Avatar

π’π’†π’Žπ’‚π’π’

lemann@lemmy.dbzer0.com
Joined
11 posts β€’ 615 comments

Hey πŸ‘‹ I’m Lemann: mark II

I like tech, bicycles, and nature.

Otherwise known as; @lemann@lemmy.one and @lemann@lemmy.world

Direct message

While it’s good that they have been ramping up production, their attitude towards consumers during the shortage is something that some users won’t forget, as well as them seemingly ignoring that they are an education charity.

At least the Pi CEO acknowledges this in the CES interview with Jeff Geerling, where he mentions that the company has been β€œburnt” from a customer perspective. While they do contribute a lot to mobile linux development (indirectly), I think most people here would probably prefer the company just focus on their original mission of getting an affordable, credit card sized computer into users’ hands… not scalpers and hardware developers’ warehouses.

Also, I personally don’t really want to support Broadcom seeing the horrible decisions they’ve been making recently - why would they buy VMWare, then proceed to drop ALL of their partners, and put a ton of their staff out of work??

permalink
report
reply

I’m all for it to be honest. The 737 Max sounds like a death trap, and until Boeing is banned from certifying their own planes nobody should be flying in these IMO.

The FAA needs to start certifying these themselves again, and remove the existing loopholes/exemptions that allow some design changes to avoid recertification

permalink
report
parent
reply

They should do something about β€œconsent platforms” using various DNS tricks and thousands of domain names to bypass/evade user blocks.

I wasn’t so bothered about some non-invasive ads a few years ago, but I absolutely despise any kind of ad now TBH, and it’s mainly down to how persistent some of these platforms are with their evasion tactics

Also pretty ironic for their popups to talk about β€œrespecting” my privacy when these platforms literally do the opposite of that to show their popup in the first place. I will not support any of them, in any way, on my network.

As soon as I see a new one appear when browsing, I chuck it into dnsdumpster so it can get recorded with the rest of them, and then block the new list from dnsdumpster (grid icon) on my network.

permalink
report
reply

Made even worse by Sony, the manufacturer, completely exiting that market. I wonder if/how Sony will fix this, are there even staff on hand there with the technical details for their projector’s DRM anymore?

It speaks volumes about how silly DRM is when a massive game publisher like TakeTwo/Rockstar resorts to selling a pirated version of their own game πŸ€¦β€β™‚οΈ

The next time this happens those projectors may end up being $20000 bricks, and I’m not too sure how many independents will be able to afford dumping a quarter of a million to replace all their projector screens

permalink
report
parent
reply

Someone else mentioned in a comment that the LLC behind Yuzu may file for bankruptcy to avoid paying Nintendo anything

permalink
report
parent
reply

At least this policy is making it easy to spot bot accounts and autogenerated product listings.

These sellers should be shadowbanned and penalized, there is absolutely no justification to have an LLM auto-generate product listings unless the intent is to create spam

permalink
report
reply

I’m rooted to…

  • backup & restore my apps as I please (as well as scheduled backups to my SD card)
  • BMS control to keep my battery in good health
  • Automation app for automating stuff (like Tasker)
  • revoking typically unrevokable permissions from system and Google apps
  • To actually feel like I own my device.

If I wanted a heavily curated (and somewhat locked down) experience, I’d be in the Apple ecosystem - don’t know why Google thinks it’s a great idea to force this ideology onto practically all Android users…

Similar situation with that additional warning for sideloading apps - there’s already two warnings and Play Protect typically uninstalls these apps anyway, without the user’s consent - in one case deleting KDE Connect from users’ devices if installed with F-Droid

Uhh I definitely went off on a tangent, oops.

permalink
report
reply

Good.

My VPS provider also migrated away from VMWare - got an email saying VMs would be down temporarily during the move, and the main website no longer contains any references to the virtualization tech. I miss my /64 IPV6 😭 but i’ll happily give that up if it means Broadcom’s dumpster fire comes crashing down as big customers pull the plug and migrate

permalink
report
reply

Hands up if you/someone you know purchased a Steam Deck or other computer handheld, instead of upgrading their GPU πŸ™‹β€β™‚οΈ

To be honest I stopped following PC hardware altogether because things were so stagnant outside of Intel’s alder lake and the new x86 P/E cores. GPUs that would give me a noticeable performance uplift from my 1060 aren’t really at appealing prices outside the US either IMO

permalink
report
reply

Wow, this is a very complex exploit, involving bits of iMessage and an undocumented CPU feature that allowed the attacker to evade hardware memory protection. From what I can see, Lockdown mode would have prevented this. The attacker is ridiculously skilled regardless

Exerpts from the article missing from the bot summary:

The mass backdooring campaign, which according to Russian officials also infected the iPhones of thousands of people working inside diplomatic missions and embassies in Russia, according to Russian government officials, came to light in June. Over a span of at least four years, Kaspersky said, the infections were delivered in iMessage texts that installed malware through a complex exploit chain without requiring the receiver to take any action.

With that, the devices were infected with full-featured spyware that, among other things, transmitted microphone recordings, photos, geolocation, and other sensitive data to attacker-controlled servers. Although infections didn’t survive a reboot, the unknown attackers kept their campaign alive simply by sending devices a new malicious iMessage text shortly after devices were restarted.

The most intriguing new detail is the targeting of the […] hardware feature […]. A zero-day in the feature allowed the attackers to bypass advanced hardware-based memory protections designed to safeguard device system integrity even after an attacker gained the ability to tamper with memory of the underlying kernel.

permalink
report
reply