Hogwarts Legacy players frustrated as Starfield and Baldur’s Gate 3 outshine Harry Potter game - Dexerto | Ghostarchive
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    You are right, they should rewrite the engine, but they didn't and they preferred enforce the development on the re-re-re-re-re release of titles like skyrim for every possible platform on the plant.

    Look at what Larian did instead.. Took 6 years, added beta access and listened to the players. BG3 is far from being bug-free or "perfect" but they released a game that give almost total freedom on how you can play it, and doesn't feel like you are on rails every time.

    The problem is bethesda and others "AAA" software houses for years just did the lazy job and now that a software house showed what 6 years of real development should look like everyone is doing the Pikachu face and crying because "We don't want BG3 to set a new standard". The issue is us, the players, that keep buying shit for too much money.

    1
  • Used nix last year but dropped it after home-manager decided to unlink the apps from the Applications directory. How is the current situation on usability of nix-Darwin + home-manager + brew? Packages still fails to get indexed correctly in spotlight? I really like a fully repro environment but the fact that the usu ability was low bothered me a lot.

    5
    1
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHO
    Jump
    What’s in your homelab? (July 2023)
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    A raspberry with Adguard + unbound, a zimaboard with truenas scale running the -arr suite, nextcloud, homeassistan, homarr, headscale and caddy 2x2TB nvme and 3x 4tb HDD I recently got a new PC and I think I will convert it to being part of the homelab, it has a ryzen 7 3xxx and a 2070 super.

    1
  • A few questions about selfhosting from a newbie
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    The difference is that you need way more interaction. Expose a webserver on the internet and check how many requests you get from just bots.

    You can control what you navigate and how to interact with the outside world, but you can’t control how the outside world will interact with your services.

    2
  • A few questions about selfhosting from a newbie
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 50%

    Don’t expose anything from your local network to the internet (unless you want multiple new sysadmins in your house). Try tailscale instead.

    0
  • DIY nas
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    Anyone knows if there is any project for a modular NAS? Have been looked into it for a while but without success

    2
  • Low profile keyboard compatible with choc switches
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 50%

    How much like the corne do you want it to be?

    like a normal keyboard and not split

    Also, how DIY do you want to get?

    As long as no soldering is required I am up for everything

    0
  • I am looking for a low profile keyboard compatible with the choc switches. I plan to put the choc sunset on it. I was looking for something similar to the Corne, just without the ergo-split thing. A standard 65-75% would work. Bonus for hot swappable and no soldering required.

    2
    16
    X-post: Better understanding and mitigating the risks of using a phone that no longer receives system updates
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    WannaCry targeted hospitals, businesses and similar machines.

    WannaCry targeted everything with SMB exposed, blindly.

    Also, you should read more about security through obscurity, the fact that "no one will target you because you are a low-value target" is a false sense of security.

    6
  • Recreating Government Security Standards at Home (Hardened iPhone) [8:58]
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    I don't know why the author of the video didn't mention it but LockDown mode is really useful.

    At least for me the default is lockdown mode on and appropriate exceptions for websites I trust.

    3
  • X-post: Better understanding and mitigating the risks of using a phone that no longer receives system updates
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    I believe the risk of running outdated software is super inflated and mediatic, 99% of people would be absolutely fine running a version of Android from 3 years ago or Windows 8.

    That's the same thing people running windows XP on internet were thinking in 2017.

    Then WannaCry arrived and they got their data encrypted :)

    3
  • X-post: Better understanding and mitigating the risks of using a phone that no longer receives system updates
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    Perhaps images, video, font etc. rendering could be compromised?

    Yes, it already happen in the past. Also the Wi-Fi and Bluetooth stack got exploited, like multiple kernel drivers.

    But it shouldn't be a matter of "in the past was X exploited?" but more on having a correct security posture.

    Honestly if you are arguing about wasting a "perfectly working phone" you should blame it on the vendor, especially Android devices vendors have this let's say "defect" of dropping the support after 4/5 years.

    Also not going to talk about custom ROMs (with the super rare exclusion of some) managed by god knows who, without any security team behind.

    Since even the NFC and Cellular Network stack got vulnerabilities the only way you would consider an old phone "safe" to use is just turning it into the equivalent of a local ARM server.

    Also pretty fun seeing the replies in the original post talking about how Google Play store shouldn't have malware on it.

    3
  • I am looking for a low profile keyboard compatible with the choc switches. I plan to put the choc sunset on it. I was looking for something similar to the Corne, just without the ergo-split thing. A standard 65-75% would work.

    1
    1
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearEX
    Jump
    CVE-2023-2033: Chrome [0-day] JIT optimisation issue
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    Exploited in the wild, reported in April, no fix since then?

    Edit: looks like it was fixed on the 26th of April, why is tagged as 0day?

    1
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearIN
    Jump
    Please don’t enable 2FA
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 100%

    Ahaha I had this exact same experience. Locked out because bitwarden didn’t get the code correctly. “Luckily” the jwt token never expires so I was able to log back in without the 2FA.

    1
  • Does anyone know where this image is from
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    himazawa
    Now 50%

    Honestly curious, why? I live in a country that doesn’t have it but I don’t see downsides if the crimes committed are way too bad. For example, why keeping alive (with contributors money) a serial killer?

    0
  • "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearEX
    Manjaro 0day LPE via pamac
    github.com
    2
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearIN
    Set default language to English

    What about setting the new language of a post to English? There are people that don’t know how lemmy works that keep on opening new posts and leaving the language to “Undetermined” by mistake so no one can answer them.

    2
    5

    cross-posted from: https://beehaw.org/post/789646 > An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act. > > > This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve: > > * **Apple iMessage**: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone. > > * **Line**: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location). > > * **Signal**: date and time of account creation and date of last connection. > > * **Telegram**: IP address and phone number for investigations into confirmed terrorists, otherwise nothing. > > * **Threema**: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date. > > * **Viber**: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination). > > * **WeChat**: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users. > > * **WhatsApp**: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups. > > * **Wickr**: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting. > > **TL;DR Signal is the messaging system that provides the least information to investigators.**

    10
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearIN
    Unclassified FBI Document: Ability to legally access Secure Messaging App Content and Metadata (January 2021)

    cross-posted from: https://beehaw.org/post/789646 > An official FBI document dated January 2021, obtained by the American association "Property of People" through the Freedom of Information Act. > > > This document summarizes the possibilities for legal access to data from nine instant messaging services: iMessage, Line, Signal, Telegram, Threema, Viber, WeChat, WhatsApp and Wickr. For each software, different judicial methods are explored, such as subpoena, search warrant, active collection of communications metadata ("Pen Register") or connection data retention law ("18 USC§2703"). Here, in essence, is the information the FBI says it can retrieve: > > * **Apple iMessage**: basic subscriber data; in the case of an iPhone user, investigators may be able to get their hands on message content if the user uses iCloud to synchronize iMessage messages or to back up data on their phone. > > * **Line**: account data (image, username, e-mail address, phone number, Line ID, creation date, usage data, etc.); if the user has not activated end-to-end encryption, investigators can retrieve the texts of exchanges over a seven-day period, but not other data (audio, video, images, location). > > * **Signal**: date and time of account creation and date of last connection. > > * **Telegram**: IP address and phone number for investigations into confirmed terrorists, otherwise nothing. > > * **Threema**: cryptographic fingerprint of phone number and e-mail address, push service tokens if used, public key, account creation date, last connection date. > > * **Viber**: account data and IP address used to create the account; investigators can also access message history (date, time, source, destination). > > * **WeChat**: basic data such as name, phone number, e-mail and IP address, but only for non-Chinese users. > > * **WhatsApp**: the targeted person's basic data, address book and contacts who have the targeted person in their address book; it is possible to collect message metadata in real time ("Pen Register"); message content can be retrieved via iCloud backups. > > * **Wickr**: Date and time of account creation, types of terminal on which the application is installed, date of last connection, number of messages exchanged, external identifiers associated with the account (e-mail addresses, telephone numbers), avatar image, data linked to adding or deleting. > > **TL;DR Signal is the messaging system that provides the least information to investigators.**

    3
    0
    "Initials" by "Florian Körner", licensed under "CC0 1.0". / Remix of the original. - Created with dicebear.comInitialsFlorian Körnerhttps://github.com/dicebear/dicebearHI
    Now
    7 34

    himazawa

    infosec.pub