Skip Navigation

User banner
Posts
9
Comments
128
Joined
2 yr. ago

  • While being the very thing you accuse me of, pedantic and insufferable, the often used Phrase is demonstrably wrong and is used in a way so as to be coercive. Your mind wandering rant including teachers and authorities in Science is laughable and gives you away.

  • Yet another.

    ā€œA new scientific truth does not triumph by convincing its opponents and making them see the light, but rather because its opponents eventually die, and a new generation grows up that is familiar with it.ā€

    ― Max Planck, Scientific Autobiography and Other Papers

  • Another perspective. If Science does not produce truth? What is it good for? What does then produce Truth we can participate in and acknowledge?

  • Let me also affirm in this way, maybe this will help. What does the Scientific Method produce? It's produces evidence/conclusions and theories. Moreso, it produces what we know as Science.

  • I can appreciate this perspective, but what you're referring to is the Scientific Method. Science is the field of the sum of all knowledge, Science as it is used, "settled", meaned, thought, correctly, by most is, "what is".

  • Double Perspective: 1 is the truest darn thing I can conceive of. In fact, if we can't count on 1 being true, we can count on anything.

  • Really odd some Lemmy choices, allowing News Aggregation Posts (Simple link and summary) from a particular user that is somehow not flagged a bot/influencer/paid. I duna know how you can post Tech News Links 10 times a day, every day, for 5 months and still be allowed to post as a "person".

  • Is it ignorance, indemnity, or conspiracy that this News Media Corporation didn't give the primary mitigation?

    A white noise generator.

  • Also, it's the language scam of the decade to have a [privacy] agreement or terms with a "third party" which is basically anonymous/anyone/indeterminate/changing/.

  • A programming language cannot compromise your liberties.

    As a decades experienced security professional myself I can tell you that people reading are not taking what you say seriously so I don't have to respond and tediously break apart that swath of misinformation.

    Minus points for parroting me.

  • You have it backwards. The kernel is Linux. A distribution is added to the kernel. The kernel is what matters, the distribution is consequent and relies on the kernel which dictates all it's functions. The distribution is flavor on top of foundation. 101.

    All investment of time, money, resources, everything, should be ethical choices, ethical investing. Deciding to ignore who funds what makes you vulnerable to accept tainted diamonds, Cartel funded dispensaries, restaurants, and Policians, etc, etc. You should be wary of who you make rich, who you compensate, who you give your money to.

    Ignorance of money and the resources it drives that determine the fate of people everywhere is simply ignorance and your viewpoint should not be rewarded.

  • It kinda already is a Microsoft project by Finance and each of them integrating the other's systems more and more. Also, the highly paid world programmers are putting non-free blobs and highly complex code into Linux and at 40 million LoC, I propose it will soon be beyond the community to run a coherent fork without all the global code.

  • Microsoft and Apple pervasively install thier entire platform in their Operating Systems so you can't just have what you need to have on one of their computers, you have the buy the whole platform.

    The Linux Eco-system is valued at $100 Billion, has nearly 40 million LoC, and is now Global Mega-Corp Consortium Funded. Link to Linux Foundation Financial Report 2022, "Read The Report", Page 13.

    Top Sponsors:

    • Microsoft
    • Meta
    • Intel
    • Oracle
    • Tencent
    • Huawei
    • Fujitsu
    • Hitachi
    • Ericsson
    • Samsung
    • NEC
    • Qualcomm
    • VMWare (Now Broadcom)

    Notable Second Tier Sponsors:

    • Blackrock
    • WeBank (Facial Recognition only Chinese Bank)
    • Google
    • Alibaba Cloud

    Notable Third Tier Sponsors:

    • Apple

    If we are headed for a global AI monolith or Bladerunner type future, it will surely run on Linux! It's everywhere and Linux will never again be steered by the community.

    Instead use and help make successful any Indie Operating System like Haiku, Aero, or Minix3 instead of literally working as the tinniest cog ever for a Global Mega-Corp Consortium.

    You can also just use GhostBSD which is a superb Desktop BSD experience based off of stable FreeBSD that installs and works like Mint. Control your own kernel and everything about your BSD with NetBSD. Now is a great time to get into BSD with NetBSD 10 RC1. Learn it now and you'll have an OS that when released does only what you want it to do.

    Finally there is the fastest BSD, Dragonfly. I made a Dragonfly BSD setup script that will turn a $250 2019 Thinkpad T495 into a lightning fast programmer workstation that does only what you want it to, and hardened. It never even makes one call out to the internet unless you typed the command in or allowed it beforehand.

    If you insist on using Linux, then use a distro with an independent kernel that let's them know you would not like the Linux kernel which has been badly managed by the Dictator Linus, globally taken over.

    1. Chimera
    2. Void
    3. Alpine (Works excellent as a Desktop)
  • Oh my, making me repost myself time.

    Just so I’m clear in my communication, there is no case where nVidia can logically be a victim. Best case = co-conspirator.

    I'm not sure how you could possibly mis-interpret that, but yet you still managed. I specifically worded it as "a victim", meaning a victim in any sense, which nVidia cannot be seen as no matter what spin you give it.

    If you were a real account or geniune person without an agenda you would just admit that you misread me instead of the other way around.

  • No. In the "Steps to reproduce" turning on Signal setting "Show in Suggetions" was not listed nor any setting of this type.

  • This is super helpful, I may post this to infosec.exchange. Flathub makes this so much more difficult to find the reason for what looks like a real breach. I don't use Flathub for security reasons so I don't know if you can even isolate the PID? Anyone know?

    I don't want you to have to spend a lot of time or troubleshoot over the web but if you see anything that stands out as "wow shouldn't be there/running" when you run these commands come back to us:

    1. ps the PID of Signal or secondarily, Flathub
    2. lsof -p PID
    3. strace
      • sudo strace -f -t -e trace=file -p PID
    4. sysctl kernel.randomize_va_space
      • pkill/killall Flathub/Signal and restart FH/Signal and see if it still presents the vulnerability
  • What that user is describing is very serious. They are saying iOS can reach into Signal and extract data.

  • Huge if true! You could conceivably submit your phone to a Cybersecurity company and share in any reward.

    Help us with:

    • Your OS Version
    • OS settings that are possibly related
    • How you obtained Signal
    • Signal version
    • Video proof
    • Steps to reproduce

    Who knows how to compute a hash for an installed mobile phone app? We need to compare it with legit.

  • Let's not go all the way down the rabbit hole in one pill. Steps of one less person so inured (Definition: Made tough by habitual exposure), so hopelessly dependent on Google.

  • Welcome to the real world.