Google Chrome now sends telemetry back to Google about CPU, GPU and memory usage via a browser extension that is hidden in the list of extensions.
https://x.com/lcasdev/status/1810696257137959018 [$]
Ysengrin posing in front of a brick wall, taken at AnthrOhio 2024.
The year is 2042. AI "employees" are widely used in business and they are compensated better than their human counterparts because management has convinced themselves that AI employees produce higher quality work and are more productive.
An out-of-work writer gets a job by pretending to be an AI. Her work is better than what the other AIs are producing. Management is elated, thinking she's a revolutionary new model. They assign her increasingly high profile projects.
She finds it harder and harder to keep up the ruse, especially because she's fallen in love with one of her co-workers, something an AI doesn't do.
One of the most widely used network protocols is vulnerable to a newly discovered attack that can allow adversaries to gain control over a range of environments, including industrial controllers, telecommunications services, ISPs, and all manner of enterprise networks.
Short for Remote Authentication Dial-In User Service, RADIUS harkens back to the days of dial-in Internet and network access through public switched telephone networks. It has remained the de facto standard for lightweight authentication ever since and is supported in virtually all switches, routers, access points, and VPN concentrators shipped in the past two decades. Despite its early origins, RADIUS remains an essential staple for managing client-server interactions.
Since 1994, RADIUS has relied on an improvised, home-grown use of the MD5 hash function. The result is “Blast RADIUS,” a complex attack that allows an attacker with an active adversary-in-the-middle position to gain administrator access to devices that use RADIUS to authenticate themselves to a server.
Ubiquitous RADIUS scheme uses homegrown authentication based on MD5. Yup, you heard right.Ars Technica
I'm getting out the popcorn for this one. Capitalism made right: if we suffer from heat, then let's get the guys who are responsible for it to pay...
Even though I think the bad guys here have too much money and will throw so many lawyers at the problem that the courts will not be able to hold them all...
Multnomah County's heat dome conditions killed 69 people in 2021.Ars Technica
Kindness is a virtue. Kindness is punk. Be kind to those who deserve it, especially (but not only) those close to you.
Pass it on.
Every so often I used to post this infographic about @Torrle and the stapler wolf and giant paw.
It's nice to see Fang, Feather & Fin did a larger writeup on it:
https://www.fangfeatherandfin.com/stapler-fursuit-the-legend-of-the-paw-and-the-maw/
Yes, you read that right: Stapler Fursuit. In this article we are going to explore a fun story of one furry and his desire to put on a great performance in the…Gale Frostbane (Fang, Feather, & Fin)
Normally, this kind of advice is framed more positively, but I want to be absolutely clear:
Don’t put yourself down.
Don’t apologize for existing.
Don’t tell others they should feel bad for knowing you.
Don’t wallow in shame.
Even if you feel bad, or like you’ve something to atone for, that kind of behavior doesn’t help you or anyone else; debasing yourself does nothing to process negative emotions or to take responsibility for your actions - and nothing hurts your loved ones quite like it.
Sometimes you can tell a lot about a person by the domains they register. For no particular reason, I was looking at the domain footprint of Rep. Marjorie Taylor Greene, and found a phone number connected to her over the years that was used to register mtgforamerica[.]us back in 2021. The domain's registration records are hidden behind privacy services from anonymize.com, but their privacy system assigns a unique email to each private registrant, so you can still do a reverse search on that and find out what other domains are registered by the same account.
Domaintools finds 21683@anonymize.com was used to register 156 domains, including supportkylerittenhouse[.]com and repealjuneteenth.com. Here's the full list if anyone's interested: https://docs.google.com/spreadsheets/d/1Xy7FDYtN-YGyv29XZ08wf_Z1OPAemfmccpVqwZ-ci50/edit?usp=sharing
https://www.malwarebytes.com/blog/news/2024/06/poseidon-mac-stealer-distributed-via-google-ads
this is the kind of thing I point to when I say that blocking ads is effective in blocking an entire vector for malware distribution
A competitor of the infamous Atomic Stealer targeting Mac users, has just launched a new campaign to lure in more victims.Jérôme Segura (Malwarebytes)
Probably one of the best re-composed versions of the Arthur Theme. Compsed by David Lowe, commissioned by the BBC For the BBC Election 2024 Coverage.The buil...YouTube
@avon_deer Yee, I know. The BBC did a bit of a mashup of it with the BBC News theme in 2019, and this year a reorchestrated version of that mashup.
It's very lovely.
nyaa has wares if you have coin
#fursuit #kemonofursuit #fursuiteveryday #kemono #furry #furryfandom #fursuiter #fursuiting #kemonosuit #fursuitphotography #furrycommunity #catfurry #catfursuit #fursuits
@tilton Ah, old people yelling at PoetteringOS :D
I almost never have issues with it, however kubernetes, docker and all the messy, half-finished, half-stable, half-unusable crap around them that we build the world around... yeah.
Linksys routers are sending Wifi passwords to their servers in plain text 😬
https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/
According to Testaankoop, the Belgian equivalent of the Consumers' Association, two types of Linksys routers are sending Wi-Fi login details in plaintextAlex Ivanovs (Stack Diary)
You are right, of course, but it's far easier for the human eye to debug JSON than it is a myriad of binary protocols. Bandwidth is fast and relatively cheap.
I come from an embedded background though so it still makes me twitch.
Finger pointing should really go at Web frameworks though. An utter waste of bandwidth to usually display very little.
I still get pissed off using more RAM than I need to. It used to be a source of pride fitting something in the smallest and cheapest chip possible, usually in assembly.
All those moments will be lost in time, like tears in rain.
Full on STM32 now in C rather than PIC assembly.
I just finished logging into eight different Twitter accounts (all of which had 2-factor of one kind or another on them, so were fairly safe anyway) and changing all their passwords. Including one account I created back in 2011 or something and have literally never got round to using. I'm not sure I can even remember what it was going to be for, now, although I'm sure I had a project in mind for the account name. I know, I should probably just delete them all, but I hate deleting stuff, probably for the same reason my living space is jammed full of stuff I haven't used yet (but absolutely definitely will someday). At least with fresh passwords they should be safe to leave alone for now.
Researchers at Cyber Press discovered a 9.4GB leaked Twitter user data containing nearly 200 million user data records. This leak, sourced from a Twitter database or scrape, represents one of the largest exposures of user data in recent times.Kaaviya Ragupathy (CybersecurityNews)
In this house, we don't kinkshame.
We kink-enable. 😏
Being a furry with lots of wonderful and varied friends means that (almost) no matter what degenerate filth crosses my timeline, I know somebody I can send it to, safe in the knowledge it'll give them an inappropriately timed boner. :3c Muehehehe~ #furry #kobold #phone #kink #teasing #comic
The three act structure of storytelling:
1) Aw shucks do I have to?
2) Living the grindset and barely scraping by and shit keeps going wrong
3) Finally. Can I go home now?
Tragedy edition:
Act I: I tried so hard
Act II: and got so far
Act III: but in the end, it doesn't really matter
Hero's Journey edition:
Act I: Hey now,
Act II: You're a rock star, Get your show on
Act III: Get paid