- ShowalkKamamagnet:?xt=urn:btih:QECTODWX3OSQ3R7MMWP5M5KQK2NU3WFA&dn=insidececot&tr=http%3A%2F%2Fbt1.archive.org%3A6969%2Fannounce
- he's asking you to paste his public key, not your private one.
- >And yet, not much has changed in that decade, right?
the performance difference between SteamOS and Windows did
>Well, other than the Steam Deck, which is a well-defined set of hardware for a specific purpose, and which is the main driver for Linux game compatibility... >And that's great! But for a random owner of random hardware. the experience is, well... same as it ever was?
the 2025 ars technica benchmark was performed on a Legion Go S, not on a steam deck
- becuase the one he linked is from this year, the one you linked is from 10 years ago
- Because spaces, tabs, CR and LF are invisible too yet perfectly normal to find within code. You could very easily implement a decode() function that uses only those characters.
- >What about DDoSs that come from sideloaded, unofficial, buggy, or poorly written apps? That's what IoT manufacturers will point to, and where most attacks historically come from.
any source for this claim? Outside of very specific scenarios which differ significantly for the current botnet market (like manjaro sending too many requests to the aur or an android application embedding an url to a wikipedia image) I cannot remember one occourence of such a bug being versatile enough to create a new whole cybercrime market segment.
>They'll point to whether your Mac really needs more than 100mbps.
it does, because sometimes my computer bursts up to 1gbps for a sustained amount of time, unlike the average iot device that has a predictable communication pattern.
>Signed firmware and the sideloading ID requirements on Android also helps to prevent stalkerware, which is a growing threat far scarier than some occasional sideloaded virus or DDoS attack. Never assume sideloading is consensual.
if someone can unlock your phone, go into the settings, enable installation of apps for an application (ex. a browser), download an apk and install it then they can do quite literally anything, from enabling adb to exfiltrating all your files.
- It is available.
Builder number: 2025030300 (in Settings > About phone)
- >most root-avoiding/ROM-block-avoiding features just aren't available on it
this isn't really an issue, I've been an happy GrapheneOS user for quite a while and I've found 0 apps that refuse to run on it, even several banking apps, paypal and other "sensitive" applications that usually block "tampered" devices.
Do note that I've relocked my bootloader and haven't installed magisk (but I'm confident in saying that hiding magisk is easy since before GrapheneOS I used LineageOS + microg + magisk without having trouble running banking apps)
- you can use https://cdm-project.com/Android-Tools/dumper-diazole.git
it uses frida to make dumping l3 keys really easy (start frida, run the script, open firefox, visit a test DRM page, profit??)
- >Honestly we should have a name for such class of bugs.
They are called parser differentials
- >Digging through a mountain of strace output is tedious
did you consider logging the syscalls invoked during normal usage with 'strace --output=/some/dir -f ...'? This + grep + uniq should make it really simple.
- >But, if anything should be a decentralized anonymous crypto-paid service, it should be a VPN network
so it should be tor?
- >but a bunch of the internet breaks if you do that.
not really, no. From my experience most stuff works fine (the thing that breaks websites the most is webgl and even then, only the few websites that really need it use it)
- it's open source, you can simply look at the code (or, better, at the differences with firefox)
- just to be sure if you use firefox you can set network.IDN_show_punycode to false in about:config
this will make the url bar display the encoded version instead (xn--wikipedi-86g.org)
- some people do it for fun / just because they can
- only 5 or 6?
4k a month is way more than the average person makes in my country, that's 3.84M for 80 years.
225 / 3.84 = 58.59 people
there is no fucking way you can justify that number but oh well, what can you do about it?
- >Then you initiate a rendezvous request in HSDir to request a contact with the hidden service. >The hidden service noticed the HSDir updated, then arranges a Tor circuit (of arbitrary length) and then write back to HSDir to tell the requesters to contact via that new circuit which this information will ultimately be signed with the hidden service's private key as a proof of identity so MITM is impossible (like bootleg TLS, or a mock PKI actually)
this sounds wrong. As far as I know the HS picks some nodes as introduction points and builds long losting circuits to them abd publishes them in ita descriptor.
when a client wants to connect it fetches the list of IPs, it picks a random node as rendezvous and, via the IP, tells the HS about it which connects to it to allow communication (basically you -> rendezvous <- HS (+ a bunch of other nodes that blindly carry traffic for anonimization as is customs with tor))
- or you could also render the extension separately allowing only ascii chars... (thus .eml would always show at the end, no matter what)