• 0 Posts
  • 32 Comments
Joined 1 year ago
cake
Cake day: June 12th, 2023

help-circle


  • I was working at a company at one point that got a contract to build something I viewed equivalent to malware. Immediately I brought it up to several higher-ups that this was not something I was willing to do. One of them brought up the argument “If we don’t do it someone else will.”

    This mentality scares the shit out of me, but it explains a lot of horrible things in the industry.

    Believing in that mentality is worse than the reality of the situation. At least if you say no there’s a chance it doesn’t happen or it gets passed to someone worse than you. If you say yes then not only are you complicit, you are actively enforcing that gloomy mentality for other engineers. Just say no.












  • Yep. Battery chemistry is a real pain in the ass. Every few years someone spins a wheel and determines the next big thing that everyone needs to do to prevent batteries from dying early. For a while people were told full cycles were healthy for avoiding cell memory. Now more sporadic cycles are being peddled.

    Use the device as you need it. If you complete a full cycle, cool; if not, that’s fine. Just don’t let the damn thing completely die and don’t keep it permanently on charge. Those are the common things most people do on accident that can really screw up a cell.



  • The most useful quote to those familiar with the linux boot process:

    “An attacker would need to be able to coerce a system into booting from HTTP if it’s not already doing so, and either be in a position to run the HTTP server in question or MITM traffic to it,” Matthew Garrett, a security developer and one of the original shim authors, wrote in an online interview. “An attacker (physically present or who has already compromised root on the system) could use this to subvert secure boot (add a new boot entry to a server they control, compromise shim, execute arbitrary code).”

    If an attack needs root then it doesn’t matter. Your box is toast anyway. If you’re using http boot without verification then you should have seen a MITM attack coming.


  • Something akin to haveibeenpwned.com password hash partial match? Can that even be done with this data?

    Edit: You goofs know you can calculate the hash locally and submit it for review without actually exposing your password to them right? That’s how bitwarden does it’s check. https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity

    Ah, but Mozilla isn’t even trying to do anything cool like that. They just use onereap and those fuckers look shady. Quotes from their privacy policy: https://onerep.com/privacy-policy#what-data-we-collect-and-how-we-do-that

    We use your Personal Information for a number of purposes, which may include the following:

    [snip]

    • To display advertisements to you.
    • To manage our Affiliate marketing program.

    There will be times when we may need to disclose your Personal Information to third parties. We may disclose your Personal Information to:

    [snip]

    • Third-party service providers and partners who assist us in the provision of the Services and Website, for example, (a) those who support delivery of or provide certain features in connection with the Services and Website (e.g. Stripe, a payment services provider; Sendgrid, an email delivery service; HubSpot, a CRM platform, and Sentry, a crash reporting platform); (b) providers of analytics and measurement services (e.g. Google Analytics, ProfitWell etc.); © providers of technical infrastructure services (e.g. Microsoft Azure, Google Cloud, and Amazon AWS); (d) providers of customer support services (e.g. Zendesk); (e) those who facilitate conduct of surveys (e.g. Hotjar); (f) those who help to advertise, market or promote our Services and Website (e.g. Mautic, Facebook Ads, Google Ads, Linkedin Ads, Reddit Ads, and Microsoft Ads);

    The bastards




  • Well, when the game is essentially running in a virtual machine with an address translation layer that scrambles the backing memory every few minutes you’re lucky the game even runs. Good luck trying to decipher that hell. A few guys have done it, I remember the one dude ranting on Twitter about trying to crack Borderland’s 3 back around launch.

    And then the follow up which was that Denuvo was basically adding a ~30fps overhead to the game and everyone was initially blaming the devs for releasing unoptimized garbage.

    Gabe had it right, piracy is a service problem. And my motto has always been if the game has some garbage like Denuvo, then you couldn’t even pay me to take a copy. Not worth the headache.