Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)T
Posts
0
Comments
986
Joined
3 yr. ago

  • doge.gov got hacked

    Jump
  • Sorry for the wall of text.

    You would hope that a public front end is entirely isolated from critical systems.

    Hackers got in.Either they saw there was nothing of value, and figured they would embarrass the owners.They got in, saw shitloads of value, but decided the ethical thing was to embarrass as opposed to exfil/exploit/sell the access.Or the hackers were explicitly aiming to embarrass the owners, and didn't explore scope beyond that.It's likely "gay furry hackers" or similar, and it's "grey hat" hacking.

    The ethical route, ie "white hat", is to contact the owners about the exploit with a fixed period disclosure. Ie, "fix this in 30-90 days, or we will publish our method"."Gray hat" are more like this. Where they find an exploit, it could go deeper, but they do some lulz instead. Basically make it obvious something has been hacked, but not actually exploit it further."Black hat" would find the exploit (even if it was limited access) then sell it while trying to leave no trace, so it can be exploited again. Or straight up exploit it themselves.

    There is a possibility of foreign agents doing false-flag gray hat shit. Exfil sensitive data, cover their tracks, then "botch" some "hahaha you've been pwnd" stuff. Both getting sensitive data, and derailing the US government (because Musk has been authorised by Trump. It's a huge undermining).

    With the timeline, this seems like gray hat, or black hat further exploited by gray hat. Or false flag.

    The obvious aim is to embarrass the owners.This casts serious political shade on the DOGE servers that have been hooked into government networks without oversight. Any further data exfil is a bonus to certain foreign countries.

    Best case scenario is that this is domestic gray hat, the muSSk team learn from it, and figure out how actual internet security works, and harden their systems accordingly.I mean, the actual best case is that this DOGE coup gets stopped. But the president has authorised DOGE, so this is what America wants. So, not a coup.

    Ideally, this hack has 0 actual scope of security vulnerability.Other than the "yeh, but if they can get into your public web server (something expected to be hardened as fuck, and might as well be static file hosting. Seriously, why is there a database for this shit), how can we trust your servers on government networks".But chances are the exploits to get into this server will be similar to the exploits to get into the government connected DOGE systems. Unless the sysadmin & network admins (god bless them) have managed to maintain some control that muSSk doesn't understand, and are able to mitigate the tsunami of access such a compromised server might unleash.

  • I know mint is often said to be the friendly new distro.I've heard good things about Bazzite. Like really good things.

    I'm currently running Endeavour OS. As soon as I get a chance, I'm planning on checking out Bazzite.

    If you are going in fresh, I think Bazzite is something to try for a week or so.

  • NVidia got there early with their CUDA API.That's been around for decade(s), which enabled all sorts of crazy GPU usages beyond just graphics.Due to that, NVidia held the datacenter/professional scene exclusively for a long time.As a result, their professional cards and related drivers have been industry standard.I have no doubt that AMD is better, but so much (non-mainstream) software is built against NVidia drivers, CUDA etc., that will be slow to change until the cost of implementing similar for AMD outweighs "just sticking with NVidia".

    The classic "Nobody ever got fired for buying IBM"

  • I feel like "look at twitter" is probably enough of a defence to decline president musk.It would probably need to be wordier for court proceedings.

  • USB as in USB-C?If the display is HDMI in, you can get HDMI auto/priority switchers. IE, will switch to the highest active input.Then get a USB-C cable to HDMI, and a plain HDMI cable for the other input.That covers USBC & HDMI.

    If you want something more fancy,https://www.amazon.co.uk/KVM-Switch-Monitors-Computers-Keyboard/dp/B0DNYVGRZZOr,https://www.amazon.co.uk/Anker-Docking-Station-Laptops-DisplayPort-Gray/dp/B0C7QVL2RT

    If you are a larger company, it's worth talking to an AV integrator.There are many ways to do this.

  • This is how trump operates.Postures, bullies, makes loads of noise in order to get what someone else has already agreed to.Then, cause he was so noisy about it, he gets all the press coverage, and the neo-nazis chock it up as another win

  • I had a website serve me oxidised bits. My computer BSODd and now I have herpes.Need those antioxidants

  • My experience of checksums are in things like serial where they can potentially recover a corrupt bit.I presume in the case of encryption, a checksum is more of a hash of the raw data? Like a one-way deterministic compute. Easy to get a hash of data, extremely difficult to get data from a hash.In which case, it's fine. Passwords are hashed (granted, multiple times), but a cryptographically secure hash is not to be underestimated.

  • Same as a 4x CPU with 8GB ram VPS.Unless bandwidth is a limiting factor.But the quality of a website is about code. Not about hardware

  • A page could load thousands of images and thousands of tiny CSS files.None of that is JS, all of that is loads of extra requests.

    Never mind WASM. It's a portable compiled binary that runs on the browser. Code that in c#, rust, python, whatever.So no, JS is not the only way to poorly implement API requests.

    Besides, http/2 has connection reuse. If the IP and the TLS cert authority is the same, additional API/file etc requests will happen over the established TLS connection, reducing the overhead of establishing a secure connection.

    Your dislike is of badly made websites and the prevalence of the browser being a common execution framework, and is wrongly directed at JS.

  • I don't think the argument is worth having.

    Only thing I will say is that the audio world has no common meaning for a slave.Programming does.

  • Sounds like ICE needs more prisons. Don't bother with buildings. Just fences and tents. Might as well get free labour from them as well, seeing as they will just be sitting around doing nothing.As for expanding monitoring programs, I feel some sort of yellow badge that immigrants must wear.

    Obviously, I am describing concentration camps and the badges the Nazis made Jews wear.Just to continue highlighting similarities.I just wanted to make it clear that my suggestions are sarcasm, and yet the parallels are really fucking scary.

  • It will come back as an electron react app that uses web sockets to synchronise embedded sqlite databases

  • Direct render manager

  • I have a meaco dd8l.I haven't tried any others, but I've had it for a few years.Best purchase I've ever made.Anyone living in a flat should get one.Although, my parents bought one for their house and swear by it. So, I guess anyone living indoors should get one.

  • Modern day book burning?

  • Holy shit.That's some shit that contravenes every security briefing, every security best practice.Then they go and spoof a legit government installation with their own bullshit?!Fucking Hilary and her email servers. But like times 10. Legitimately compromising the US government communications.Why is this lawsuits, why isn't this treason?!

  • I'm currently reconsidering using a couple mikrotik for some layer 3 hardware offloading.Not really homelab, but close.

    I have a project that gets integrated with another network for an event. I'm thinking of using 2x crs504 (cause I'm using mlag for servers, think vrrp or whatever for "public" (it's all internal) ip) and seeing if I can get l3hw working as a router.While I could sit on a subnet of the "host" network, having a gateway that traffic goes through allows me to test and prove everything for my system in my homelab, with just the final integration being a do-in-a-time-crunch problem.I'm already using the crs504s for networking (I bought them ages ago, thinking 25gbps was going to be as easy as 10gbps. It's all running at 10gbps), and this saves having to use something as a router, cuts down on rack space, all sorts of benefits. I think.Anyone have any experience with mikrotik l3hw offloading?

    My actual homeland is just a NAS and some networking. It's a small flat, it's just me. Not complicated, no need to give me more headaches!

  • Ayyy, I got one too!A spam message that is.

  • Not deporting illegal immigrants.Deporting foreign dissidents.

    I'm not sure on German history. Is this a thing that's happened before?