ptz

joined 1 year ago
MODERATOR OF
[–] ptz@dubvee.org 3 points 3 hours ago

"But we're selling the hardware at a loss, so letting you own what you paid for would break our crappy business model" /s

[–] ptz@dubvee.org 11 points 3 hours ago* (last edited 3 hours ago) (2 children)

I would love if device makers were forced to open up their hardware to other OSs. Unlockable bootloaders for all as well as allowing users to install their own signing keys so secure boot can remain enabled.

Granted, there would still be black box firmware required to use half the components inside, but that's another battle.

[–] ptz@dubvee.org 4 points 3 hours ago (1 children)

"Homer, this isn't America's Funniest Home Videos"

[–] ptz@dubvee.org 8 points 4 hours ago (4 children)

Probably some use cases for "regular" users. Someone mentioned music production, though that's probably more professional than hobby.

To my understanding, you mostly need real time performance for specialty cases where timing is absolutely critical. So I guess if you were building custom drones or custom control boards for drones, you could use real time Linux for that now since the timing could be guaranteed.

[–] ptz@dubvee.org 6 points 4 hours ago (5 children)

Doesn't say, but I am curious. They said their workarounds broke other workarounds which caused a lot of implementation delay, but I'm not sure what the actual compromise was to address all that.

Answer probably lies somewhere in the kernel maintainer's mailing list, I'd imagine. Just not equipped to search for it right at the moment.

[–] ptz@dubvee.org 54 points 4 hours ago (1 children)

Security tip: Never post your home address on social media.

[–] ptz@dubvee.org 6 points 4 hours ago* (last edited 4 hours ago) (1 children)

Not gonna lie: I would absolutely use the pattern buffer as my own personal junk drawer. I'd have a pattern buffer full of those portable pattern buffers from Discovery. Each of those full of random stuff I'd otherwise carry if I could.

"Why, yes, I do need my kayak with me at all times. You never know when you might need that!"

Hell, I'd probably work out how to turn the pattern buffer into a man cave. 😆

Or if I'm ever in a sticky situation, pull a Dale Gribble "Pocket Sand" but with a pattern buffer full of junk that all comes out at once.

[–] ptz@dubvee.org 7 points 5 hours ago (3 children)

I bet the pattern buffers on DS9 are all chock full of Windex.

[–] ptz@dubvee.org 3 points 5 hours ago* (last edited 5 hours ago)

Lol, yeah.

The Slashdot article that led me to the original was slanted to say "legacy IT" equipment was the cause and had the distinct subtext that had they been using cloud for everything, they would have been fine.

Nope, this is 100% failure to provision and secure equipment correctly. And cloud doesn't mean anything for security, especially given how many sensitive files have been left in wide-open, publicly accessible S3 buckets.

[–] ptz@dubvee.org 15 points 5 hours ago

Hate to say it (re: security theater), but I think that is correct. I've read articles stating a drop in crime in places where they just have a cardboard cutout of police officers in the window.

[–] ptz@dubvee.org 8 points 6 hours ago

two bills Thursday that would effectively nullify the Supreme Court's rulings against patents on broad software processes and human genes.

Supreme Court makes one good ruling, and now it's trying to be overturned. :smh:

 

Chinese state-sponsored spies have been spotted inside a global engineering firm's network, having gained initial entry using an admin portal's default credentials on an IBM AIX server.

In an exclusive interview with The Register, Binary Defense's Director of Security Research John Dwyer said the cyber snoops first compromised one of the victim's three unmanaged AIX servers in March, and remained inside the US-headquartered manufacturer's IT environment for four months while poking around for more boxes to commandeer.

It's a tale that should be a warning to those with long- or almost-forgotten machines connected to their networks; those with shadow IT deployments; and those with unmanaged equipment. While the rest of your environment is protected by whatever threat detection you have in place, these legacy services are perfect starting points for miscreants.

 

After 20 years, Real-Time Linux (PREEMPT_RT) is finally -- finally -- in the mainline kernel. Linus Torvalds blessed the code while he was at Open Source Summit Europe. [...] The real-time Linux code is now baked into all Linux distros as of the forthcoming Linux 6.12 kernel. This means Linux will soon start appearing in more mission-critical devices and industrial hardware. But it took its sweet time getting here. An RTOS is a specialized operating system designed to handle time-critical tasks with precision and reliability. Unlike general-purpose operating systems like Windows or macOS, an RTOS is built to respond to events and process data within strict time constraints, often measured in milliseconds or microseconds. As Steven Rostedt, a prominent real-time Linux developer and Google engineer, put it, "Real-time is the fastest worst-case scenario." He means that the essential characteristic of an RTOS is its deterministic behavior. An RTOS guarantees that critical tasks will be completed within specified deadlines. [...]

So, why is Real-Time Linux only now completely blessed in the kernel? "We actually would not push something up unless we thought it was ready," Rostedt explained. "Almost everything was usually rewritten at least three times before it went into mainline because we had such a high bar for what would go in." In addition, the path to the mainline wasn't just about technical challenges. Politics and perception also played a role. "In the beginning, we couldn't even mention real-time," Rostedt recalled. "Everyone said, 'Oh, we don't care about real-time.'" Another problem was money. For many years funding for real-time Linux was erratic. In 2015, the Linux Foundation established the Real-Time Linux (RTL) collaborative project to coordinate efforts around mainlining PREEMPT_RT.

The final hurdle for full integration was reworking the kernel's print_k function, a critical debugging tool dating back to 1991. Torvalds was particularly protective of print_k --He wrote the original code and still uses it for debugging. However, print_k also puts a hard delay in a Linux program whenever it's called. That kind of slowdown is unacceptable in real-time systems. Rostedt explained: "Print_k has a thousand hacks to handle a thousand different situations. Whenever we modified print_k to do something, it would break one of these cases. The thing about print_k that's great about debugging is you can know exactly where you were when a process crashed. When I would be hammering the system really, really hard, and the latency was mostly around maybe 30 microseconds, and then suddenly it would jump to five milliseconds." That delay was the print_k message. After much work, many heated discussions, and several rejected proposals, a compromise was reached earlier this year. Torvalds is happy, the real-time Linux developers are happy, print_K users are happy, and, at long last, real-time Linux is real.

 

The Senate Judiciary Committee is scheduled to consider two bills Thursday that would effectively nullify the Supreme Court's rulings against patents on broad software processes and human genes. Open source and Internet freedom advocates are mobilizing and pushing back. The Patent Eligibility Restoration Act (or PERA, S. 2140), sponsored by Sens. Thom Tillis (R-NC) and Chris Coons (D-Del.), would amend US Code such that "all judicial exceptions to patent eligibility are eliminated." That would include the 2014 ruling in which the Supreme Court held, with Justice Clarence Thomas writing, that simply performing an existing process on a computer does not make it a new, patentable invention. "The relevant question is whether the claims here do more than simply instruct the practitioner to implement the abstract idea of intermediated settlement on a generic computer," Thomas wrote. "They do not." That case also drew on Bilski v. Kappos, a case in which a patent was proposed based solely on the concept of hedging against price fluctuations in commodity markets. [...]

Another wrinkle in the PERA bill involves genetic patents. The Supreme Court ruled in June 2013 that pieces of DNA that occur naturally in the genomes of humans or other organisms cannot, themselves, be patented. Myriad Genetics had previously been granted patents on genes associated with breast and ovarian cancer, BRCA1 and BRCA2, which were targeted in a lawsuit led by the American Civil Liberties Union (ACLU). The resulting Supreme Court decision -- this one also written by Thomas -- found that information that naturally occurs in the human genome could not be the subject to a patent, even if the patent covered the process of isolating that information from the rest of the genome. As with broad software patents, PERA would seemingly allow for the patenting of isolated human genes and connections between those genes and diseases like cancer. [...] The Judiciary Committee is set to debate and potentially amend or rewrite PREVAIL and PERA (i.e. mark up) on Thursday.

[–] ptz@dubvee.org 2 points 6 hours ago (1 children)

I don't currently have them, but there is (or was?) a NoIR version of the Pi cameras that didn't have IR filters. That should let the IR LED illuminators work same as most other cameras advertised with night vision.

 
 

I've got a large collection of e-books, but I've always just read them on my phone. Finally broke down and bought a proper e-reader with the nice e-ink display. Why didn't I do this forever ago?

It's got a backlight, but using it under a lamp with reflected light is just so much easier on my eyes and feels more like a paper book. I also haven't read a book written on dead trees in a good minute, so sitting under a lamp just brings back a missing piece of the experience I didn't even know was gone.

I also just can't get over how "fake" the display looks. Fake is usually not used to describe something positively, but in this case, it's a huge praise. The text and book cover images just look like they're printed on a sheet of paper and slipped inside to make the device look functional...like a movie prop. Turning the backlight on diminishes this effect somewhat, though (which is another reason I prefer to leave it off).

I also love that I can just set it down and not worry about coming back to a dead battery, lol. The reader app on my phone is set to prevent it from going to sleep or turning off the screen, so sometimes I'll set it down to go take care of something else, forget, and come back to a nearly dead battery.

To everyone who has recommended these gizmos to me, I finally get it. I know I said reading books on my phone was good enough, but I was wrong.

 

Stolen from an old Reddit post but posting it here because it remains one of my favorite pieces of 30 Rock fan art.

Originally by Mike Jackson (Note: Website no longer seems to work, but crediting it anyway)

 

General Motors is joining forces with EVgo, one of the biggest electric vehicle charging operators in the United States, to build 400 ultra-fast DC chargers nationwide to support the growing number of battery-powered cars hitting U.S. roads.

To be clear, these are individual stalls, not charging stations. However, the two companies describe the new locations as “flagship destinations” which will feature 350-kilowatt DC chargers, ample lighting, canopies, pull-through spots and security cameras.

Most locations will feature up to 20 ultra-fast charging stalls, but some will have even more–good news for those crowded holiday road trips. GM and EVgo said the fancy new stations would be located near shopping areas offering dining, coffee shops and other amenities.

38
Microsoft’s Hypocrisy on AI (www.theatlantic.com)
submitted 6 days ago* (last edited 6 days ago) by ptz@dubvee.org to c/climate@slrpnk.net
 

Note: Link is a gift article.

Microsoft executives have been thinking lately about the end of the world. In a white paper published late last year, Brad Smith, the company's vice chair and president, and Melanie Nakagawa, its chief sustainability officer, described a "planetary crisis" that AI could help solve. Imagine an AI-assisted tool that helps reduce food waste, to name one example from the document, or some future technology that could "expedite decarbonization" by using AI to invent new designs for green tech.

But as Microsoft attempts to buoy its reputation as an AI leader in climate innovation, the company is also selling its AI to fossil-fuel companies. Hundreds of pages of internal documents I've obtained, plus interviews I've conducted over the past year with 15 current and former employees and executives, show that the tech giant has sought to market the technology to companies such as ExxonMobil and Chevron as a powerful tool for finding and developing new oil and gas reserves and maximizing their production -- all while publicly committing to dramatically reduce emissions.

Although tech companies have long done business with the fossil-fuel industry, Microsoft's case is notable. It demonstrates how the AI boom contributes to one of the most pressing issues facing our planet today -- despite the fact that the technology is often lauded for its supposed potential to improve our world, as when Sam Altman testified to Congress that it could address issues such as "climate change and curing cancer." These deals also show how Microsoft can use the vagaries of AI to talk out of both sides of its mouth, courting the fossil-fuel industry while asserting its environmental bona fides. (Many of the documents I viewed have been submitted to the Securities and Exchange Commission as part of a whistleblower complaint alleging that the company has omitted from public disclosures "the serious climate and environmental harms caused by the technology it provides to the fossil fuel industry," arguing that the information is of material and financial importance to investors.

Story continues...

 

Over the past 5-6 months, I've been noticing a lot of new accounts spinning up that look like this format:

  • https://instance.xyz/u/gmbpjtmt
  • https://instance.xyz/u/tjrwwiif
  • https://instance.xyz/u/xzowaikv

What are they doing?

They're boosting and/or downvoting mostly, if not exclusively, US news and politics posts/comments to fit their agenda.

Edit: Could also be manipulating other regional news/politics, but my instance is regional and doesn't subscribe to those which limits my visibility into the overall manipulation patterns.

What do these have in common?

  1. Most are on instances that have signups without applications (I'm guessing the few that are on instances with applications may be from before those were enabled since those are several months old, but just a guess; they could have easily just applied and been approved.)
  2. Most are random 8-character usernames (occasionally 7 or 9 characters)
  3. Most have a common set of users they're upvoting and/or downvoting consistently
  4. No posts/comments
  5. No avatar or bio (that's pretty common in general, but combine it with the other common attributes)
  6. Update: Have had several anonymous reports (thanks!) that these users are registering with an @sharklasers.com email address which is a throwaway email service.

What can you, as an instance admin, do?

Keep an eye on new registrations to your instance. If you see any that fit this pattern, pick a few (and a few off this list) and see if they're voting along the same lines. You can also look in the login_token table to see if there is IP address overlap with other users on your instance and/or any other of these kinds of accounts.

You can also check the local_user table to see if the email addresses are from the same provider (not a guaranteed way to match them, but it can be a clue) or if they're they same email address using plus-addressing (e.g. user+whatever@email.xyz, user+whatever2@emai.xyz, etc).

Why are they doing this?

Your guess is as good as mine, but US elections are in a few months, and I highly suspect some kind of interference campaign based on the volume of these that are being spun up and the content that's being manipulated. That, or someone, possibly even a ghost or an alien life form, really wants the impression of public opinion being on their side. Just because I don't know exactly why doesn't mean that something fishy isn't happening that other admins should be aware of.

Who are the known culprits?

These are ones fitting that pattern which have been identified. There are certainly more, but these have been positively identified. Some were omitted since they were more garden-variety "to win an argument" style manipulation.

These all seem to be part of a campaign. This list is by no means comprehensive, and if there are any false positives, I do apologize. I've tried to separate out the "garden variety" type from the ones suspected of being part of a campaign, but may have missed some.

[New: 9/18/2024]: https://thelemmy.club/u/fxgwxqdr
[New: 9/18/2024]: https://discuss.online/u/nyubznrw
[New: 9/18/2024]: https://thelemmy.club/u/ththygij
[New: 9/18/2024]: https://ttrpg.network/u/umwagkpn
[New: 9/18/2024]: https://lemdro.id/u/dybyzgnn
[New: 9/18/2024]: https://lemmy.cafe/u/evtmowdq
https://leminal.space/u/mpiaaqzq
https://lemy.lol/u/ihuklfle
https://lemy.lol/u/iltxlmlr
https://lemy.lol/u/szxabejt
https://lemy.lol/u/woyjtear
https://lemy.lol/u/jikuwwrq
https://lemy.lol/u/matkalla
https://lemmy.ca/u/vlnligvx
https://ttrpg.network/u/kmjsxpie
https://lemmings.world/u/ueosqnhy
https://lemmings.world/u/mx_myxlplyx
https://startrek.website/u/girlbpzj
https://startrek.website/u/iorxkrdu
https://lemy.lol/u/tjrwwiif
https://lemy.lol/u/gmbpjtmt
https://thelemmy.club/u/avlnfqko
https://lemmy.today/u/blmpaxlm
https://lemy.lol/u/xhivhquf
https://sh.itjust.works/u/ntiytakd
https://jlai.lu/u/rpxhldtm
https://sh.itjust.works/u/ynvzpcbn
https://lazysoci.al/u/sksgvypn
https://lemy.lol/u/xzowaikv
https://lemy.lol/u/yecwilqu
https://lemy.lol/u/hwbjkxly
https://lemy.lol/u/kafbmgsy
https://discuss.online/u/tcjqmgzd
https://thelemmy.club/u/vcnzovqk
https://lemy.lol/u/gqvnyvvz
https://lazysoci.al/u/shcimfi
https://lemy.lol/u/u0hc7r
https://startrek.website/u/uoisqaru
https://jlai.lu/u/dtxiuwdx
https://discuss.online/u/oxwquohe
https://thelemmy.club/u/iicnhcqx
https://lemmings.world/u/uzinumke
https://startrek.website/u/evuorban
https://thelemmy.club/u/dswaxohe
https://lemdro.id/u/efkntptt
https://lemy.lol/u/ozgaolvw
https://lemy.lol/u/knylgpdv
https://discuss.online/u/omnajmxc
https://lemmy.cafe/u/iankglbrdurvstw
https://lemmy.ca/u/awuochoj
https://leminal.space/u/tjrwwiif
https://lemy.lol/u/basjcgsz
https://lemy.lol/u/smkkzswd
https://lazysoci.al/u/qokpsqnw
https://lemy.lol/u/ncvahblj
https://ttrpg.network/u/hputoioz
https://lazysoci.al/u/lghikcpj
https://lemmy.ca/u/xnjaqbzs
https://lemy.lol/u/yonkz

Edit: If you see anyone from your instance on here, please please please verify before taking any action. I'm only able to cross-check these against the content my instance is aware of.

 
80
submitted 1 week ago* (last edited 1 week ago) by ptz@dubvee.org to c/tenforward@lemmy.world
 

2x10 - Cold Fire

 

How to Play

The rules for each round are below. Calculation and reporting of scores is on the honor system.

Rules for Round 1

Example of the Format

  1. You will need to find the connection between the 4 clues. Each clue is revealed by opening the spoiler tags in the post for each.
  2. You get one guess, and the goal is to use as few clues as possible.
  3. Clues are given out one at a time, and you should only reveal the next clue if you cannot make the connection with the clues given so far.
  4. Each additional clue reduces the points earned to the value indicated above it. e.g. if you get the answer after the third clue is revealed, you will receive only two points.
  5. The later clues are usually easier to reveal the connection with the last clue sometimes being obvious.

Rules for Round 2

  1. In this round, each set of four clues forms a sequence. Up to three clues can be revealed, and you are responsible for determining the last clue in the sequence.
  2. As before, clues are revealed one at a time, and the goal is to correctly identify the last item in the sequence using as few clues as possible.
  3. A bonus point is awarded for correctly identifying the connection between the items in the completed sequence .

Round 1: Find the Connection

Clue 1 (5 points)

Clue 2 (3 points)

Clue 3 (2 points)

Clue 4 (1 points)

Answer


Round 2: Find the Fourth in the Sequence

Clue 1 (5 points)

Clue 2 (3 points)

Clue 3 (2 points)

Answer (0 points)

Bonus Connection Answer (add +1 to your score if you got it correct)

view more: next ›