Avatar
Cyph3rp9nk
fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e
Non nobis, Domine, non nobis, sed nomini tuo da gloriam.

Recommendation:

Use services like SimpleLogin or the hide mail function of iOS, never link your personal mail with cryptocurrency services.

nostr:note12w5s28xw43ss66vn92ezs7xvfmt88m4u3j2w9z0t7uflmf5xfzgqjjeus7

Kernel

I have always been fascinated by the architecture of operating systems and within these in particular microkernels.

While there are few operating systems that operate an authentic microkernel architecture and even fewer in production, the only success story is QNX, which is also a real-time operating system.

For those who don't know it, QNX is used in the automotive world, trains, airplanes, robots and also in medical devices.

On the other hand, we have HURD, the most ambitious project ever created of an operating system with microkernel architecture, although the complexity is not the microkernel itself, as it should be kept very simple, but everything that runs on the microkernel. It is as ambitious or more than Star Citizen, so after more than 30 years of development I don't know if it will ever see the light of day.

The advantages of a well implemented microkernel are in QNX itself, very robust, secure and error handling systems, if I had to go to the moon my instruments would use QNX not Windows or Linux.

Every system is hackable because whoever hacked it had more time to think about how to hack it than whoever designed it to avoid being hacked.

It is an asymmetric relationship.

I don't need any digital identification and even less to receive government subsidies because in fact I have never received any help because I am a man, a man who makes a living and earns money to take care of his family.

Fuck it you fucking statists, you need me, not me you.

https://m.primal.net/HYcg.mp4

Here it is necessary to differentiate between utility and safety.

Veracrypt is military security but will be tedious for many things, cryptsetup will be better for the operating system in general.

You simply use Veracrypt volumes for the most critical things.

Jamf Threat Labs discovers new malware embedded in pirated applications

In this blog, Jamf Threat Labs researchers analyze malware they discovered in pirated macOS applications. These apps, appearing similar to ZuRu malware, download and execute multiple payloads to compromise machines in the background.

https://www.jamf.com/blog/jtl-malware-pirated-applications/

What I consider my top 10 favorite tools that every good computer scientist should handle and I would take with me to a desert island:

- Python (what do you want me to program?)

- Qubes (Privacy by default and attack proof, Tails is inferior sorry)

- LibreWolf (all other browsers are cowardly)

- Fedora Silverblue (If Linus Torvalds uses Fedora it will be for a reason, but I'm more cool and use the immutable version)

- Kali Linux (My neighbor who is hot knows what I'm talking about).

- Tor (I need it to buy quality drugs)

- Joinmarket (Mix to the fourth mix deep, freeze and pay with coinjoin, with this you are both maker and taker and there is no NSA spying on you, leave centralized coordinators who only want your money)

- Hashcat ( The power of the cat, you know)

- Nmap (I always liked having a girlfriend on every port)

- Veracrypt (your usb's will thank you, right Bill?)

Very good article that describes the possible dangers of "institutions", I recommend you to read it.

nostr:note1fc0sqwa5835alp7f0uhlx6h6uawvlkcjde08zxgpxjs8edz9ezmsyfhpdu

The results of a study on the data they collect from us are scary: 48,000 companies sent Facebook data on just one person

Attached pdf with the study

https://innovation.consumerreports.org/wp-content/uploads/2024/01/CR_Who-Shares-Your-Information-With-Facebook.pdf