why not matrix?
🚀 Seen my posts and want more? Dive deep into the issues with Big Tech at Escape Big Tech!
💡 Need FOSS-focused software solutions? Reach out on Matrix at @dannym:balooga.xyz!
why not matrix?
I believe that the following IP ranges
are engaged in highly suspicious activities
furthermore I can definitely say that I found some dirty pirates hiding at the following ip ranges:
my research clearly shows proof that those people are not just pirates but also engaged in highly illegal activities such as stealing BILLIONS of dollars and hacking who knows how many servers, and that’s only the crimes one can talk about online.
no, I didn’t share IPs that anyone here would ever have, I guarantee it, if you don’t get the joke look up “bogon routes” and then look up which ASN owns the other set.
It looks more legit than people who use 192.168.0.0/16, 8.8.8.8, 127.0.0.1, or any other things like that because most people don’t know about those.
Also bonus info:
here’s a tip for you, if you’re a sysadmin just go ahead and ban those IP ranges on your machines, if you ever get packets from them it’s an attack 99.999999% of the time (I guess unless you have customers in north korea? in which case only block the first ones and all other bogon routes)
then just use fedora asahi remix because the asahi linux team did the work for you, also they would really appreciate some donations
is not exactly Google Maps in terms of usability, but it’s a functional map
I would personally say that it’s better than Google Maps. It’s more accurate at least
click the button that says more then add a shortcut to your favorite map service
I have not made any assumptions, this has been shared multiple times in different articles which I did not write. As for the Chromecast, I misremembered, it was an Amazon Firestick.
in this case the instruction set is extremely small (and includes open source verilog, so you could even fab it yourself)
quote from the website:
The CPU of the TKey is a modified version of PicoRV32, 32-bit RISC-V running at 18 MHz. Modifications includes a fast 32x32 multiplier implemented using the multiplier blocks in the iCE40 DSPs as well as a HW trap function.
The supported instruction set supported by the CPU is a subset of RV32I. Specifically it includes compressed instructions, but excludes instructions for:
- Counters
- System
- Synch
- CSR access
- Change level
- Trap redirect
- Interrupt
- MMU
The instruction set implemented by the CPU also includes multiplication instructions from the RV32IC_Zmmul (-march=rv32iczmmul) extension. Division is not supported.
Any illegal, unsupported instruction will halt the CPU. The halted CPU is detected by the hardware, which will blink the RGB LED with red to indicate the error state. There is no way for the CPU to exit the trap state besides a power cycle of the device.
Note that the CPU has no support for interrupts. No instructions, ports or logic.
there are use cases, such as security, where you want as few instructions as possible, so a full ARM processor isn’t the best idea. You may want to read the threat model page: https://tillitis.se/products/threat-model/
The more you know! I don’t follow their blog so I didn’t realize this. This is a pleasant surprise and yet another reason to love Mullvad.
Haha I’m glad that he switched sides honestly, but after listening him talk about his childhood in an interview I’m not even surprised that he did what he did
The specs are literally the reason why people would buy this. It’s basically the best device we have available that can be used as a base for devices handling secure computation, or software handling secure computation. Think of a FIDO2 key, or a gpg smartcard, all secure and verifiable
This is someone you can never count on to do anything they don’t want to do. Someone who will destroy things if they don’t get their way. Triple letters won’t touch him.
definitely, but people can change
a lot of this was social engineering
people always have a high and mighty mentality when talking about social engineering, most attacks today use some form of social engineering and have for a long time, if not always.
The kid was an idiot and a dickhead. He extorted companies and sim swapped people for his private gain, and was stupid enough to continue his hacking spree while he was on bail for another hack.
Yeah I don’t think anyone here disagrees with that; his actions are objectively wrong and as I said, he definitely needs to learn morals and ethics.
Samsung Dex over Miracast (which the news liked to present as some kind of amazing hacking feat)
I mean, duh, the media can’t tell the difference between a computer and a toaster, but that’s besides the point
He’s violent, damaging property and injuring staff.
I didn’t know about this, thanks for sharing. Can I get a source?
I don’t get what this “he deserves a stellar salary” mentality comes from
I’m a firm believer in meritocracy and the importance of rewarding skills. He should still pay a hefty price for his crimes, including jail time, where he will hopefully learn to change his ways, but once he gets out, if he’s truly remorseful for his actions and he’s willing to have others monitor his device usage activities, I don’t see why he shouldn’t be hired by a red team
that’s exactly my point tho, he needs to understand why what he did was objectively wrong, and needs to understand that actions have consequences, but he’s still a teenager, and one with autism at that, there is plenty of time for him to change sides
I agree with you in principle, you are definitely objectively correct, however people can redeem themselves.
To name two:
No disagreements here, but this is all something that can change easily, he just need to understand the repercussions of his actions
Absolutely, didn’t mean to imply otherwise
Maybe, I’ve never met him, but that changes nothing.
Linus Torvalds is a giant asshole and he doesn’t know how to talk to people, he’s still one of the most important people in tech.
Please look into penetration testing.
Matrix VoIP is a thing, and it’s usable for audio & video on many clients, element and fluffychat come to mind, but probably more.
element call is also coming into element (and possibly other clients) for video calls and screensharing
why does that matter?