Skip Navigation
iFixit hails replaceable LPCAMM2 laptop memory as a 'big deal'
  • If you're a manufacture, what incentives LPCAMM2 gives you over soldering the RAM? With soldering, you can upsell the upgrades and force ppl to replace the whole machine every 1-2 years. How does LPCAMM2 benefits the company? I'm talking in general, not some niche manufacturers like Framework.

    TBH, I don't think many will adopt this. Maybe it will show up in some expensive laptops like high end gaming and workstation, but majority of them wouldn't.

  • Privacy.com alternative for the UK & EU region

    Recently I just hit by stolen card detail and makes me searching a virtual card service. Anyone knows any works in the UK and EU region? Apparently Privacy.com needs SSN to work now. Thanks.

    21
    LockBit ransomware admin identified, sanctioned in US, UK, Australia
    www.bleepingcomputer.com LockBit ransomware admin identified, sanctioned in US, UK, Australia

    The FBI, UK National Crime Agency, and Europol have unveiled sweeping indictments and sanctions against the admin of the LockBit ransomware operation, with the identity of the Russian threat actor revealed for the first time.

    LockBit ransomware admin identified, sanctioned in US, UK, Australia
    2
    HDMI stream live processing?
  • Well, I'm simply reciting what is described on the page based on my understanding. From the diagram, it does not do raw frame processing from the source (assuming HDMI w/ HDCP) as the stream remains encrypted. By the look of it, it is copy or passthrough to the muxer (as it labeled). With some magic, it muxes two encrypted streams into one and output to the video sink. How is that done I have no idea.

  • HDMI stream live processing?
  • It doesn't and I didn't ever mentioned HDMI in my reply. Just doubt if overlaying another encrypted stream with a muxer ever need that much processing power to the point of "prohibitively expensive".

  • HDMI stream live processing?
  • As OP said volume leveling is acceptable, something like this will do.

    Modifying HDMI video signal is simply impossible due to DMCA and bla bla bla. But not all hope is lost though. You can overlay opaque video on top of another encrypted stream via this little box. This is an old project per se and I have no idea if still available, but with some dirty work you might able to detect the increase of volume or match of an algo or something with a total black screen overlay on top.

  • "just got doxxed to within 15 miles by a vision model, from only a single photo of some random trees. the implications for privacy are terrifying. i had no idea we would get here so soon. holy shit"
  • Yeah, for the pic you used as example, the tool will just create something that fits. Not really "unblur" the image but guess what it would be with the info it have. It will be very likely not the same face versus the original.

    However, recreating background maybe easier and accurate enough for a geo guesser or a ML model to figure out roughly where the image was taken.

  • Number of email accounts for financials
  • multiple email account? Not really. It is typically implemented using some email proxy or alias like anonaddy or simplelogin. By the look of it is multiple accounts, but in fact you're just receiving mail forwarded to you in one account. All you have to do is append any strings as the user with your domain.

    (anonaddy and simplelogin requires adhoc address generation using subdomain by them or a domain owned by you with MX records pointing to their servers)

    disclosure: I'm a current customer of anonaddy. Never used simplelogin though.

  • Government Response - Petition: Require videogame publishers to keep games they have sold in a working state
    petition.parliament.uk Petition: Require videogame publishers to keep games they have sold in a working state

    Require publishers to leave videogames (and related game assets / features) they have sold to customers in a reasonably working state when support ends, so that no further intervention whatsoever is necessary for the game to function, as a statutory consumer right.

    Petition: Require videogame publishers to keep games they have sold in a working state

    tl;dr: we will do nothing about it

    Full response below

    ---

    The Government recognises recent concerns raised by video games users regarding the long-term operability of purchased products.

    Consumers should be aware that there is no requirement in UK law compelling software companies and providers to support older versions of their operating systems, software or connected products. There may be occasions where companies make commercial decisions based on the high running costs of maintaining older servers for video games that have declining user bases. However, video games sellers must comply with existing consumer law, including the Consumer Rights Act 2015 (CRA) and the Consumer Protection from Unfair Trading Regulations 2008 (CPRs).

    The CPRs require information to consumers to be clear and correct, and prohibit commercial practices which through false information or misleading omissions cause the average consumer to make a different choice, for example, to purchase goods or services they would not otherwise have purchased. The regulations prohibit commercial practices which omit or hide information which the average consumer needs to make an informed choice, and prohibits traders from providing material information in an unclear, unintelligible, ambiguous or untimely manner. If consumers are led to believe that a game will remain playable indefinitely for certain systems, despite the end of physical support, the CPRs may require that the game remains technically feasible (for example, available offline) to play under those circumstances.

    The CPRs are enforced by Trading Standards and the Competition and Markets Authority. If consumers believe that there has been a breach of these regulations, they should report the matter in the first instance to the Citizens Advice consumer helpline on 0808 223 1133 (www.citizensadvice.org.uk). People living in Scotland should contact Advice Direct Scotland on 0808 164 6000 (www.consumeradvice.scot). Both helplines offer a free service advising consumers on their rights and how best to take their case forward. The helplines will refer complaints to Trading Standards services where appropriate. Consumers can also pursue private redress through the courts where a trader has provided misleading information on a product.

    The CRA gives consumers important rights when they make a contract with a trader for the supply of digital content. This includes requiring digital content to be of satisfactory quality, fit for a particular purpose and as described by the seller. It can be difficult and expensive for businesses to maintain dedicated support for old software, particularly if it needs to interact with modern hardware, apps and websites, but if software is being offered for sale that is not supported by the provider, then this should be made clear.

    If the digital content does not meet these quality rights, the consumer has the right to a repair or replacement of the digital content. If a repair or replacement is not possible, or does not fix the problem, then the consumer will be entitled to some money back or a price reduction which can be up to 100% of the cost of the digital content. These rights apply to intangible digital content like computer software or a PC game, as well as digital content in a tangible form like a physical copy of a video game. The CRA has a time limit of up to six years after a breach of contract during which a consumer can take legal action.

    The standards outlined above apply to digital content where there is a contractual right of the trader or a third party to modify or update the digital content. In practice, this means that a trader or third party can upgrade, fix, enhance and improve the features of digital content so long as it continues to match any description given by the trader and continues to conform with any pre-contract information including main characteristics, functionality and compatibility provided by the trader, unless varied by express agreement.

    Consumers should also be aware that while there is a statutory right for goods (including intangible digital content) to be of a satisfactory quality, that will only be breached if they are not of the standard which a reasonable person would consider to be satisfactory, taking into account circumstances including the price and any description given. For example, a manufacturer’s support for a mobile phone is likely to be withdrawn as they launch new models. It will remain usable but without, for example, security updates, and over time some app developers may decide to withdraw support.

    Department Culture, Media & Sport

    31
    UK flooded with forged stamps despite using barcodes — to prevent just that
    www.bleepingcomputer.com UK flooded with forged stamps despite using barcodes — to prevent just that

    Royal Mail, the British postal and courier service began switching all snail mail stamps to barcoded stamps last year. The purpose of the barcode was to enhance security, deter stamp reuse, and possibly prevent forgeries—which it has failed to do.

    UK flooded with forged stamps despite using barcodes — to prevent just that

    If a stamp have a barcode, why not just let people who have printers at home to print it on the envelope directly? This eliminates the need to buy physical stamp, thus the probability of buying counterfeit stamps.

    30
    UDP Tunneling solution recommendations

    I want to host a small game server for friends and myself in my home but doesn't want to open up the firewall. Any tunneling solutions supports UDP? Thnaks.

    20
    Mikrotik for Inter-VLAN Routing?

    Anyone tried it? I'm planning but saw the benchmark is pretty bad. Unsure if I interpret correctly.

    6
    Xbox multiplayer risks your security, if it hasn't banned you already - What console users pay for.

    As a PC player, I never grasp why console players are willing to pay a ransom to access a product and service they already paid for.

    And worst, this video shows M$ double dip dev by taking a 30% cut plus the cost of game service (like logins, verification, lobby, etc) unlike Steam that already have it covered in that cut, and triple dip by asking player to pay more.

    8
    IBM says their latest AI-enhanced storage platform can identify ransomware in under a minute
    www.techspot.com IBM says their latest AI-enhanced storage platform can identify ransomware in under a minute

    As IBM highlights, existing FlashSystem products already scan all incoming data as it is being written, without impacting performance. The new AI-enhanced FlashCore Module 4 (FCM) is...

    IBM says their latest AI-enhanced storage platform can identify ransomware in under a minute

    Am I too pessimistic about this? Today it can detect ransomware, the next day could be malware, and the day after can be any file.

    It's just a data filter that's build in to a hardware and possibly no way to trun off. Last thing I want is a black box watching what I stored on my drive.

    13
    FOSS alternative to Unsee.cc

    cross-posted from: https://lemmy.ml/post/12593641

    > I want to share some images securely with self destruct. Is there any alternatives can do what Unsee.cc does excluding chat? > > So the functions I'm looking for: > - Self-expiring image > - Copy protection > - Store in RAM > - (optional) watermarking > - (optional) share more types of documents like PDF > > Thanks in advance.

    5
    FOSS alternative to Unsee.cc

    I want to share some images securely with self destruct. Is there any alternatives can do what Unsee.cc does excluding chat?

    So the functions I'm looking for:

    • Self-expiring image
    • Copy protection
    • Store in RAM
    • (optional) watermarking
    • (optional) share more types of documents like PDF

    Thanks in advance.

    3
    Question about the order of FDE steps with LUKS and LVM

    I'm setting up FDE and wonders which one is better. "LVM over LUKS" or "LUKS over LVM"? Or something else? Does one is definitely better then the other? What are your preference?

    Thanks.

    22
    Google admits Spotify pays no Play Store fees because of a secret deal | TechCrunch
    techcrunch.com Google admits Spotify pays no Play Store fees because of a secret deal | TechCrunch

    Google during a testimony in the Epic vs Google trial said that a deal with Spotify allows the audio company to completely bypass Play Store fees.

    Google admits Spotify pays no Play Store fees because of a secret deal | TechCrunch
    145
    Anyone tried Netbird?
    netbird.io NetBird - Connect and Secure Your IT Infrastructure in Minutes

    NetBird combines a configuration-free peer-to-peer private network and a centralized access control system in a single cloud platform.

    cross-posted from: https://lemmy.ml/post/8144135

    > Just stumble it on YT. Anyone tried Netbird? How this compares to Tailscale w/ headscale?

    8
    Anyone tried Netbird?
    netbird.io NetBird - Connect and Secure Your IT Infrastructure in Minutes

    NetBird combines a configuration-free peer-to-peer private network and a centralized access control system in a single cloud platform.

    Just stumble it on YT. Anyone tried Netbird? How this compares to Tailscale w/ headscale?

    0
    Hash matching proposals for the Online Safety Act’s implementation are dangerous | Proton
    proton.me Hash matching proposals for the Online Safety Act’s implementation are dangerous | Proton

    The UK government has proposed using hash scanning to detect abusive material without violating people’s privacy. Unfortunately, it won’t work.

    Hash matching proposals for the Online Safety Act’s implementation are dangerous | Proton
    2
    If BT over Tor is bad for privacy, why VPN is not?

    This is an continuation of my last post, specifically a comment from @rufus@discuss.tchncs.de:

    > It will never get recommended. It’s bad for the network and bad for your privacy.

    Excluding that doing so is bad for the network, why it is "private" using VPN but not Tor, inferring from common consensus. The main point in the blog post is a protocol level problem:

    > apparently in some cases uTorrent, BitSpirit, and libTorrent simply write your IP address directly into the information they send to the tracker and/or to other peers

    Tor and VPN are both transports what wrap other traffic within. If that statement is true, no transport can save the information leaking nature of the BT protocol itself.

    9
    Is BT over Tor still not recommened?
    blog.torproject.org Bittorrent over Tor isn't a good idea | Tor Project

    An increasing number of people are asking us about the recent paper coming out of Inria in...

    Bittorrent over Tor isn't a good idea | Tor Project

    It's been 13 yesrs after this blog was written. Does the claim still holds true?

    20
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)UM
    umami_wasabi @lemmy.ml

    pending anonymous user

    Posts 25
    Comments 270