@foone I tried arch back in the day. I was impressed that it managed to be worse than Gentoo.
I think the arch install guide may have been written by that guy who wrote the bomb defusal manual used on M*A*S*H.
"remove the tail assembly, and carefully cut the wires leading to the clockwork fuse at the head"
*next page*
"but first, remove the fuse"
omfg so i went through like an hour-long phone-call with a support person to set up my service; and after all that, I go to log in online for the first time …
… … … and it won't let me login until I "fix" my "broken" name.
THIS IS WHY YOU DON'T APPLY 'VALIDATION' TO PEOPLE'S NAMES, FOLKS
@ELLIOTTCABLE A million years ago in the dial-up BBS days there were certain systems that refused my last name “Farley” Eventually figured out the cause was trolls who would log in as “Chuck U. Farley” Due to sysops sharing block lists this problem followed me around on certain brands of BBS for a while.
Crazy read: detecting positions of players in Counterstrike by *listening to their GPU over a microphone*
PUBLIC SERVICE ANNOUNCEMENT:
There is an increase of account takeovers due to insiders at telco firms simply giving control to people paying them. Do a check on systems where this single factor would permit an account compromise. And change the configuration. These are opportunistic trawling attacks. This is becoming more common as attackers replicate the success.
The attacker uses other channels (like people search websites) to enumerate and guess the phone number attached to an online account and then checks against the telco they have control over.
The insider only briefly temporarily forwards the victim number to a 3rd party then switches it back to normal once they’re in. This is how they stay quiet since most victims will not have leverage or telemetry to understand how they got hacked.
It was their cell phone provider.
Make it so account recovery systems require multiple factors and remove telephony-based recovery for VIP accounts entirely.
Go check your systems now. Go try to access all your stuff like you forgot your password.
I am very serious.
Software developer, open-source enthusiast, wannabe software architect. I like learning and comparing different technologies. Also general STEM nerd.