damium

@damium@programming.dev

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Trying to understand Consent Forms, Cookies and Third-Party Vendors (slrpnk.net)

Yo peeps, I’m currently looking into TCF Vendors, Ad partners and their whole corporate greed hellhole of tracking. I am writing a paper on this, and would like for everything to be factually correct. However, I am struggling to understand one particular part of this “transparency framework” and hope someone can help me...

damium,

It’s not well explained for sure but judging by the names of the cookies I bet those store the consent (opt in/out) values for the other tracking options. Another way of putting it would be those are functional cookies related to the cookie consent form itself so that you don’t have to re-select consent options every time you visit the site.

damium, (edited )

I’m not an electrician so I don’t know if it would be up to code (very likely is not) but you might be able to use a current sensing relay to trigger the lights. For safety I would add a local disconnect as well.

damium,

If 35° (or something close to it) is the slicer setting for overhang detection it likely changes the cooling/speed/flow settings. If that is the case you can set it to a lower detection value and maybe get better results or change the normal cooling/speed/flow to be closer so it isn’t as drastic of a change.

damium,

From what I’ve read is not authentication bypass, it’s a RCE using certificates to deliver the payload. If a specific signature is found it runs the code that was sent in place of the signing public key. It also means that only someone who has the ability to generate that specific key signature could use the RCE.

There were some other bits that looked like they could have been placed to enable compromising other build systems in the future when they checked for xz support.

damium,

If filesystem UUIDs are IP equivalents. Then device paths are MAC addresses. FS labels are DNS. Device mapper entries are service discovery.

Is full caps account names not normal ?

LIKE_THIS ? And do i come of as some kinda culty weirdo ? I thought that looked formal and trademarky ? Am i a zoomer aldready out of touch and becoming cringe ? Should i change my accs to small letters but i’ll lose my block history whuch is almost 1000 /c/ any way to back that up ?...

damium,

Business systems from the 80s used to automatically convert everything name related to caps. It made it easier to do string matching which was generally case sensitive in the DB. It also made data entry easier as you just turn capslock on and type.

No so much formal as lazy semi-formal.

damium,

The biggest issue is that your corners are lifting from the bed during the print. Fixing this is usually a combination of making sure the bed is clean and adding a brim to increase adhesion. Maybe messing with temperature and cooling fan settings for the first few layers.

Second is things look a bit over extruded. This could just be due to the corner issue though so fix that before any other changes.

damium,

The reasoning is that it is not illegal to fake most student ID cards but it is a federal offense to fake or alter government issued ID documents.

That way if it becomes an issue they can just pass it on to the authorities as their problem.

damium,

“Invalid” or “unparseable” are more understandable descriptors in normal language. I don’t think I ever heard of garbage/junk being used for that in language theory but it may be domain specific usage.

damium,

There are a lot of edge case characters around visually indistinguishable names. If that is a concern usernames should use a restricted known character sets instead of trying to block specific characters. You likely should also treat lookalike characters as equivalents when checking for username overlap.

damium,

As someone who also has produced code that looks like random characters spewed onto a terminal while using fpdf, I feel this one.

damium,

It can still have issues with potential attacks that would redirect your client to a system outside of the VPN. It would prevent MitM but not complete replacement.

damium,

Likely you needed to include the intermediate cert chain. Let’s encrypt sets that up automatically so it’s quite a bit easier to get right.

damium,

10.x.x.x is a private range. It won’t be your externally visible internet address but it might be your router’s WAN address if your upstream ISP is performing a NAT for IPv4 or if you have multiple chained routers in your network. If that is your router’s WAN address you likely won’t be able to use port forwarding for external access.

You can find your external address by visiting ifconfig.me or from a linux shell running curl https://ifconfig.me

My recommendation would be to start from the other direction instead. Try and get the reverse proxy working with a SSL and a test page then work on making your nextcloud instance visible. You can use a tunneled service from cloudflare or tailscale to avoid the port-forwarding and add a layer of security.

damium,

IIRC the PS3 had it’s firmware encryption key published not the source code.

How do scammers overtake a youtube account with 2fa enabled

Saw a video of a youtuber that got his account overtaken which has 2fa enabled (not sure which method but I’m thinking sms). He says he didn’t get phished, downloaded anything and his session cookies weren’t stolen and I believe him. The only clue is that he received a sms otp from google but was invalid when he inputted...

damium,

There is also SMS passive reading using LEO intercept. Hacked police email accounts are used to gain access to carrier systems where they use “imminent threat” no warrant lookups to pull the SMS in real time.

SMS is a terrible form of 2FA, better than none but not by much.

Upgrade vs Reinstall

I’m a generalist SysAdmin. I use Linux when necessary or convenient. I find that when I need to upgrade a specific solution it’s often easier to just spin up an entirely new instance and start from scratch. Is this normal or am I doing it wrong? For instance, this morning I’m looking at a Linux VM whose only task is to run...

damium,

Your experience may depend on which distro you use and how you install things. If you use a distro with a stable upgrade path such as Debian and stick to system packages there should be almost no issues with upgrades. If you use external installers or install from source you may experience issues depending on how the installer works.

For anything complex these days I’d recommend going with containers that way the application and the OS can be upgraded independently. It also makes producing a working copy of your production system for testing a trivial task.

damium,

Fridges with a dial usually are an uncalibrated simple analog thermostat sensor (often a gas tube with a pressure switch) along with a simple analog control board. Fridges with a digital thermostat tend to use a calibrated sensor (usually a thermocouple) with a digital control board.

damium,

You might also try running a few leveling probes in a row to check the repeatability of the measurements. It’s possible that something is messing with the ability to make good measurements (unstable power feed, heat warp, probe binding, etc).

damium,

I had that very device right about 2002. Put my whole CD collection on a few mp3 disks. Replaced it a few years later with a 6GB mp3 player.

damium,

That’s awesome, I had an iRiver as well. Ended up putting custom firmware on it after a bit as the original firmware was buggy at times and lacked features. The device itself was surprisingly capable and could even play video.

damium,

Yeah, I think that was it. I also played a heck of a lot of sudoku on it.

damium,

I’n Windows it is not stored in a keyring but instead in the registry. This has basically the same security threat model as a local key file.

The ssh-agent on Linux will do what you want with effectively the same security. The biggest difference being that it doesn’t run as a system service but instead runs in userspace which can make it easier to dump memory. There are some other agent services out there with additional security options but they don’t change the threat model much.

damium,

Initrd contains the systemd binary and enough libraries, services, and kernel modules to get booted this far. The system failed at switch root which is where the real root disk is mounted. Initrd can contain as much or as little as needed to get a working system which can be a lot of you are using a network filesystem as a root for instance.

damium,

You can also use o1e as there are never more than a single shared character. It also doesn’t change the string size so it can be done in place. Still an ugly hack of a solution.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • kavyap
  • DreamBathrooms
  • InstantRegret
  • magazineikmin
  • ngwrru68w68
  • cubers
  • thenastyranch
  • Youngstown
  • rosin
  • slotface
  • cisconetworking
  • mdbf
  • ethstaker
  • JUstTest
  • Durango
  • khanakhh
  • GTA5RPClips
  • anitta
  • osvaldo12
  • everett
  • normalnudes
  • tester
  • tacticalgear
  • provamag3
  • modclub
  • Leos
  • lostlight
  • All magazines