Avatar

Majestic

Majestic@lemmy.ml
Joined
0 posts • 92 comments
Direct message

data such as host name,

Okay why do they need to know that? Why do they need to know if the computer is called “Melissa’s Laptop” or “Workstation 15, Internal security division”? Seems like this kind of data could if stolen be misused and it has minimal legitimate purpose IMO as anyone can put anything as host name and while in organizations it often corresponds to use it doesn’t have to for individuals. Someone could call their machine “Mack’s Porn Rig” and they only use it for doing banking and a little coding.

kernel version, desktop component versions, detailed information about hardware and drivers involved, screen size and resolution information,

This all seems legitimate enough, this would be helpful for understanding the hardware their users run on and targeting features or bug fixes.

network device MAC addresses,

Not great but there is an argument for it, they could just grab and send the first 3-4 octets which would give them the info they need on manufacturers without getting uniquely identifiable data that along with some of this other stuff is concerning for fingerprinting.

disk serial numbers,

Okay, what the fuck. Why do they need disk serial numbers? What possible use is there for that. Those are used for warranty claims and could be used as part of uniquely fingerprinting a computer and person. Not cool.

disk partition data,

This is vague enough. I guess one could choose to see this as just info about partitions in use say if there’s also an NTFS partition that looks like a Windows install that would be useful but on the other hand data encompassed within a partition could also nefariously be read as allowing them access to all your data. Partition layout, partition labels, and file systems used on disks available to the system would be a clearer way to put this and erase any doubt.

information about the number of running processes and installed packages, versions of basic packages such as systemd, gcc, bash and PipeWire.

All this is also fine just technical data stuff.

permalink
report
reply

Not really. This requires a sophisticated attacker. I’d suggest updating soon but I doubt most people are at risk. As always verify downloads before running them and check where you should be getting updates and if you’re sent to a sketchy file host try to find updates from the official website instead.

The biggest risk is MTM interception and replacement of the python executable if you try and use the search tool for the first time. I suppose avoid doing that until you update the client from their website.

permalink
report
parent
reply

Drag the main BDMV folder that has stream and playlist subfolders into handbrake. It will read the playlist files and show you possible combinations that you can choose to encode from. It will also grab chapter and subtitles.

At least it should. Though makemkv as others note can do this itself.

permalink
report
reply

The term you’re looking for is “bluray authoring”.

Search for that. Industry tends to use Scenarist but it would be too expensive for an individual and they probably wouldn’t sell to you anyways. There are semi-pro tools, most paid, some hundreds of Euros.

permalink
report
reply

I’d err on the larger side for a disk. Assuming 1000 hours at 60fps, 1080p, serviceable bitrates I’d get an 16-18TB disk to start.

As to watchable that depends on how good your eyes are and the exact content.

I really hope you plan on naming these files descriptively or having a document that has tags and lists info for videos for easy searching as future you may not want to sift through hundreds of hours to find something.

permalink
report
reply

This isn’t the end of Linux but it may be the beginning of the end. Right now alarm bells are screaming in China, Russia, India, across the global south about this. They’ve seen the decades of US sanctions, often arbitrary and other punitive measures including cultural campaigns of exclusion and punishment (remember “freedom fries” after 9/11 because the French wouldn’t go along with US adventures in Iraq?) now reaching a fever-pitch. All pretensions of the US to stand for freedom and individual liberty and such have been pushed aside, shoved away by these acts and the blatant hypocrisy of their support of the genocidal zionist state which even now broadens the war of aggression and genocide against Palestinians and Lebanese with full US support and diplomatic cover at the UN.

They see that all that lofty talk from the US was after all a lie. A large number of lies.

Where do we go from here? I fear fragmentation and partition of the world may be inevitable, a new cold war, the internet, software, everything being divided by series of hard and not so hard walls and barriers impeding cooperation, business, trade, cultural exchange, and people to people relations and discussions at an organic grassroots level.

Those in the west will see the freedoms increasingly curtailed, lofty language rolled back behind a large series of ever more expansive “but…” clauses, corporatization of the internet will increase, surveillance, control all justified by the waved wand of hysteria over Russia, China, Iran, muslims, whoever necessitating giving up your privacy, your rights, your freedoms, and of course any right for a dissenting opinion against whoever the current US president is and their administration.

National security in the 90s was used to outlaw export of encryption, to embargo the idea of a secure internet, to push for backdoor chips via the clipper chip in all personal computers. Now it and the same kind of foreign boogeymen are being used to finish that task that they failed at and we are letting them because of jingoism.

permalink
report
reply

Sure. Sure. They’ve been close or getting closer for 10 years now.

I’ll believe it when it actually releases and not a moment sooner. Otherwise I would be the opposite of shocked if July 2025 rolls around and it’s still not out but still “close”. As I would be if December 2025 rolls around and “there are only a few more issues, very soon!” is the statement. It’s become a joke at this point and likely will remain the butt of jokes and rightfully so for years, perhaps decades to come in the open source and graphics design communities.

permalink
report
reply

The real answer is organize your library. There’s no reason to have it like that.

At least create two folders “Movies” and “TV Shows” or however you want to name them. Put movies in the movies sub-folder, ideally in named folders that match the name of the movie (so Movies/The Godfather (1972)/moviefile.mkv) and TV shows in the other folder again with a subfolder for each show with year included.

The best way to do this is to use a media manager when adding files. Something like mediaelch or tiny media manager and scrape your films and ideally tv shows as well and create local metadata for them that you save. Both can do renaming though tmm does it slightly better if you pay for the subscription version and it can automatically scrape and rename your library along with creating the relevant nfo files and things like posters so Kodi just works.

I guess you could try connecting Kodi to another service. If you’re okay running Plex on some other machine or Jellyfin you can connect Kodi to that if they scrape it all properly but most likely they’ll have issues as well because the only real solution is organizing your library. There are paid tools as I mention as well as free ones. Filebot is another paid tool that does organization and such.

permalink
report
reply

If it’s transcoding then that’s a server error most likely saying it doesn’t have enough memory to support live-transcoding. Try and force direct-playing by changing settings or as someone else suggested, use Infuse with direct-mode which avoids transcoding.

Don’t listen to people saying not to use the ethernet port, recent ATVs have good gigabit ethernet ports and I’ve measured good performance on them in the past and I suggest the person saying that mistakenly believed you had an actual smart TV, not a device like an AppleTV.

permalink
report
reply

In this case it’s looking like people trying to showcase their skill and possibly get bragging rights or at least a reputation for doing these attacks which they can use to earn money from others for these types of services.

permalink
report
parent
reply