[-] Gellis12@lemmy.ca 9 points 1 year ago

Tor. It's free, it works, and there's nobody to sell you out when the cops come knocking.

[-] Gellis12@lemmy.ca 5 points 1 year ago* (last edited 1 year ago)

Definitely sounds like auto-update if it's respawning itself on every boot. The fact that it never exits is weird though; have you added any third party repos? What's in your apt sources.list file(s)?

[-] Gellis12@lemmy.ca 9 points 1 year ago

Your debts cannot be transferred to your next of kin when you die, but they will need to be paid out from your estate before it's disbursed to your family

[-] Gellis12@lemmy.ca 5 points 1 year ago

"Maybe if we slap his wrist again, he'll start being a good cop this time!"

[-] Gellis12@lemmy.ca 62 points 1 year ago

Vandalism would normally be covered by comprehensive coverage, and won't affect your premiums; you'll just have to pay a deductible. If you tried to do it yourself, you'd never get the paint to match quite right, so you're better off taking it to an auto body shop to have it professionally repaired.

[-] Gellis12@lemmy.ca 39 points 1 year ago

I'm out of the loop, what's the context for all this?

[-] Gellis12@lemmy.ca 17 points 1 year ago

All I see is hunter2

[-] Gellis12@lemmy.ca 10 points 1 year ago

It's essentially to add a unique salt to each machine that's doing this, otherwise they'd all be generating the same hash from identical timestamps. Afaik, sha hashes are still considered secure; and it's very unlikely they'd even try to crack one. But even if they did try and were successful, there isn't really anything nefarious they can do with your machines local name.

[-] Gellis12@lemmy.ca 25 points 1 year ago

Here's a quick bash script if anyone wants to help flood the attackers with garbage data to hopefully slow them down: while true; do curl https://zelensky.zip/save/$(echo $(hostname) $(date) | shasum | sed 's/.\{3\}$//' | base64); sleep 1; done

Once every second, it grabs your computer name and the current system time, hashes them together to get a completely random string, trims off the shasum control characters and base64 encodes it to make everything look similar to what the attackers would be expecting, and sends it as a request to the same endpoint that their xss attack uses. It'll run on Linux and macOS (and windows if you have a WSL vm set up!) and uses next to nothing in terms of system resources.

[-] Gellis12@lemmy.ca 5 points 1 year ago

The encoded strings are https://zelensky(dot)zip/save/ and navAdmin

[-] Gellis12@lemmy.ca 6 points 1 year ago

It's pretty common for a laptop to have a dedicated gpu, plus the integrated gpu that's actually part of the cpu.

[-] Gellis12@lemmy.ca 16 points 1 year ago

I mean, the one and only reason they exist was because Volkswagen got caught cheating diesel emissions tests. As part of their punishment, they were required to create an ev charging network, and it seems they've been dragging their heels the whole time, trying to make it fail.

view more: next ›

Gellis12

joined 1 year ago