This is a secondary account. My main account is listed below. The main will have a list of all the accounts that I use.

henfredemars@lemmy.world

Personal website:

https://henfred.me/

  • 0 Posts
  • 36 Comments
Joined 1 year ago
cake
Cake day: July 4th, 2023

help-circle

  • I’m somewhat confused what you’re asking here. The two technologies that you mentioned do not provide the ability to share a PCIe device to my knowledge which is what I understand you wish to do. The first allows network cards to directly access host memory and perform data transfers without consulting the CPU while the other allows for the sharing of a PCIe root or bus, not allowing multiple systems to access the same hardware device at the same time.

    I’ve heard of proprietary solutions, which makes sense because if you want to virtualize multiple instances of one physical hardware device I don’t see how you can do that efficiently without really intimate knowledge of device internals. You have to have separate state for these things, and I think that would be really challenging to do for an open source project.

    Anyway, just thought I would open up the discussion because I didn’t see any other comments. I hope to learn something.


  • No. There is no room for anti-malware services in the Android design.

    Such software needs permissions that reach outside of the Android security model to do things like access other application data without its consent.

    Imagine for a moment that you could install anti malware with some kind of super user permission that lets the software access everything it needs to do its job. If so, malware would immediately attempt to use that feature as well, either to steal more of your data or inject itself into other applications.

    Play Services is special because it operates with much higher privileges than third party software can obtain.

    Now, in theory you can still scan applications before they are installed, but I would argue that there’s very limited value in doing so. If you’re installing software from sources you don’t trust, you have bigger problems. You can’t rely on a signature matching engine to detect malware in the general case.



  • Mixed feelings about this article. In short, it presents a new way of fingerprinting devices.

    While it’s an interesting fingerprinting strategy, this is just one of many ways that a device can be fingerprinted. Do your best to avoid installing applications you don’t trust to protect your privacy.

    Also, the recommendations of the article don’t make much sense. Anti malware on Android? Ridiculous and ineffective.





  • I went to ask nicely for help from their support department and got a development build for one of their routers. Not only was it an ancient version of OpenWRT with the myriad of unpatched vulnerabilities, but it had absolutely dumb/weird configurations like the Wi-Fi password being a user account password exposed to a patched up SSH daemon with shell /bin/false. Just a whole lot of why and an obvious lack of care put into the software.

    Their devices function… Most of the time. That’s about all that’s redeeming.


  • Please excuse me for not providing a real answer in a top level reply, however, I think your request is fundamentally flawed.

    Any proxy or proxy service can examine your egress data. Necessarily, they will be able to see your connections even if perhaps they can’t decrypt all their content. Many would consider this a privacy violation already, making your request technically unsatisfiable.

    However, I’m curious to see if in some sense of the word privacy others feel there are proxy services available that can provide it.



  • henfredemars@infosec.pubtoPrivacy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    23
    ·
    edit-2
    10 months ago

    I prefer the complete lack of privacy settings because it is open and honest about the reality of what Lemmy is able to provide.

    Even if you’re running your own instance, you are necessarily submitting your data to another party. I don’t have to trust the platform as much when my data isn’t private. It’s much easier to engineer a system around that assumption.

    If we suppose that anything I submit to Lemmy is submitted to the public, I can’t be misled. My data cannot be leaked because I’m presenting it to the world already. Lemmy is a young social project with many problems to solve, still trying to gain traction and hold on to users and with an uncertain future. In brief: bigger fish to fry.

    Maybe privacy controls could be on the list, but I don’t think it addresses the main problems or applications of the platform and creates its own set of issues. Keep it simple and stupid.




  • It was a solution to a Lutris bug. Basically, flatpak containers can use these things called portals to gain access to specific files and directories via a file chooser rather than broad access or manually assigned access.

    In this case, my wine installation was crashing because some part of it was trying to obtain a lock on a directory object, which is an unsupported feature when accessing a directory through a portal. The error message is something completely unrelated like can’t draw window with a string of hex values. It took me a few hours to track down the real root cause.

    Oh well. Works on my machine. Also, there’s a fix on the development branch now. I made a write-up, posted it, and it’s all gone. I should have known better honestly. It works great for some people but anybody can arbitrarily receive unfair treatment with no recourse at any time. I’m satisfied knowing that eventually the fix will get out to everybody eventually. It’s just a shame I couldn’t leave a signpost behind.






  • I still have drawings I made in MS Paint on Windows 95 when it had just come out, my first text document, and the first report I ever typed in grade school.

    Btrfs snapshots of the root volume in RAID1 configuration with 8 hourly, 7 daily, 3 weekly, and automated rsync backups to NAS, with primary and secondary offsite, physically disconnected backups stored in sealed, airtight, and waterproof containers at two different banks prepaid storage and with advanced directive in the event of my demise.

    Bit of a hobby really. I acknowledge it’s completely unnecessary. I don’t like to lose data.