[-] smb@lemmy.ml 2 points 4 days ago

thats partly what abortion rights are about

[-] smb@lemmy.ml 2 points 6 days ago

Router is my own and up to date.

that does not say its dns settings are as you set them. if you use a default or weak password for your routers config page, an attacker could change its setting from the outside via dns rebinding, then scanning your net, finding your router, trying passwords and when succesfull changing firewall rules or change dns settings to make your programs check the attackers repository proxies instead of their vendor ones.

dns rebind: https://www.packetlabs.net/posts/what-are-dns-rebinding-attacks/

so better check its dns settings, that it likely is pushing to dhcp clients, too.

Thanks to flatpak it also doesn’t have the ability to see anything else from my system. it at least seems to asks for seeing way more..

jdownloader could theoretically also got hacked by a site you were downloading from. maybe having a complete list of what you downloaded and check those again but using source provided (and signed?) hashes could reveal something fishy.

maybe (if thats possible there) make a memory/debug dump from the process in that condition and ask the vendor to look at it.

maybe check your downloaders binary hashes and compare it to the vendors signed ones.

[-] smb@lemmy.ml 0 points 6 days ago

the jackass addition was a joke from my side as it fits the j in front and the situation presented perfectly, no matter if the original app did so or if it was hijacked somehow.

however i used to use a separate downloader a very long time ago, when downloading i.e. an iso image for a new foss os took just too long, could be interrupted by time-togo-to-bed or anything else.

one day i learned about another downloader to be spying. at that time the downloaders in good browsers did what i needed and i turned completely away from separate downloaders as using more products always increase the attack surface and i didnt need such any longer.

for crawling i guess there are better tools than a downloader that needs to be fed by clipboard.

for downloading a lot of files in parallel from a list, i would personally use a quickly coded script (download link from parameters using wget or on failure append the link to a failed-list) and then use something like:

cat list | xargs --some-parameters ./dl-script.sh

so that i could set limits of parallel downloads using the xargs parameters while not needing any extra software and beeing able to redownload the failed ones by just renaming the lists filename and run the command again.

wget seems to support resume too, so i'ld try it that way but i never needed to.

if you need the resume feature or download a lot on a daily basis, want adjustable speed limits by few clicks etc. a specialized downloader application is probably a better way to go and usually has a gui if you need that, but i have no need for downloaders and thus cannot recommend any except for quick use of wget and xargs maybe ;-)

in general however i have 'learned' to try to prevent the use of products of specific programming languages which i had often more problems with than with others. its perl, ruby and java programs i try to prevent to use whenever possible. but that is based on personal experience like with ruby programs often basics (like turn on logging to find the problem didnt even log a single line not even in its debug mode) that are needed to at least administrate such programs were missing, bad or unhandy like java's log4js default log rotation was horrible to use when forwarding logs and log4j was another thing by itself. However thats personal preferece to not use programs coded in these languages. same as with not using that one os vendors programs that are always in the news since decades with every week or so yet another 100% preventable security issue ;-) i just don't like such.

[-] smb@lemmy.ml -1 points 6 days ago* (last edited 6 days ago)

you ... installed the JackassDownloader !!?!

maybe check your routers and pc's dns settings, if you have a router from your provider, maybe its outdated as hell and jdownloaders updater got redirected by someone who hijacked it?

[-] smb@lemmy.ml 35 points 2 weeks ago

but obviously a diagram doesn't help the willingly blind ;-)

but curious to see the slides too.

[-] smb@lemmy.ml 29 points 2 months ago

well, before that and for generations, banks printing money was an acceptable way of governments to make rich people richer and all others poorer, so i can fully accept that stealing was learned from govs and the richies there. change how "the successfull" accomplish their successes and you can teach the kids how to live without stealing, keep abuse by gov and richies as is and all the theft is done exactly as ordered by govs and richies, no matter the age.

82

The big picture: Israeli officials said their increasing attacks against Hezbollah are not intended to lead to war but are an attempt to reach "de-escalation through escalation."

wtf

132
submitted 4 months ago by smb@lemmy.ml to c/technology@lemmy.world

https://therecord.media/ford-patent-application-in-vehicle-listening-advertising

Looks like Ford just voted to NOT be my choice of car vendor in future.

However getting this patent could be used by Ford to prevent such systems from beeing used by all vendors, but thats veery unlikely i guess.

[-] smb@lemmy.ml 34 points 5 months ago

we should build more such bridges.

[-] smb@lemmy.ml 46 points 5 months ago

antarctica:

  • no bad politics
  • no wars so far
  • people there are mainly interested in science
  • no economic abuse or exploitation
  • pinguins!
  • no air conditioning needed to survive the summer.
  • winter is offline time, visitors won't arrive or leave then.
  • last place to stay cool during boomers heritage "heat death of our planet"

well sure, it has downsides too. Next Rollercoaster park is -tbh- unreachable, internet connection is sloo.oo..oow (or did they already finish the submarine fibre cable?) and sunbathing basically only brings you frost bites (if you're lucky).

However i am not planning to migrate there.

[-] smb@lemmy.ml 60 points 5 months ago

news from msn...

https://www.entrepreneur.com/business-news/microsoft-ai-publishes-fake-news-on-msn-angers-the/464775

"MSN's editorial AI published stories from low-quality outlets that are patently untrue, […]"

maybe this is also just some cheap msn lies?

34
submitted 6 months ago by smb@lemmy.ml to c/technology@lemmy.world

looks like:

  • They claimed to be a trustworthy public CA (that can handle security incidents)
  • They made commitments to be included as trustworthy in common Browsers and OS'es
  • They now willfully break those commitments to rely on 2B2F only...
  • They do not even answer valid questions for month in a process that they should have already completed within 5 days as was defined in the commitments they agreed upon.

Maybe Honest Achmed's Used Cars and Certificates should show up again once more !?

[-] smb@lemmy.ml 26 points 7 months ago

its amazing how good services can be if some just skip the corporation-obligatory adding of enshittification. i remember an article about a downloadable (but not very legal) DVD with an installer for a (worthless but very popular) OS that included heaps of expensive industry software and the installer was point-klick what you want and then all is done in background and fully usable once done. reading that article it seemed to be a better installer than ever produced by any company for any product.

however as that payed streaming service seemingly leaves huge amount of bank records and ran for such a long time, i guess it would have been easy to stop their customers from paying them. it rather might seem that the real intentions of content corporations might not truely be what they officially claim. maybe we learn in 25 years that the content corporations really were behind such services, maybe like "better get money from ALL markets!" or such.

[-] smb@lemmy.ml 45 points 10 months ago* (last edited 10 months ago)

anyone remember the time when google removed(!) their internal "don't be evil" rule? guess this is part of the outcome of that "be evil" that came along with removal of the opposite. Abuse of this mechanism is IMHO veery predictable ;-)

There are plenty of google-free cellphones, one could easily stick to better products of better companies. help yourself, google's not gonna do that for you within the next 5billion* years as they IMHO already stated they "want" to be evil now, always remember that ;-)

*) thats round about when our sun expands too much for earth, so i currently dislike doing any predictions beyond that point ;-) i do not predict google would last that long, only that they'll keep beeing evil until their end.

[-] smb@lemmy.ml 28 points 11 months ago

have a look on "snowdrop" (search together with "steganography"), its basically the opposite of what you want, but worth mentioning here. watermarks could be placed into whitespace (not limited to actual spaces or linebreaks, intentionally changed usage of paragraphs, tabs or even page boundaries could possibly be detected after scanning andeven after OCR. IMHO snowdrop uses -depending on choosen operation mode- small errors like misspelled words, commata etc but also has a mode that comes along with fine grammar and without misspelled words...

how do you make sure that by diff'ing two versions you do cover "everything' that has been deliberately placed into both documents but share literally the same informations?

lets say you bought two books at two different stores with two different watermarks. if the watermark contains the date and time of the purchase and the only difference of this were the minutes because you bought them within the same hour, the remaining watermark would point to all buyers that bought exactly this book in this hour - worldwide. but still it could be "very" precise depending on all other(!) buyers, if they exist at all within that timeframe. what if the watermark includes unix epoch? then the part which is the same in both watermarks would not be bound by hours, but by seconds, 10seconds, 100seconds etc.

and you could not know if there were other watermarks hidden that just happened to be the same for your two (three.?) purchases (same country, continent, payment method, credit card holder name, name of internet provider used during purchase, browser used etc.) it fully depends on the creator of the watermark what would be included and what not. if you happem to know all that (without any possibleexemptions) you might be on the safe side, but if not...

my general suggestion here is:

  • if you want to be sure to not getting into trouble, then just don't do it.
  • if that book is too expensive compared to its content, just not buying it possibly also helps the market to fix the problem.
  • save that time and instead help those who already fight for a better world.
  • search already licence free books (or such as "cc" licensed) and promote those instead, help improving free resources like openstreetmap, wiki* but do not publish licence-poisoned content there, wtite it yourself, alway.
  • write your own book and publish it free.

just to mention... the "safe" side sometimes seems limited but maybe is actually not, if you really look at it.

view more: next ›

smb

joined 1 year ago