Yes sorry, I didn’t realize that until I posted it and saw all of the “cross-posted to:” links. It’s the first time it’s posted to this community though, and I think it’s an important topic.
Gentoo users in shambles
The binary blobs match which checksums? The ones provided by the ventoy developer?
GLIM is an alternative that’s much simpler (it just uses Grub configs) so it is easy to audit:
Please don’t continue to recommend Ventoy. It has serious and unanswered security questions hanging over it, and the developer seems to be completely AWOL.
*your
It’s pretty easy to check and see that this isn’t how it works. I checked both my instance and yours and both of them host the images that have been posted to communities on other instances, so clearly images are transferred (or cached) between instances.
Pretty sure this was described exactly in Snow Crash (Neal Stephenson, 1992).
Isn’t it the Cloudflare bot detection page that says “Just a moment” (… while we check that you’re human)?
It’s probably because lemmy servers are constantly loading a bunch of websites to generate previews and Cloudflare decides that those clients look like bots.
The amount of advertising for this tool in recent times is starting to look a lot like astroturfing.
Not my post btw, just sharing the link :)
Sorry for the reddit link, I don’t know of a mirror. This was posted just today, running on an EeePC:
I used Ubuntu from version 8.04 to 18.04 and not once did I have a successful upgrade between major versions. There is always something that gets broken to the point that a reinstall is necessary.
(Federated) email didn’t survive. It got completely subsumed by the major providers who now have control over everything email related. It’s now impossible to run your own email server since none of the major providers will deliver your email without your mail server having first built a reputation.
The fediverse analogy would be if 99.9999% of users were on Threads and you couldn’t interact with any of those users from any of the small independent fediverse servers. Frankly, that’s exactly what it looks like is happening.
It’s not reading the contents of RAM via EM emanations, it’s using the EM emanations caused by certain memory access patterns as a side channel to exfiltrate data. Of course, that data could be anything, including whatever is in RAM, but the point is that you need to be running the code that generates the necessary memory access patterns to transmit the bits of data. This is not like TEMPEST where you can reconstruct a video display just using the emanations.
Are you using the Import/Export Settings
buttons in the settings page?
If you can reproducibly crash an instance then you should definitely file this as an urgent security issue in the lemmy repo so it can be fixed: https://github.com/LemmyNet/lemmy/issues
Are you one of the three proposers mentioned in the git repository?
closest current one I can find is
or
Informative and interesting article, thanks for sharing.
Quite a few of these POSIX improvements were new to me, even though it turns out that they already exist in the GNU versions of the tools.