Show newer

If you don't want to end up like the Australians you need to get rid of your smartphone *today.*

swiley boosted

BRAKTOOTH Bluetooth Exploit: "attacker is able to execute arbitrary functions implemented in the target ESP32’s firmware"

asset-group.github.io/disclosu

@valleyforge The OSX WM drives me nuts. I wish I could use my X11 WMs with OSX apps.

@icedquinn What happened after the 90s that "unix people" are missing?

uspol 

@rune What happened in Texas?

@Ged @metalune@fosstodon.org I don't have an iPhone, I just know my gf seemed to be ok with siskin. I'll have her try Monal if she complains.

@metalune@fosstodon.org Sisken works really well on iOS. Just create accounts for them either on your server or someone else's and give them the credentials.
Signal has serious problems and it's probably not a great idea to use it.

@enkiv2 I remember getting Blue Moon Ice Cream when I visited my grandparents in Wisconsin and being frustrated later because I couldn't figure out where to find it in the south.

swiley boosted
swiley boosted

Q: What does "End-to-End-Encryption" become when it has been weakened?

A: End Encryption.

@tripu PostmarketOS is free and doesn't have these issues.

@TetraspaceGrouping I learned about scihub/libgen from the /sci/ sticky, that's a pretty good guide.

@stux Youtube has been pushing a lot of "pop" stuff lately. At some point you're going to have to give up on the site for finding new videos.

swiley boosted

Weaponizing Censorship Middleboxes for TCP Reflected Traffic Amplification Attack

> Most of these nation-states are weak amplifiers (the Great Firewall of China only offers about 1.5x amplification, for example), but some of them offer more damaging amplifications, such as Saudi Arabia (~20x amplification)

And....

> We found a small number of infinite routing loops that traversed censorship infrastructure (notably in both China and Russia) that offered *infinite* amplification. 💣💥

geneva.cs.umd.edu/posts/usenix

Many years ago, a friend of mine told me it may be possible to exploit the Great Firewall of China for reflected amplification DDoS. This attack is real! #censorship #infosec #ddos

@clacke qoto.org seems to really dislike the image, but like all linked files clicking on the "not available" preview just opens it in a new tab.

swiley boosted

By breaking the privacy promise that your messages are secure, and ignoring the harm its notification scheme will cause, Apple is risking not only its privacy-protective image in the tech world, but also the safety of its young users.
eff.org/deeplinks/2021/08/appl

swiley boosted

Just like all my toots. Plagiarised. Not a single drop of originality 😂

All the most popular posts on Facebook are plagiarized...
platformer.news/p/all-the-most

swiley boosted

Facebook used facial recognition without consent 200,000 times, says South Korea's data watchdog • The Register
theregister.com/2021/08/26/fac

@rlamacraft @Parienve Because Apple applied for it. They also applied for the gtld which is in a separate namespace from trademarks.
Why can't I have swiley.com? Because someone else already registered it.

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.