[-] drspod@lemmy.ml 10 points 22 hours ago

Anyone who falls for the scam of thinking that you can determine IQ from the genome of an embryo is probably below average themselves.

[-] drspod@lemmy.ml 13 points 22 hours ago

You're just unabashedly supporting eugenics? Is that because you're too young, or too uneducated to know any better?

[-] drspod@lemmy.ml -2 points 3 days ago

Did you read the article?

[-] drspod@lemmy.ml -3 points 3 days ago

If you think that I'm misunderstanding something and arguing from a false premise then please feel free to engage with the discussion.

[-] drspod@lemmy.ml 13 points 3 days ago

I thought passkeys were supposed to be a hardware device?

This is typical embrace/extend/extinguish behavior from the large platforms that don't want their web-SSO hegemony challenged because it would mean less data collection and less vendor lock-in.

The whole idea of passkeys provided by an online platform should have been ruled out by the specification. It completely defeats the purpose of passkeys which is that the user has everything they need to authenticate themself.

[-] drspod@lemmy.ml 22 points 4 days ago

They didn't break RSA.

[-] drspod@lemmy.ml 4 points 6 days ago

IPv6 can run on IPv4 and look how much that helped

[-] drspod@lemmy.ml 4 points 6 days ago

This could also mean that they have found a (classical) vulnerability in one of the most used Post Quantum Encryption algorithms (such as Kyber) and they want everyone to switch to using it ASAP.

[-] drspod@lemmy.ml 3 points 6 days ago

If this is impersonation (which it looks to be) shouldn't it be removed?

Are you going to set the precedent that impersonation of figures in the open source community is allowed?

Personally I would be in favor of removing this post until OP can provide proof of identity (eg. by posting something on the main github account corroborating this post).

[-] drspod@lemmy.ml 3 points 6 days ago

It's pretty easy to check and see that this isn't how it works. I checked both my instance and yours and both of them host the images that have been posted to communities on other instances, so clearly images are transferred (or cached) between instances.

[-] drspod@lemmy.ml 16 points 6 days ago

Goodhart's law is an adage often stated as, "When a measure becomes a target, it ceases to be a good measure"

- https://en.wikipedia.org/wiki/Goodhart%27s_law

35
submitted 1 month ago* (last edited 1 month ago) by drspod@lemmy.ml to c/programming@programming.dev

Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.

The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

295
submitted 1 year ago by drspod@lemmy.ml to c/privacy@lemmy.ml

cross-posted from: https://lemmy.ml/post/4912712

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

193
submitted 1 year ago by drspod@lemmy.ml to c/technology@lemmy.ml

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

332
submitted 1 year ago by drspod@lemmy.ml to c/linux@lemmy.ml

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

view more: next ›

drspod

joined 2 years ago