Avatar
Dr. Hax
d30ea98ea65e953f91ab93f6b30ea51eb33c506f87d49f600a139aef00aa9511
Cypherpunk. Infosec veteran of about 15 years (vulnerability research, exploit development and cryptography). Cypherpunks write code. :-) Signet maintainer. Self-custody your passwords... in hardware! https://hax0rbana.org/signet Want to see wider adoption so Bitcoin can be used as digital cash and not just an investment vehicle. XMR: 44RDkTFmTeSetwAprJXnfpRBNEJWKvA5dBH5ZVXA4DofgoZ9AgjyZdSa2fo7pMD3Qe3pdKga8X22y3Lyn1xYde5kPQPzVUu

This is true. It's how you are still able to call emergency services even if you don't have a SIM or pay for cellular telephone servicd

The baseband does not have access to the microphone. It's just the chip that handles connecion to the cell network, similar to how the wifi handles connecgions to access points.

However, the baseband can see any traffic that is unencrypted, just like the telco can. This means if you're talking over a plain old telephone service (POTS) line, the baseband can hear what is being said. However, a call to the same person over Jitsi, Matrix or a similar service would be encrypted and the contents would not be accessible to the baseband.

Your solution of using a hotspot has the advantage of separating out your telephone service from your internet connection. This means the phone number you give out to people could be a VoIP line that is not associated with your cellular service provider.

A freezer would be unlikely to work. https://yewtu.be/watch?v=PlB4LGLtRQM

But wrappen in aluminum foil, in a galvanized trash can with foil tape holding the lid on... now you're talkin'!

I was also surprised. At first we thought I had just overfilled it by a lot. It was a few weks later when it was time to refill that we found the hole.

Thanks for the explanation and the suggested science experiment. 🤓

Just got home and checked: Palmolive original.

I think it was aluminum. I can at least say it was non-ferris.

Dish soap was just grocery store dish soap, like ajax.

It made quite the mess

#Signal #Privacy

Here's something I learned recently: ordinary dish soap will eat through metal within a few years

We were using this for the in-sink kitchen soap dispenser until... the incident

#RIP #SkyDogCon, and your little water bottle too

You completely missed the point.

This isn't a comparison between whish OS is hypothetically more secure, it's a concrete example of a 15 year campaign that lists specific tactics and techniques, allowing people to better understand actual capabilities of this attacker.

FWIW, the article mentions a Mac being compromised by this same payload, along with a small number OpenBSD & FreeBSD.

Do you have SSH enabled on the machine that runs your bitcoin node? Know the risks.

https://arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/

This malware:

- Profited off of compromised bitcoin nodes

- Also stole credit card numbers

- Was able to bypass egress firewalls

- Exploited weak passwords (among other things)

When tech companies tell you they are listening all the time... believe them!

https://open.spotify.com/episode/5gdoHM1v4hyXOWKHWPSTFF

Wash 'em, remove the stem, and slice them into even slices (1/8" to 1/4", but whatever you do, make sure you are consistent).

Put them in the dehydrator at 57°C for about 14 hours. Take them out and let them cool before putting them in jars.

We have some native strawberries germinating in the fridge now, but I don't think they're going to make it. Getting moldy. The paper towel must have been too moist.

It's been a while since I posted about food preservation. Fortunately there was a sale on strawberries a couple days ago.

That was about 2 lbs of strawberries ($3.29/lb, on sale for $1/lb) and a fair amount of labor in washing, coring, slicing and dehydrating them.

I expect these would last for months or years if they weren't so delicious. They taste every bit as good as they look.

I took a short break from #accessibility work to make some changes to a new case design that I've been working on for the next #hardware revision. It's going to be a ways out before I get it done, but it'll be hot.

#a11y #3dprinting #signet

"This is counter-culture from the underground

Eternal revolution this is our sound

KMFDM better than the best

Megalomaniacal and harder than the rest"

--KMFDM, Megalomaniac

I've made a little progress with my accessibilty/compatibility woes. I found the method that is called when a password entry is selected. I can also access the model which is associated with the selected view. Now I have debug prints that show me what's being selected and I just need to tell the screen reader to read the name of that entry...

It feels like I'm closer now than ever

I see that people have gone from:

1. using free speech to complain on the internet, to

2. using free speech to protest in person, to

3. direct action

Examples:

#PalestineAction

https://kolektiva.social/@GeriatricGardener/112405829186037474

#JustStopOil

https://mastodon.online/@Andy_European/112417546215607094

#CivilDisobedience

https://climatejustice.social/@BenjaminBuse/112426729239396879

The actions I'm seeing people post about are not violent. They are not harming people or even threatening to harm people. They're defacing and destroying property. The damage doesn't even seem to be very great (a broken fence, a painted roof, etc.) but it sure does indicate how much people are just not willing to take it anymore.