Skip Navigation
Drinking 3 cups of coffee linked to preventing multiple diseases
  • Much like the way we were told for ages that a glass of wine every day was good for our health. I think the latest research is showing no evidence of that, but rather that any amount of alcohol raises the risk of cancer.

  • Do you fill in real name + info when registering for a domain?
  • If you care about keeping your domain enough that you don't want there to be an excuse for someone to take it from you, then you use your real info, and choose a registrar that only exposes a proxy contact in your WHOIS entry.

    If you don't care about losing your domain, then you can use fake contact info.

  • .dev It's time to return to the roots, to the C programming language.
  • Even the Linux kernel / Linux Torvalds are moving towards Rust.

    No, they aren't. They are experimenting with it in certain new device drivers. No move is planned, and it's too early to tell whether there will ever be one.

  • Critical Unauthenticated RCE Flaws in CUPS Printing Systems
  • That refers to the fact that printer advertisements can contain lies: When you see a familiar printer name appear on a network, it could always be an impostor secretly pointing to the address of a malicious device.

    So my first advice stands: Avoid interaction with untrusted or potentially compromised print servers.

    To be clear, when I say "interaction", I don't just mean printing to them. I mean any interaction at all. Even just browsing a network for printers could potentially mean your system contacts the devices at the advertised addresses, and receives data from them. This Qualys report doesn't make clear whether this kind of interaction is safe, so I have to assume for now that it is not.

  • Critical Unauthenticated RCE Flaws in CUPS Printing Systems
  • Either of these commands will reveal processes listening on the port that's vulnerable by default:

    $ sudo lsof -i :631
    
    $ sudo fuser -v 631/tcp 631/udp
    

    The wording of this post gives me the impression that it could exploited even if you don't have any such processes, if your system contacts a malicious or compromised print server. I would avoid browsing or using printers on unsafe networks until this is patched.

    The port 631 process just makes it worse, by allowing someone else to initiate that contact remotely.

  • Critical Unauthenticated RCE Flaws in CUPS Printing Systems
  • Based on this...

    Exploitation involves sending a malicious UDP packet to port 631 on the target, directing it to an attacker-controlled IPP server. The system’s cups-browsed service then connects back, fetching printer attributes, which include malicious PPD directives. When a print job starts, these directives execute, allowing the attacker’s code to run on the target system.

    ...it seems the exploit can be triggered either remotely through your CUPS instance listening on port 631, or locally by interacting with a malicious/compromised print server.

    So if I understand correctly, shutting down that port wouldn't be enough by itself. You would also have to keep your system from initiating contact with such a server, such as by using a public printer, or conceivably even just browsing printers at a cafe/business/school. I haven't read the exploit details, so I don't know which interactions are safe, if any.

  • Critical Unauthenticated RCE Flaws in CUPS Printing Systems
  • Exploitation involves sending a malicious UDP packet to port 631 on the target, directing it to an attacker-controlled IPP server.

    Okay, so at least until this is patched, it would be a good idea to shut down any CUPS-related process that's listening on port 631, and avoid interaction with untrusted or potentially compromised print servers.

    Either of these commands will list such processes:

    $ sudo lsof -i :631
    
    $ sudo fuser -v 631/tcp 631/udp
    

    I don't want to diminish the urgency of this vulnerability, but it is worth noting that "affecting all GNU/Linux systems" does not mean that every affected system is actually running the vulnerable code. Some installations don't run print services and don't ever communicate with printers.

    Also, I suspect that the author's use of "GNU" in that warning is misleading, potentially giving a false sense of security. (Sadly, a certain unfortunate meme has led many people to think that all Linux systems are GNU systems, and the author appears to be among them.) I don't see any reason to think musl builds of CUPS are immune, for example, so I don't assume my Alpine systems are safe just because they are not GNU/Linux.

  • Steam does the opposite of forcing Arbitration on its users
  • I have heard that you don't need a lawyer in small claims court (in the sense that it's not really expected). Like I said, though, I know little about it. Maybe someone in a position to know will show up in this thread and fill us all in.

  • Few lesser known tricks, quirks and features of C
  • Whenever I see posts like this, I wonder if they cover manual loop unrolling, which these days is usually an optimization left to the compiler.

    Control+F, Duff's Device

    Yep, this post mentions it. Good for them. :)

  • Your smart TV (probably) sends screenshots to advertisers
  • It's worth keeping in mind that your network is not the only network in the world, and WiFi is not the only kind of link.

    Neighbors exist. Open guest networks exist. Drive-by and fly-by networks exist. Mesh networks exist (and are already created by devices like Amazon Echo for use by other devices in the neighborhood). Special-purpose networks quietly created by internet providers using their CPE exist. Satellite links exist, and have been getting smaller and cheaper; maybe enough for a TV before long. Power line networking exists, and can reach across property lines. Bluetooth, LoRa, cellular, etc. etc. etc.

    I'm not suggesting that all smart TVs make use of these things today, but some of them are already capable, and since the capabilities are increasingly cheap and easy to implement, they will almost certainly become more common in the years to come. Let's also remember that behavior that is not documented or enabled at purchase time can be enabled later, and sometimes is.

    If I were buying today, it wouldn't be a smart TV. I would instead look at gaming console monitors, computer monitors, projectors, dumb TVs, and commercial displays. That way I wouldn't be showing manufacturers that spyware appliances are okay with me, nor giving them money in support of spyware product lines.

    If I already had a smart TV and wasn't in a position to replace it with something trustworthy, I would mod it: Open it up, find any network-capable components inside, and physically disconnect them. (Or if I didn't have those skills, I would get a qualified friend or electronics repair shop to do it for me.)

  • Smart TVs take snapshots of what you watch multiple times per second
  • Not putting your WiFi password in would absolutely be reliable.

    No, it would not.

    I’d love to hear your ideas on how they’d remotely break into your WiFi Network

    They wouldn't, of course, nor did I say they would.

    (But since you brought it up, we have already seen internet providers quietly using their CPE to create special-purpose wireless networks surrounding customers' homes. These could obviously be made available to any company that paid the ISP for access, just as cellular networks have been made available to companies like OnStar. So a TV could do this with a business deal rather than breaking in to your normal WiFi.)

    However, your network is not the only network in the world, and WiFi is not the only kind of link. Neighbors exist. Open guest networks exist. Drive-by and fly-by networks exist. Mesh networks exist (and are already created by devices like Amazon Echo). Power line networking exists. Bluetooth, LoRa, cellular, etc. etc. etc. Maybe you live on an isolated mountain top where these things are unlikely to reach you (at least until satellite links become a little smaller and cheaper) but even that is not absolute, and most of us don't.

    Unless you disassemble your TV and examine all the components within, and know what they do, it could have any number of these capabilities.

    Also, partly due to how prevalent multi-network support is becoming in electronics integration, it is not unusual for related functionality to be dormant at first yet possible to activate later.

    I'd love for you not to be adversarial, and to learn more about a topic before making bold claims about it in absolute terms.

  • Smart TVs take snapshots of what you watch multiple times per second
  • Friendly reminder that gaming console monitors, computer monitors, projectors, dumb TVs, and commercial displays exist.

    Yes, I could hack a smart TV to disable its networking capabilities. (Merely withholding my wifi password is not reliable.) But that would still be showing the manufacturers that I find spyware TVs acceptable, and supporting the production of those models.

    Also, this would be a good time to pressure our legislators into criminalizing this nonsense.

  • Which do you like better: Windows or Ubuntu?
  • It's disappointing to see that a couple dozen people decided to hit your post with drive-by downvotes, rather than using their words to express themselves in a way that actually contributes to this community.

    Your question is a legitimate one, and relevant at a time when Windows is increasingly bloated and invasive, spyware is out of control, and Linux is increasingly a viable alternative even in certain tough areas like games. I just wish you had elaborated on why you singled out Ubuntu when several other widely-supported Linux distributions exist.

    If those were my only two options, I would pick Ubuntu over Windows, no contest. I would replace its default desktop with KDE Plasma (or just choose the Kubuntu variant in the first place), rip out as much of Snap as I could, update the kernel, and plan to migrate to a distro that I like better whenever I was able.

    For what it's worth, Debian Stable with a few hand-picked backports and flatpacks suits me well, mainly for gaming and software development. (I'm a bit of an outlier among Linux users who post on social media, though: Having my system be low-maintenance is more important to me than always having the latest features in every app, and I've been known to make my own debian packages and flatpaks when something I want isn't ready-made.)

    Linux Mint, Pop_OS, and Arch Linux are also popular. There are quite a few more.

  • Chinese hackers infiltrate U.S. internet providers in cyber espionage campaign
  • threat actors backed by Beijing broke into a “handful” of U.S. internet service providers

    Which ISPs?

    Also, it would Be(e) better to link the original article (archived here), rather than this secondary reporting based on it.

  • Covid on the rise as experts say England has ‘capitulated’ to the virus
  • Our capitulation to the virus is a combination of a population where most are now many months or years from their last vaccine dose, and that vaccine dose was in any case poorly cross-protective for the very distinct current variants.

    I think most people don't realize just how important that first part is. Many seem to believe a dose will keep them safe (and no longer dangerous to others) for at least a year, but that's a mistake. Even our best Covid vaccines don't protect for years or decades like the vaccines we're accustomed to from childhood.

    Immunity from these new shots wanes rapidly, reaching less than 20% effectiveness after just 6 months.

  • Sid Meier's Pirates, and everyone else in the game, are aware of the date...

    I recently started a game of Pirates! When I sat down to play today, the pirates were no longer the only ones spicing up their speech with arrs and ahoys. The merchants were doing it. The military were doing it. The nobles were doing it (awkwardly). The barmaids were doing it. Even the user interface was doing it.

    I thought at first that it might have always been that way, and just escaped my notice, but that seemed unlikely. Next I thought I might have accidentally enabled a game option for it, but I didn't remember reconfiguring anything.

    Then another possibility came to mind. It seemed like a long shot, but just in case, I looked up today's date. Sure enough, today is International Talk Like a Pirate day. This 20-year-old game apparently knows it, and switched every bit of its dialogue and writing into pirate speak to honour the occasion.

    I love this.

    24
    LinkedIn Is Training AI on User Data Before Updating Its Terms of Service
    www.404media.co LinkedIn Is Training AI on User Data Before Updating Its Terms of Service

    Multiple LinkedIn users on Wednesday noticed a setting that showed LinkedIn was using user data to improve its generative AI. LinkedIn told 404 Media it will update its terms of service “shortly.”

    LinkedIn Is Training AI on User Data Before Updating Its Terms of Service
    4
    Fake retro video game ring worth €50m smashed in Italy
    www.bbc.com Fake retro video game ring worth €50m smashed in Italy

    More than 47 million pirated copies of games including and Mario Bros. and Street Fighter II were seized in raids across Italy.

    Fake retro video game ring worth €50m smashed in Italy
    14
    The Shadow Dollar That’s Fueling the Financial Underworld

    Archived: https://archive.today/UnNtK

    > A giant unregulated currency is undermining America’s fight against arms dealers, sanctions busters and scammers. Almost as much money flowed through its network last year as through Visa cards. And it has recently minted more profit than BlackRock, with a tiny fraction of the workforce. > > Its name: Tether. The cryptocurrency has grown into an important cog in the global financial system, with as much as $190 billion changing hands daily.

    7
    A robot begins removal of melted fuel from the Fukushima nuclear plant. It could take a century
    apnews.com A robot begins removal of melted fuel from the Fukushima nuclear plant. It could take a century

    A small robot entered a damaged reactor at Japan’s Fukushima nuclear power plant on Tuesday, beginning a two-week, high-stakes mission to retrieve for the first time a tiny amount of melted fuel debris from the bottom.

    A robot begins removal of melted fuel from the Fukushima nuclear plant. It could take a century
    32
    The NSA Has a Podcast—Here's How to Decode It
    www.wired.com The NSA Has a Podcast—Here's How to Decode It

    The spy agency that dared not speak its name is now the Joe Rogan of the SIGINT set. And the pod's actually worth a listen.

    The NSA Has a Podcast—Here's How to Decode It

    It's nice to see they have transcripts, too.

    Direct link to the NSA site: https://www.nsa.gov/Podcast/

    Article archive: https://archive.today/CcH52

    8
    Patch #7 Now Live! Version Number 4.1.1.5849914
    forums.larian.com Patch #7 Now Live! Version Number 4.1.1.5849914

    Hey gang, Are you ready to embrace evil? Do you yearn to see the consequences of unleashing your inner jerk? Great! Because Patch 7 releases on PC, today! And with it come new evil ending cinematics, along with Honour Mode improvements and new Legendary Actions, split screen improvement...

    4
    Spiders Are Somehow Hacking Fireflies To Lure More Victims
    hackaday.com Spiders Are Somehow Hacking Fireflies To Lure More Victims

    What happens when an unfortunate bug ends up in a spider’s web? It gets bitten and wrapped in silk, and becomes a meal. But if the web belongs to an orb-weaver and the bug is a male firefly, …

    Spiders Are Somehow Hacking Fireflies To Lure More Victims
    4
    SDF outgoing federation seems to be stuck

    Neither of my posts from yesterday and today have made it out to their communities' home instance (lemmy.world), and neither has received any comments or votes. It seems like something to do with outgoing federation is stuck.

    Edit to clarify:

    The problem I'm seeing affects posts. I don't know if it affects comments.

    It's possible that it only affects lemmy.world communities, but it definitely affects them even on other instances. Neither of these posts are showing up on any remote instance that I've seen:

    https://lemmy.sdf.org/post/21620419

    https://lemmy.sdf.org/post/21673588

    6 days later, it's happening again:

    https://lemmy.sdf.org/post/21974478

    32
    YSK rice commonly contains arsenic, but most of it can be removed by boiling in water (4:1 ratio) for 5 minutes, and discarding that water before starting the regular cook cycle.

    Why you should know:

    Arsenic is a carcinogen and has various other negative health effects; enough to warrant exposure limits in various jurisdictions. A five minute boil-and-discard step before cooking is a simple way to reduce your exposure, especially if you eat a lot of rice.

    Details are in the study, linked in the title of this post. Here's a diagram from the abstract:

    !

    41
    Cemu 2.1 Release
    github.com Release Cemu 2.1 · cemu-project/Cemu

    This is the major release of Cemu 2.1 with a cumulative changelog which includes the changes from all 93 experimental releases since Cemu 2.0. For users that were already using our experimental upd...

    Release Cemu 2.1 · cemu-project/Cemu

    I'm not sure the Wii U is widely considered retro yet, but it has been discontinued for 7+ years, so I'm taking a chance that some folks here might care about the emulator.

    5
    [GOG] Tropico 4
    www.gog.com Tropico 4

    The world is changing and Tropico is moving with the times - geographical powers rise and

    Tropico 4

    67 hours left to claim it:

    https://www.gog.com/en/#giveaway

    2
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)MO
    mox @lemmy.sdf.org
    Posts 148
    Comments 984