Although not the same, this has been going on for about two years now. Jensen Harris, a former MS engineer, criticized the ads as well as the design of the new Start Menu, over here: threadreaderapp.com/…/1564399431545667585.html
Four years after the Raspberry Pi 4 shipped, today the Raspberry Pi 5 is launching with a much improved SoC leading to significant performance gains....
Ventoy is an open source tool to create a bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With Ventoy, you don’t need to format the drive over and over, you just need to copy the image files to the USB drive, and Ventoy will give you a boot menu to select them and boot from it....
“Google has taken great pains to appear more open than Apple, licensing the Android operating system to third parties like Samsung and allowing users to install apps via other methods than the Play store. Apple does neither. When it comes to exclusivity, Apple has become synonymous with “walled garden” in the public...
There you go, that’s your problem. Political topics always gets heated and brings out the worst in people, no matter the platform. The first thing I did is block all politics (and general news + sports) communities, and it’s been a fairly pleasant experience so far for me, except for the odd troll or fanboy that shows up every now and then.
They don’t have to be financial - many corporate apps will not work on custom ROMs - the most popular ones being the ones by Microsoft - eg Teams, Outlook etc.
Similarly, some games may also not work, such as all the ones by Niantic (Ingress, Pokemon Go etc) and typically many online multiplayer games.
Finally, this will also affect popular streaming media services, such as Netflix, Amazon Prime etc.
There are workarounds for some of these - some with certain compromises - but there’s no guarantee that they’ll continue to work. So before you look into any workarounds (if you use the above three categories of apps), know that it’s a constant game of cat-and-mouse, so it’s not for the faint hearted.
FreeRDP 3.0 stable was released today as this open-source implementation of the Microsoft Remote Desktop Protocol (RDP) for allowing nice remote access support....
One of Google Search’s oldest and best-known features, cache links, are being retired. Best known by the “Cached” button, those are a snapshot of a web page the last time Google indexed it. However, according to Google, they’re no longer required....
So my workplace is mostly iPhone users and someone asked me what kind of antivirus software I used on my Android, and I said “none” and he flipped out about how unsafe it was. Other people chimed in saying how all androids need antivirus apps and I’ve never heard of such a thing. I do have ad-blockers and a VPN but never...
That’s not a standard Windows prompt, looks like some third-party application is intercepting the call.
Check the registry: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution Options - for a key named taskmgr.exe. If it exists, see if the taskmgr.exe key has a value called Debugger. If so, delete the Debugger value, or rename the taskmgr.exe key to e.g. taskmgr.exe.old.
Then try launching Task Manager again.
If there’s nothing in the registry, you could monitor the process tree in Process Explorer and watch what happens when you execute taskmgr.exe. You could also use Process Monitor if you want to dig deeper and find out exactly what’s happening - you can filter out Microsoft processes to make it easier to see all thirdparty software interactions.
The Beelink SER8, launched last month in China, is now available globally. This mini PC packs the AMD Ryzen 7 8845HS, and a starting price of $749, which comes with 32 GB of RAM and 1 TB of storage. There’s also a barebones version from MiniXPC at $499.99....
Waydroid works, but there’s three main things you need to get things going to replicate a typical Android device:
OpenGapps: For GApps/Play Store. You’ll also need to register your device to get an Android ID.
Magisk: Mainly to pass SafetyNet / Play Integrity basic checks.
libndk / libhoudini: For ARM > x86 translation. libndk works better on AMD.
Widevine: (optional) L3 DRM for things that need it, eg Netflix
There are some automated scripts that can set this all up. I used this one in the past with some success.
Also, stay away from nVidia. From what I recall, it just doesn’t work, or there are other issues like crashes. But if you’re serious about Linux in general, then ditching nVidia is generally a good idea.
Finally, games that use anti-cheat can be a hit-or-miss (like Genshin Impact, which crashed when I last tried it). But that’s something that you may face on any emulator, I mean, any decent anti-cheat system would detect the usage of emulators.
Within the GNU/Linux ecosystem there are all kinds of tools to diagnose the system, or rather, to check the state of the hardware, but there are few distributions specifically designed to perform this task, or at least that I know of, because the only distribution I know that is intended to diagnose the computer, (Or at...
You can sill use Medicare to create the USB and then add your favorite antimalware rescue CD to it, like the Kaspersky/Avira ones, but if it’s an unknown malware you’d have to use other analysis tools like Sysinternals RootkirRevealer, Autoruns etc. If you want to fix Windows stuff then it’s best to get a WinPE-based live CD with these tools, like Sergei Strelec, Gandalf etc.
For the anniversary day, maybe we could have a post showcasing a few highlights of our community over the past year, something like Spotify’s Wrapped, but for Lemmy - so maybe a highlight of the most upvoted posts/comments, most profilic posters, membership counts, major server changes and little victories (maybe share some of your experiences in keeping the ship afloat)?
If you want to make it fancy we could do a presentation type thing, like via slidesgo.com or similar, but since this is on/for Lemmy, I think we should just keep it simple and make it a normal post.
With the advancements in technology, particularly AI now, what is the smartest smartphone in your opinion? And I don’t mean in terms of raw power or tech specs, but rather the likes of the OS, UI, or features and functions.
Any phone that can run GrapheneOS, which is arguably the most secure full-featured (as in: all the functionality you’d expect in a modern smartphone + compatible with popular mobile apps) mobile OS right now.
GrapheneOS is heavily focused on protection against attackers exploiting unknown (0 day) vulnerabilities. They employ techniques such as attack surface reduction (stripping out unnecessary code, disabling insecure components etc); using hardened system components (such as the kernel) that makes it much harder for hackers to exploit; and finally using sandboxing technologies (eg per-website browser sandbox, app sandboxing, media codec sandboxing etc).
A more interesting thing is the sandboxed Google Play Services support, which allows the option to use Google apps (such as the Play Store) in a fully sandboxed environment without granting them any special privileges.
You should check out the full feature set, it’s a LOT more impressive than what I hastily summarised above.
This focus on both privacy and security, with minimal negative impact to the user experience, IMO makes GrapheneOS probably the smartest choice for users concerned about mobile security and therefore, phones which run GrapheneOS (currently only Google Pixel phones) would be the smartest smartphone.
I’ve installed TLP on my Lenovo ThinkBook laptop and was wondering if there are additional steps I can take to extend the battery life when using the laptop unplugged....
Passkeys are an easy and secure alternative to traditional passwords that can help prevent phishing attacks and make your online experience smoother and safer....
Lies, there’s no Linux app yet. As usual, Proton Inc continues to treat Linux users as third-class citizens, all whilst claiming they care about privacy and security.
In the sysadmin world, the current approach is to follow a zero-trust and defense-in-depth model. Basically you do not trust anything. You assume that there’s already a bad actor/backdoor/vulnerability in your network, and so you work around mitigating that risk - using measures such as compartmentalisation and sandboxing (of data/users/servers/processes etc), role based access controls (RBAC), just-enough-access (JEA), just-in-time access (JIT), attack surface reduction etc.
Then there’s network level measures such as conditional access, and of course all the usual firewall and reverse-proxy tricks so you’re never exposing a critical service such as ssh directly to the web. And to top it all off, auditing and monitoring - lots of it, combined with ML-backed EDR/XDR solutions that can automatically baseline what’s “normal” across your network, and alert you of any abnormality. The move towards microservices and infrastructure-as-code is also interesting, because instead of running full-fledged VMs you’re just running minimal, ephemeral containers that are constantly destroyed and rebuilt - so any possible malware wouldn’t live very long and would have to work hard at persistence. Of course, it’s still possible for malware to persist in a containerised environment, but again that’s where the defense-in-depth and monitoring comes into play.
So in the case of xz, say your hacker has access to ssh - so what? The box they got access to was just a jumphost, they can’t get to anywhere else important without knowing what the right boxes and credentials are. And even if those credentials are compromised, with JEA/JIT/MFA, they’re useless. And even if they’re compromised, they’d only get access into a very specific box/area. And the more they traverse across the network, the greater the risk of leaving an audit trail or being spotted by the XDR.
Naturally none of this is 100% bullet-proof, but then again, nothing is. But that’s exactly what the zero-trust model aims to combat. This is the world we live in, where we can no longer assume something is 100% safe. Proprietary software users have been playing this game for a long time, it’s about time we OSS users also employ the same threat model.
The main issue is the handling of security updates within the Nixpkgs ecosystem, which relies on Nix’s CI system, Hydra, to test and build packages. Due to the extensive number of packages in the Nixpkgs repository, the process can be slow, causing delays in the release of updates. As an example, the updated xz 5.4.6 package...
First of all, I’m not the author of the article, so you’re barking up the wrong tree.
You’re using the unstable channel.
That doesn’t matter in the big scheme of things - it doesn’t solve the fundamental issue of slow security updates.
You could literally build it on your own, or patch your own change without having to wait - all you have to do is update the SHA256 hash and the tag/commit hash.
Do you seriously expect people to do that every time there’s a security update? Especially considering how large the ecosystem is? And what if someone wasn’t aware of the issue, do you really expect people to be across every single vulnerability across the hundreds or thousands of OSS projects that may be tied to the packages you’ve got on your machine?
The rest of your points also assume that the older packages don’t have a vulnerability. The point of this post isn’t really about the xz backdoor, but to highlight the issue of slow security updates.
If you’re not using Nix the way it is intended to be, it is on you. Your over-reliance on Hydra is not the fault of Nix in any way.
Citation needed. I’ve never seen the Nix developers state that in any official capacity.
I read a lot of answers online that its a bad idea, but the arguments did not make a lot of sense. “it’s a heavily ingrained part of the eco system”. Well if I can change it, what’s the deal?...
Actually, Ctrl+C is the interrupt hotkey for pretty much every CLI app/terminal on every platform. Try it within the Command Prompt/PowerShell/Windows Terminal, or the macOS terminal - they’ll all behave the same.
The use of Ctrl+C as an interrupt/termination signal has a very long history even predating the old UNIX days and DEC - it goes back to the days of early telecommunications, where control characters were used for controlling the follow of data through telecommunication lines. These control characters, along with regular characters, were transmitted by being encoded in binary, and this encoding scheme was defined by ASCII (American Stanard Code for Information Interchange), published in 1963.
In ASCII, the control character ETX (meaning end-of-text; represented by the hex code 0x03) was used to indicate “this segment of input is over”, or “stop the current processing”.
Now what does all this have to do with with Ctrl+C you ask?
For that, you’ll need to go back to the days of early keyboards. Keyboards back then generated ASCII codes directly, and when a modifier key (Ctrl/Shift/Meta) on a keyboard was pressed in combination with another key, it modified the signal sent by the keyboard to produce a control character.
Specifically, pressing Ctrl with a letter key made the keyboard clear (set to zero) the upper three bits of the binary code of the letter, thus effectively mapping the letter keys to control characters (0x00 - 0x1F: the first 32 characters on the ASCII table).
The ASCII code for ‘C’ is 0x43 (binary 01000011).
Pressing Ctrl+C clears the upper three bits, resulting in 00000011, which is 0x03 in hex.
And would you look at that, 0x03 is the code which represents the control character ETX.
The use of ETX to interrupt a program in digital computers was first adopted by the TOPS-10 OS, which ran on DEC’s PDP-10 computer, back in the late 60s. It’s successor, TOPS-20 also included it, followed by the RSX-11 (on the PDP-11), and VMS (on the VAX-11).
RSX-11 was a very influential OS, created by a team that included David Cutler. It influenced the design of several OSes that followed, such as VMS and Windows NT. Cutler later moved to Microsoft and became the father of Windows NT. Early NT did not include a GUI, so it was natural to adopt existing terminal operation standards, including the use of ETX. In fact, NT’s internals were so similar to VMS that a lawsuit was in the works, but instead, MS agreed to pay off DEC millions of $$$.
Also, when UNIX first came out (1969), it ran on DEC hardware, and so they followed the tradition of using the ETX signal to stop programs. This convention flowed to BSD (1978) which was based on UNIX, and NeXTSTEP (1989), which was based on BSD. NeXTSTEP was developed by NeXT Computers, which was founded by Steve Jobs… and the rest is history.
Therefore, Ctrl+C is something that’s deeply rooted in history. You don’t just simply change something like that. Sure, you may be able to remap the keybindings, but it’s actually hardcoded into many programs so you’ll run into inconsistencies - that is, if you used the standard remapping tools built into GNOME/KDE etc.
If you want to truly remap Ctrl+C, you’ll want to do so at a lower level (evdev layer) so that it’s not intercepted by other programs, eg using tools like evremap or keyd. But even then, it’s not guaranteed to work everywhere, for instance, if you’re inside a VM or using a different OS, or in a remote session. So it’s best to remap the keys at the keyboard layer itself, which is possible on many popular mechanical keyboards using customisable firmware like QMK/VIA.
Mini PC maker "AceMagic" ships systems with factory-installed spyware (www.tomshardware.com)
This is probably a good reminder to not be tempted to buy random brand mini-PCs off Amazon and AliExpress.
Microsoft starts testing ads in the Windows 11 Start menu (www.theverge.com)
Raspberry Pi 5 Benchmarks: Significantly Better Performance, Improved I/O (www.phoronix.com)
Four years after the Raspberry Pi 4 shipped, today the Raspberry Pi 5 is launching with a much improved SoC leading to significant performance gains....
Winlator 3.0 Released (github.com)
Winlator is an Android application that lets you to run Windows (x86_64) applications with Wine and Box86/Box64....
Ventoy 1.0.97 Released (github.com)
Ventoy is an open source tool to create a bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With Ventoy, you don’t need to format the drive over and over, you just need to copy the image files to the USB drive, and Ventoy will give you a boot menu to select them and boot from it....
So why did a jury find that Google held a monopoly but Apple didn’t? (www.theguardian.com)
“Google has taken great pains to appear more open than Apple, licensing the Android operating system to third parties like Samsung and allowing users to install apps via other methods than the Play store. Apple does neither. When it comes to exclusivity, Apple has become synonymous with “walled garden” in the public...
Is it just me, or have the comments on Lemmy become extra aggressive over the past 3 months?
I feel like things on Lemmy were pretty chill several months ago, and that’s started to change....
LineageOS 21 has launched: Changelog 28 - Fantastic Fourteen, Amazing Applications, Undeniable User-Experience (lineageos.org)
Magisk v26.2 Released (github.com)
[MagiskBoot] Support extracting boot image from payload.bin...
Aotearoa Daily Kōrero 19/11/2023
Welcome to today’s daily kōrero!...
FreeRDP 3.0 Released With WebSocket Transport, Relative Mouse Movement and More (www.phoronix.com)
FreeRDP 3.0 stable was released today as this open-source implementation of the Microsoft Remote Desktop Protocol (RDP) for allowing nice remote access support....
Google Search is losing its 'cached' web page feature (www.engadget.com)
One of Google Search’s oldest and best-known features, cache links, are being retired. Best known by the “Cached” button, those are a snapshot of a web page the last time Google indexed it. However, according to Google, they’re no longer required....
Do you need to download an anti-virus for Android?
So my workplace is mostly iPhone users and someone asked me what kind of antivirus software I used on my Android, and I said “none” and he flipped out about how unsafe it was. Other people chimed in saying how all androids need antivirus apps and I’ve never heard of such a thing. I do have ad-blockers and a VPN but never...
On the work computer task manager is protected by password. I'm local admin, how can i revert this? (feddit.it)
Because i am local admin and i’m authorized to do whatever i want, i can use process explorer....
Beelink Mini PC SER8 - AMD Ryzen 7 8845HS, upto 256GB of DDR5 RAM (www.bee-link.com)
The Beelink SER8, launched last month in China, is now available globally. This mini PC packs the AMD Ryzen 7 8845HS, and a starting price of $749, which comes with 32 GB of RAM and 1 TB of storage. There’s also a barebones version from MiniXPC at $499.99....
Noob Question Thread: Ask Any Questions About Linux!
I thought I’ll make this thread for all of you out there who have questions but are afraid to ask them. This is your chance!...
Distributions intended for hardware diagnosis and other related utilities
Within the GNU/Linux ecosystem there are all kinds of tools to diagnose the system, or rather, to check the state of the hardware, but there are few distributions specifically designed to perform this task, or at least that I know of, because the only distribution I know that is intended to diagnose the computer, (Or at...
Aotearoa Weekly Kōrero 23/5/2024
Last weeks thread here...
What is the "smartest" smartphone?
With the advancements in technology, particularly AI now, what is the smartest smartphone in your opinion? And I don’t mean in terms of raw power or tech specs, but rather the likes of the OS, UI, or features and functions.
Please share your power optimizations to maximize battery life
I’ve installed TLP on my Lenovo ThinkBook laptop and was wondering if there are additional steps I can take to extend the battery life when using the laptop unplugged....
Proton Pass now supports passkeys on all devices and plans: Beating Bitwarden to mobile devices (proton.me)
Passkeys are an easy and secure alternative to traditional passwords that can help prevent phishing attacks and make your online experience smoother and safer....
The Xz Backdoor Highlights the Vulnerability of Open Source Software—and Its Strengths (www.404media.co)
xz backdoor...
How the xz backdoor highlights a major flaw in Nix (shadeyg56.vercel.app)
The main issue is the handling of security updates within the Nixpkgs ecosystem, which relies on Nix’s CI system, Hydra, to test and build packages. Due to the extensive number of packages in the Nixpkgs repository, the process can be slow, causing delays in the release of updates. As an example, the updated xz 5.4.6 package...
Why isn't it recommended to change the SIGINT shortcut from Ctrl+C to something like Ctrl+SHIFT+C?
I read a lot of answers online that its a bad idea, but the arguments did not make a lot of sense. “it’s a heavily ingrained part of the eco system”. Well if I can change it, what’s the deal?...