sorted by: new top controversial old
[-] drspod@lemmy.ml 8 points 17 hours ago

they can’t be jammed the way radio can.

I wonder how well these satellite laser links do with various types of cloud cover.

[-] drspod@lemmy.ml 6 points 17 hours ago

By repeating their rhetoric, even as a joke, it's just giving oxygen to people who don't deserve any form of publicity whatsoever. It would be better not to reference these batshit-insane conspiracy theories and then perhaps they would die more quickly.

This story is about French/space/communications/technology. Not American/politics/racist/conspiracy. Not one genre overlap, so there's no reason to even bring it up here. Maybe leave these jokes to the American politics threads.

[-] drspod@lemmy.ml 22 points 21 hours ago

(Federated) email didn't survive. It got completely subsumed by the major providers who now have control over everything email related. It's now impossible to run your own email server since none of the major providers will deliver your email without your mail server having first built a reputation.

The fediverse analogy would be if 99.9999% of users were on Threads and you couldn't interact with any of those users from any of the small independent fediverse servers. Frankly, that's exactly what it looks like is happening.

[-] drspod@lemmy.ml 2 points 1 day ago

Wait until you see the ones that let you choose between "Accept All" and "Subscribe to monthly plan 4.99/mo"

I saw a website like that the other week and it was based in an EU country.

[-] drspod@lemmy.ml 2 points 3 days ago

Got a link to that?

[-] drspod@lemmy.ml 21 points 3 days ago

Can't wait to read about it telling someone to put glue on pizza.

[-] drspod@lemmy.ml 3 points 4 days ago

It's not reading the contents of RAM via EM emanations, it's using the EM emanations caused by certain memory access patterns as a side channel to exfiltrate data. Of course, that data could be anything, including whatever is in RAM, but the point is that you need to be running the code that generates the necessary memory access patterns to transmit the bits of data. This is not like TEMPEST where you can reconstruct a video display just using the emanations.

[-] drspod@lemmy.ml 16 points 5 days ago

Thanks! I was racking my brain trying to think of where I knew it from, and after seeing the page that you linked I'm almost certain that it's After Burner that is causing my brain to trigger the 80s association.

[-] drspod@lemmy.ml 33 points 6 days ago

You can tell just from the font that this book is from the 80s

[-] drspod@lemmy.ml 23 points 1 week ago

If it was plausible this would be bigger news. There's a claim like this every couple of months and none have held up to scrutiny so far.

35
submitted 1 week ago* (last edited 1 week ago) by drspod@lemmy.ml to c/programming@programming.dev

Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.

The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

[-] drspod@lemmy.ml 20 points 1 week ago

I love that the local translation feature is getting regular small updates to make it more useable. It's a great feature.

[-] drspod@lemmy.ml 27 points 1 week ago

Porges believes

This is an interesting article and yet you've chosen to quote the most speculative unscientific part of it from the final paragraph.

"Have you tried going outside" is not a scientific cure for depression.

193
submitted 1 year ago by drspod@lemmy.ml to c/technology@lemmy.ml

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

331
submitted 1 year ago by drspod@lemmy.ml to c/linux@lemmy.ml

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

view more: next ›

drspod

joined 2 years ago