you wish and provide protections for my work and future oppourtunities for me.

I'm not liking the direction GitHub is going but you can find my work there: https://github.com/wravoc

I hope you find it useful and you are free to ping me here or write to my email listed on the main website page with any concerns.

Thanks,

  • Elias
  • @wravoc
  • @erogravity
view more: next ›

elias_griffin

joined 8 months ago