games games Hogwarts Legacy players frustrated as Starfield and Baldur’s Gate 3 outshine Harry Potter game - Dexerto | Ghostarchive
Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    You are right, they should rewrite the engine, but they didn't and they preferred enforce the development on the re-re-re-re-re release of titles like skyrim for every possible platform on the plant.

    Look at what Larian did instead.. Took 6 years, added beta access and listened to the players. BG3 is far from being bug-free or "perfect" but they released a game that give almost total freedom on how you can play it, and doesn't feel like you are on rails every time.

    The problem is bethesda and others "AAA" software houses for years just did the lazy job and now that a software house showed what 6 years of real development should look like everyone is doing the Pikachu face and crying because "We don't want BG3 to set a new standard". The issue is us, the players, that keep buying shit for too much money.

    1
  • nixos
    NixOS himazawa 1 year ago 100%
    How is the situation of nix/nix-darwin/home-manager on macOS?

    Used nix last year but dropped it after home-manager decided to unlink the apps from the Applications directory. How is the current situation on usability of nix-Darwin + home-manager + brew? Packages still fails to get indexed correctly in spotlight? I really like a fully repro environment but the fact that the usu ability was low bothered me a lot.

    5
    1
    games games Hogwarts Legacy players frustrated as Starfield and Baldur’s Gate 3 outshine Harry Potter game - Dexerto | Ghostarchive
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    BG3 is unmatchable, not only for hogwarts legacy but for every other game.

    Starfield on the other end.. is the same oblivion stuff but in 2023 and without 2023 capabilities

    29
  • homelab Homelab What’s in your homelab? (July 2023)
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    A raspberry with Adguard + unbound, a zimaboard with truenas scale running the -arr suite, nextcloud, homeassistan, homarr, headscale and caddy 2x2TB nvme and 3x 4tb HDD I recently got a new PC and I think I will convert it to being part of the homelab, it has a ryzen 7 3xxx and a 2070 super.

    1
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Ye you are right but I was talking of 3D enclosures where you can put a zimaboard or whatever mini pc.

    2
  • selfhosted Selfhosted A few questions about selfhosting from a newbie
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    The difference is that you need way more interaction. Expose a webserver on the internet and check how many requests you get from just bots.

    You can control what you navigate and how to interact with the outside world, but you can’t control how the outside world will interact with your services.

    2
  • selfhosted Selfhosted A few questions about selfhosting from a newbie
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 50%

    Don’t expose anything from your local network to the internet (unless you want multiple new sysadmins in your house). Try tailscale instead.

    0
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Anyone knows if there is any project for a modular NAS? Have been looked into it for a while but without success

    2
  • ergomechkeyboards ErgoMechKeyboards Low profile keyboard compatible with choc switches
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    It's pretty funny, because from mechanicalkeyboards they suggested to post here because you have more knowledge on low profile keyboards.

    1
  • ergomechkeyboards ErgoMechKeyboards Low profile keyboard compatible with choc switches
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 50%

    How much like the corne do you want it to be?

    like a normal keyboard and not split

    Also, how DIY do you want to get?

    As long as no soldering is required I am up for everything

    0
  • ergomechkeyboards
    ErgoMechKeyboards himazawa 1 year ago 56%
    Low profile keyboard compatible with choc switches

    I am looking for a low profile keyboard compatible with the choc switches. I plan to put the choc sunset on it. I was looking for something similar to the Corne, just without the ergo-split thing. A standard 65-75% would work. Bonus for hot swappable and no soldering required.

    2
    16
    cybersecurity cybersecurity X-post: Better understanding and mitigating the risks of using a phone that no longer receives system updates
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    WannaCry targeted hospitals, businesses and similar machines.

    WannaCry targeted everything with SMB exposed, blindly.

    Also, you should read more about security through obscurity, the fact that "no one will target you because you are a low-value target" is a false sense of security.

    6
  • cypherpunk cyph3rPunk Recreating Government Security Standards at Home (Hardened iPhone) [8:58]
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    I don't know why the author of the video didn't mention it but LockDown mode is really useful.

    At least for me the default is lockdown mode on and appropriate exceptions for websites I trust.

    3
  • cybersecurity cybersecurity X-post: Better understanding and mitigating the risks of using a phone that no longer receives system updates
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    I believe the risk of running outdated software is super inflated and mediatic, 99% of people would be absolutely fine running a version of Android from 3 years ago or Windows 8.

    That's the same thing people running windows XP on internet were thinking in 2017.

    Then WannaCry arrived and they got their data encrypted :)

    3
  • cybersecurity cybersecurity X-post: Better understanding and mitigating the risks of using a phone that no longer receives system updates
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Perhaps images, video, font etc. rendering could be compromised?

    Yes, it already happen in the past. Also the Wi-Fi and Bluetooth stack got exploited, like multiple kernel drivers.

    But it shouldn't be a matter of "in the past was X exploited?" but more on having a correct security posture.

    Honestly if you are arguing about wasting a "perfectly working phone" you should blame it on the vendor, especially Android devices vendors have this let's say "defect" of dropping the support after 4/5 years.

    Also not going to talk about custom ROMs (with the super rare exclusion of some) managed by god knows who, without any security team behind.

    Since even the NFC and Cellular Network stack got vulnerabilities the only way you would consider an old phone "safe" to use is just turning it into the equivalent of a local ARM server.

    Also pretty fun seeing the replies in the original post talking about how Google Play store shouldn't have malware on it.

    3
  • mechanicalkeyboards
    Mechanical Keyboards himazawa 1 year ago 100%
    Low profile keyboard compatible with choc switches

    I am looking for a low profile keyboard compatible with the choc switches. I plan to put the choc sunset on it. I was looking for something similar to the Corne, just without the ergo-split thing. A standard 65-75% would work.

    1
    1
    technology Technology anytype — decentralized, p2p, e2ee 'Notion' like app
    Jump
    exploitdev Exploit Development CVE-2023-2033: Chrome [0-day] JIT optimisation issue
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Exploited in the wild, reported in April, no fix since then?

    Edit: looks like it was fixed on the 26th of April, why is tagged as 0day?

    1
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Ahaha I had this exact same experience. Locked out because bitwarden didn’t get the code correctly. “Luckily” the jwt token never expires so I was able to log back in without the 2FA.

    1
  • genzedong GenZedong Does anyone know where this image is from
    Jump
    genzedong GenZedong Does anyone know where this image is from
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 50%

    Honestly curious, why? I live in a country that doesn’t have it but I don’t see downsides if the crimes committed are way too bad. For example, why keeping alive (with contributors money) a serial killer?

    0
  • rpgmemes RPGMemes With my recent de-modding and ban from the DnDMemes sub, I now have plenty of time to touch grass and help grow this community/instance. AMA I guess?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    So in the end you got removed.. I honestly have no idea how they want to do an IPO like that

    5
  • ai_infosec AI Infosec PoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake news
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    I wonder if people when talking about AI just ignore the fact that it’s software and has the same issues and vulnerabilities related to that.. recently I see a lot of posts talking about “AI security” and in the end are stuff known since 1995…

    1
  • selfhosted Selfhosted Should I use one docker-compose.yml for all my services?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    I was thinking about that just today, I have something like 30+ services running on a single compose file and maintenance is slowly becoming hard. Probably moving to multiple compose file.

    2
  • lemmyshitpost Lemmy Shitpost a battle that will end up in flames
    Jump
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearEX
    Exploit Development himazawa 1 year ago 100%
    Manjaro 0day LPE via pamac github.com
    2
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearIN
    Set default language to English

    What about setting the new language of a post to English? There are people that don’t know how lemmy works that keep on opening new posts and leaving the language to “Undetermined” by mistake so no one can answer them.

    2
    5
    piracy Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ **this seems to be the theme of the season mateys**
    Jump
    technology Technology Be careful. New platforms invite bad actors.
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Because I wanted to try if others URI schemas were supported instead of http / https. file:// was a valid one. Don't worry, the day an attempt of data exfil will happen, you will not see it though your console logs.

    2
  • infosecpub Discussions related to Infosec.pub Malicious actions originating from infosec.pub?
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Take a look at my answer there. It was my fault apparently.

    TL;DR: I set the image channel icon to /etc/paswd and forgot about it, people saw a suspicious call and panicked, sorry.

    15
  • technology Technology Be careful. New platforms invite bad actors.
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Is this, by any chance, originated from the sub called ignore me? In that case is probably my bad because is set as the image of the channel. I was playing with lemmy in the previous version and forgot about it, sorry.

    I created that channel to investigate why the lemmy instance was hanging every time there was a symbol in the URL, added that URI as icon for fun and forgot about it.

    That alert appears because your browser is trying to load an image with that path, nothing dangerous or remotely exploitable, don't worry.

    Edit: I removed it so you shouldn't see the alert anymore.

    P.S. no, it's not trying to steal anything, it's your browser trying to load that file as an image but instead of being let's say this url: https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png (this sub icon) , it's this one file:///etc/passwd so you browser is doing the request to your own file. Don't worry, nothing got compromised.

    /cc @shellsharks@infosec.pub

    13
  • cybersecurity
    cybersecurity himazawa 1 year ago 91%
    Unclassified FBI Document: Ability to legally access Secure Messaging App Content and Metadata (January 2021)

    cross-posted from: https://beehaw.org/post/789646 > An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act. > > > This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve: > > * **Apple iMessage**: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone. > > * **Line**: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location). > > * **Signal**: date and time of account creation and date of last connection. > > * **Telegram**: IP address and phone number for investigations into confirmed terrorists, otherwise nothing. > > * **Threema**: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date. > > * **Viber**: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination). > > * **WeChat**: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users. > > * **WhatsApp**: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups. > > * **Wickr**: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting. > > **TL;DR Signal is the messaging system that provides the least information to investigators.**

    10
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearIN
    Unclassified FBI Document: Ability to legally access Secure Messaging App Content and Metadata (January 2021)

    cross-posted from: https://beehaw.org/post/789646 > An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act. > > > This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve: > > * **Apple iMessage**: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone. > > * **Line**: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location). > > * **Signal**: date and time of account creation and date of last connection. > > * **Telegram**: IP address and phone number for investigations into confirmed terrorists, otherwise nothing. > > * **Threema**: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date. > > * **Viber**: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination). > > * **WeChat**: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users. > > * **WhatsApp**: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups. > > * **Wickr**: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting. > > **TL;DR Signal is the messaging system that provides the least information to investigators.**

    3
    0
    cybersecurity cybersecurity Training Tuesday - Discussions for certs, training and learning-at-home
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Playing around with the SecureFlag platform, pretty interesting IMHO. Also want to start a new language to stick with, I am pretty undecided between Zig (but is not memory safe by design) elixir (functional programming still isn't my thing) and nim (can't handle any more language with indentation-based codeblocks).

    Any suggestion is welcome, I will use them to build mostly security tools.

    2
  • securitynews Security News CISA orders agencies to patch iPhone bugs abused in spyware attacks
    Jump
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    1 year ago 100%

    Why Russia thinks they cooperated with Apple when the agencies can just buy 0days from the resellers?

    2