[-] vk6flab@lemmy.radio 1 points 1 minute ago

Part of me wants to know if the author has deliberately set up the time to make it so anyone trying this would start their year very disappointed, but this is the internet, that would never happen .. right?

[-] vk6flab@lemmy.radio 1 points 7 hours ago

So far the Wayland implementation requires embedded X11 which puts everything in the same environment again.

I've not yet discovered how to run separate Wayland screens across the network from a Docker container and I'm also not sure if either Chrome or Firefox actually support native Wayland, from memory they didn't last time I checked.

[-] vk6flab@lemmy.radio 6 points 7 hours ago
[-] vk6flab@lemmy.radio 1 points 11 hours ago

I don't know. When I built this, several years ago, none of that existed.

[-] vk6flab@lemmy.radio 1 points 13 hours ago

This is true.

However, I'm running trusted software, not the backyard efforts of someone randomly selected off the internet.

Additionally, the Docker container is running on a dedicated Debian virtual machine with only Docker installed.

What's of deeper concern is that all instances are running on X11 which means that they all share information via the clipboard for example.

[-] vk6flab@lemmy.radio 65 points 16 hours ago

Here you go .. it was given to me and now I'm giving it to you.

Fediverse Silver

[-] vk6flab@lemmy.radio 2 points 17 hours ago

Disclaimer: I used Steam once.

Has anyone done any research into the quality of these 18,000 titles? What kind of uptake there is, how many purchases/downloads, etc. ?

[-] vk6flab@lemmy.radio 2 points 19 hours ago

That's precisely what I do.

[-] vk6flab@lemmy.radio 15 points 20 hours ago

Excluding Chrome, Firefox and Safari means that you are now relying on some random developer to understand security and privacy and as a software developer for over 40 years I can tell you that this is a fools errand.

Don't get me wrong, the big three absolutely have privacy issues, but they can be mitigated in many different ways without compromising on security.

For example, you can force DNS requests to one of your choosing, you can run them in incognito mode, refuse cookies, run them inside user accounts without personal information, etc.

I tend to run individual instances of a browser in incognito mode and am very conscious of which tabs are open in which instance, so websites cannot steal information from other tabs.

[-] vk6flab@lemmy.radio 17 points 1 day ago

Moving air is the best way to remove liquid. Place it in front of a fan instead of putting it in rice.

[-] vk6flab@lemmy.radio 153 points 2 days ago

If you're wondering, it's a cute idea but they clearly haven't actually done a sleep study. Being wired up to 19 sensors leaves little room for movement, let alone extracurricular activities.

Source: I had my second sleep study last week.

[-] vk6flab@lemmy.radio 43 points 3 days ago

As a developer I can confirm that we see all kinds of "stuff".

My most memorable was an elected official who entered their credit card information into a name field when they made a purchase online. It showed up in a banking report and stood out.

The purchase went through because they also put the credit card information into the correct fields.

How did I know it was an elected official?

Their email address had their full name and government department.

314
74
submitted 1 month ago by vk6flab@lemmy.radio to c/linux@lemmy.ml

This is a sobering post that revisits the notion that given a project, how many developers have to be hit by a bus before it stalls.

According to the methodology explained in the article, in 2015 it took 57 developers for the Linux kernel to fail, now it appears that it takes 8.

That's not good.

10
submitted 4 months ago by vk6flab@lemmy.radio to c/lemmyconnect@lemmy.ca

Starting yesterday, Connect hard crashes when you attempt to click on the Inbox and the same happens if you click on the notification bell showing that there are messages.

As of this morning, the Inbox sidebar label is coloured Red instead of Blue.

Connect Version 1.0.190 Android v13 with latest security patches

672
submitted 4 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

A cookie notice that seeks permission to share your details with "848 of our partners" and "actively scan device details for identification".

40
submitted 5 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

How are you storing passwords and 2FA keys that proliferate across every conceivable online service these days?

What made you choose that solution and have you considered what would happen in life altering situations like, hardware failure, theft, fire, divorce, death?

If you're using an online solution, has it been hacked and how did that impact you?

19

My search has been without results.

My "new" model remote with a Siri button keeps needing to be reset to control my infrared amplifier. Press and hold the Volume Down and TV button works, but it's annoying when you want to change the volume whilst watching something and it doesn't respond.

Firmware version is 0x83.

Anyone got any ideas what might be causing this?

31
submitted 6 months ago by vk6flab@lemmy.radio to c/linux@programming.dev

I've been using VMware for about two decades. I'm moving elsewhere. KVM appears to be the solution for me.

I cannot discover how a guest display is supposed to work.

On VMware workstation/Fusion the application provides the display interface and puts it into a window on the host. This can be resized to full screen. It's how I've been running my Debian desktop and probably hundreds of other virtual machines (mostly Linux) inside a guest on my MacOS iMac.

If I install Linux or BSD onto the bare metal iMac, how do KVM guests show their screen?

I really don't want to run VNC or RDP inside the guest.

I've been looking for documentation on this but Google search is now so bad that technical documents are completely hidden behind marketing blurbs or LLM generated rubbish.

Anyone?

36
submitted 6 months ago by vk6flab@lemmy.radio to c/privacy@lemmy.ml

There is a growing trend where organisations are strictly limiting the amount of information that they disclose in relation to a data breach. Linked is an ongoing example of such a drip feed of PR friendly motherhood statements.

As an ICT professional with 40 years experience, I'm aware that there's a massive gap between disclosing how something was compromised, versus what data was exfiltrated.

For example, the fact that the linked organisation disclosed that their VoIP phone system was affected points to a significant breach, but there is no disclosure in relation to what personal information was affected.

For example, that particular organisation also has the global headquarters of a different organisation in their building, and has, at least in the past, had common office bearers. Was any data in that organisation affected?

My question is this:

What should be disclosed and what might come as a post mortem after systems have been secured restored?

14
submitted 7 months ago by vk6flab@lemmy.radio to c/opensource@lemmy.ml

Anyone know of any scriptable asynchronous communication tools?

The closest so-far appears to be Kermit. It's been around since CP/M, but apparently there's still no centralised language reference and the syntax predates Perl.

25
submitted 8 months ago* (last edited 8 months ago) by vk6flab@lemmy.radio to c/privacy@lemmy.ml

U2F keys can be purchased online for the price of a cup of coffee. They're being touted as the next best thing in online security authentication.

How do you know that the key that arrives at your doorstep is unique and doesn't produce predictable or known output?

There's plenty of opportunities for this to occur with online repositories with source code and build instructions.

Price of manufacturing is so low that anyone can make a key for a couple of dollars. Sending out the same key to everyone seems like a viable attack vector for anyone who wants to spend some effort into getting access to places protected by a U2F key.

Why, or how, do you trust such a key?

The recent XZ experience shows us that the long game is clearly not an issue for some of this activity.

view more: next ›

vk6flab

joined 9 months ago