I just wanted to confirm from our meeting just now, did you want me to (some crazy shit that could cause problems)?

  • 4 Posts
  • 18 Comments
Joined 6 months ago
cake
Cake day: January 9th, 2024

help-circle

  • mozz@mbin.grits.devtoSelfhosted@lemmy.worldHDD data recovery
    link
    fedilink
    arrow-up
    16
    arrow-down
    1
    ·
    7 days ago

    You’re going to think I am joking but I am not. Multiple people have sworn to me that this works for a common failure mode of HDD drives and I’ve literally never heard someone say they tried it and it failed. I’ve never tried it. Buyer beware. Don’t blame me if you fuck up your drive / your computer it’s connected to / anything else even worse by doing this:

    1. Stick it in the freezer for a short while.
    2. Take it out.
    3. Boot it up.
    4. If it works, get all the data off it as quick as you can.



  • They reached out to her a couple days before they launched, and said hey do you want to maybe reconsider that thing where we asked you about this a couple times, and both times you told us to go fuck ourselves

    And then they told the media that they were in discussions with her, when the discussions were her lawyer telling them to go fuck themselves

    And then Altman tweeted “her”

    And then when it launched, it was according to her so freakishly similar that her friends were weirded out by it

    If it was some different actress saying hey this sounds a lot like me, that wasn’t the one that they clearly had in mind when they were making their plans about it, then I could see a pretty strong argument to say hey relax buddy sometimes different people just sound similar

    I don’t really know; I’m not familiar enough with movie people to really listen to it and see what I think and I don’t care enough to investigate. But just based on the above I feel like probably she has a fairly strong case.



  • Akkoma and Pleroma are two popular “Mastodon style” Fediverse apps, I think born out of exactly this type of complaint about Mastodon, which you could get involved with if you wanted to be involved with better software without it being a one-man show.

    I think it’s made needlessly difficult by how sloppy a protocol ActivityPub is, such that different Fediverse apps can’t really interoperate with each other except at a pretty rudimentary level, so you kind of have to pick one of the leading ones and imitate it, in order to be a citizen in its community and not have to build your own little community from scratch. But that’s a problem without a real easy solution, I think.


  • What?

    I am comparing the question, is my traffic being spied on by the ISP (in practice, passed off from the ISP to the NSA for sure and in practice maybe whoever else) actively as I’m running my connection, versus is my traffic being spied on by my fellow patrons. I would describe harvesting all my traffic and giving it to the government as “malicious.” That, to me, is more likely (I mean, more or less 100% chance, within the US) than someone randomly being at the cafe acting maliciously to the point of setting up a spoof DHCP server randomly during the time that I am there.

    (Part of the Snowden revelations were that the NSA had deals with more or less every major data carrier to harvest in bulk more or less everything that goes over the long-distance internet.)

    What percentage of people in the world do you imagine set up spoof DHCP servers at cafes? 1%? And what percent of their time do you imagine they spend doing it? I cannot possibly make the math work out to make it make sense unless the cafe literally has at bare minimum thousands of people in it at all times. I mean, sure, it’s worth making sure your VPN is secure against it.

    I don’t really want to argue continuously back and forth about this for too too long. I feel like I’ve said what I needed to say to communicate my piece about it at this point.



  • I have done, and friends of mine have done a lot more than that. My point is that I’m unusually nerdy and the number of people who’ve ever been subjected to it by me being near them is probably in the double digits for a few minutes over my entire life.

    I will bet you any amount of money that you can go to any coffee shop and set up an insecure VPN there all day and not a single person will randomly come in, set up a malicious DHCP server, and reroute the VPN traffic through their hardware so they can spoof it and spy on your traffic.

    The fact that it’s possible means it’s worth defending against, sure. If it sounds like I’m saying it’s not a big deal I am not. I’m just saying that it is not the most common threat that you need to defend against most urgently or even in the top 10 (primarily because it requires one of this little handful of people nearby to you to be a malicious actor, where most of the ones that are really commonly-encountered threats are the ones that literally any one of billions of people on the planet could at any time randomly target you with, so you’re going to run into a lot more frequently.)



  • When I use a VPN, I very rarely imagine that the coffee shop / home internet that I’m hooked up to will have a malicious actor or compromised host physically inside it. I mean, maybe. But more likely is that I’m protecting against a malicious ISP, or effectively doing an extra level of authentication to my work network before I get access to non-world-visible elements of it (that shouldn’t be exposed to anyone in the world that wants to poke at it). The “someone else at the cafe is malicious” case isn’t un-heard of, but it’s not the most common threat model. That’s my point.

    From the article:

    When apps run on Linux there’s a setting that minimizes the effects, but even then TunnelVision can be used to exploit a side channel that can be used to de-anonymize destination traffic and perform targeted denial-of-service attacks.

    “Deanonymize” and denial of service are very very different from hijacking the connection and rerouting destination traffic to a hostile device, which it sounds like are what’s possible on iOS and Windows.

    I don’t really know the full details (e.g. what does it mean that “there’s a setting”, and is activating that setting starting this week any different in practice from applying the patch that will surely come this week for Windows and iOS). But it does sound fair to say that there’s a serious level of vulnerability that’s exclusive to Windows and iOS.