[-] drspod@lemmy.ml 12 points 3 hours ago

The amount of advertising for this tool in recent times is starting to look a lot like astroturfing.

[-] drspod@lemmy.ml 4 points 6 hours ago

spinning around Earth in a horseshoe shape for about two months

what? what kind of orbit is that?

[-] drspod@lemmy.ml 6 points 1 day ago

Not my post btw, just sharing the link :)

[-] drspod@lemmy.ml 8 points 1 day ago

Sorry for the reddit link, I don't know of a mirror. This was posted just today, running on an EeePC:

https://www.reddit.com/r/unixporn/comments/1fitgri/labwc_pimp_your_10_inches_laptop_with_alpine_linux/

[-] drspod@lemmy.ml 28 points 1 day ago

The binaries in question are various GNU and FOSS tools from elsewhere, not part of the Ventoy project itself. So no, the Ventoy author does not own the copyright of the tools in question.

[-] drspod@lemmy.ml 6 points 2 days ago

So your approach to security is that you cross your fingers and hope?

[-] drspod@lemmy.ml 25 points 2 days ago

Ventoy has a lot of work to do if they want to earn our trust:

Remove BLOBs from the source tree #2795

This ticket has been open now for 5 months with no engagement from the maintainer.

Your install media and anything that modifies your EFI partition or UEFI firmware settings needs to be the most trusted part of your system. And here is Ventoy, a tool that looks open source and then includes a large number of binary blobs in its repository, with no indication of how they were compiled. This is horrible security practice and for me that's enough for me to never use it.

You can also see a discussion on the subject on HN here: https://news.ycombinator.com/item?id=40689629

A much better alternative, if you want a multi-boot USB, is GLIM: https://github.com/thias/glim

It's just a collection of Grub configs, so very simple and easy to audit.

[-] drspod@lemmy.ml 11 points 2 days ago

From my understanding, a lot of code in the graphics drivers is special-case handling for specific games to optimize for the way that the game uses the APIs. Is this correct?

In which case it would make sense to have the game-specific code loaded dynamically when that game is launched, since 99.99% of the game specific code will be for games that the user never runs.

[-] drspod@lemmy.ml 20 points 2 days ago

I used Ubuntu from version 8.04 to 18.04 and not once did I have a successful upgrade between major versions. There is always something that gets broken to the point that a reinstall is necessary.

[-] drspod@lemmy.ml 18 points 2 days ago

That's a huge difference, the estimate became 10,000 times smaller.

35
submitted 2 weeks ago* (last edited 2 weeks ago) by drspod@lemmy.ml to c/programming@programming.dev

Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.

The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

368
submitted 3 weeks ago by drspod@lemmy.ml to c/196@lemmy.blahaj.zone
23
submitted 5 months ago by drspod@lemmy.ml to c/chess@lemmy.ml

Description: "Featured is a playthrough of a blitz chess game between Rodrigo Vasquez and Vladimir Kramnik from an Early Titled Tuesday event which was held on October 17th, 2023. Kramnik recently admitted, via a YouTube comment on this topic of fair play surrounding him, that he played several tournaments under someone else’s chess.com account. This act violates chess.com’s Fair Play Policy. Kramnik played under Denis Khismatullin’s account, “Krakozia”. I share reasons why this is a violation of fair play policy, how a player can be negatively impacted because of it, and provide Kramnik’s YouTube comments where he attempts to explain it all."

294
submitted 1 year ago by drspod@lemmy.ml to c/privacy@lemmy.ml

cross-posted from: https://lemmy.ml/post/4912712

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

193
submitted 1 year ago by drspod@lemmy.ml to c/technology@lemmy.ml

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

332
submitted 1 year ago by drspod@lemmy.ml to c/linux@lemmy.ml

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

view more: next ›

drspod

joined 2 years ago