drspod

joined 2 years ago
[–] [email protected] 3 points 6 days ago

It's not reading the contents of RAM via EM emanations, it's using the EM emanations caused by certain memory access patterns as a side channel to exfiltrate data. Of course, that data could be anything, including whatever is in RAM, but the point is that you need to be running the code that generates the necessary memory access patterns to transmit the bits of data. This is not like TEMPEST where you can reconstruct a video display just using the emanations.

[–] [email protected] 74 points 1 week ago (3 children)

She's a great chess player but she's never been a World Champion. There's no need to embelish her story. She's currently training to become a surgeon at University of Missouri School of Medicine.

[–] [email protected] 23 points 1 week ago

If it was plausible this would be bigger news. There's a claim like this every couple of months and none have held up to scrutiny so far.

 

Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.

The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

 
[–] [email protected] 34 points 3 weeks ago (1 children)

wait, let me get my cowculator

[–] [email protected] 1 points 4 weeks ago

Is it really a virtual machine? It's running from a container, so it's just a containerized desktop exposed over VNC, right?

Is it actually running its own kernel?

[–] [email protected] 1 points 1 month ago* (last edited 1 month ago)

As soon as Linus starts talking about something that you actually know about, you realise that he is bullshitting you, and it immediately calls into question everything that you've heard him say about subjects that you're not an expert in.

I had this realization about LTT years ago, but it's a known phenomenon in journalism (the Gell-Mann amnesia effect) and seems to be even more common in YouTube journalism since the barrier to entry of publishing video is so much lower than publishing in print.

[–] [email protected] 2 points 1 month ago (3 children)

FTFR:

What happened

The code that was previously here has been taken down at AMD's request. The code was released with AMD's approval through an email. AMD's legal department now says it's not legally binding, hence the rollback. Before anyone asks: I have received no legal threats or any communication from NVIDIA.

What now

At this point, one more hostile corporation does not make much difference. I plan to rebuild ZLUDA starting from the pre-AMD codebase. Funding for the project is coming along and I hope to be able to share the details in the coming weeks. It will have a different scope and certain features will not come back.

[–] [email protected] 23 points 1 month ago (11 children)

if I share some rice I made

FYI: rice is derived from a racist pejorative term. A lot of people in the desktop theming community have stopped using it.

[–] [email protected] 7 points 1 month ago (1 children)

Explain to me how what you just said is any different from a homophobic person who says "I don't have anything against gay people I just wish they wouldn't rub it in my face" and when seeing a gay couple kissing they say "eww that's gross why do you have to do that in public"?

When someone says that, it's homophobic. What you just said is also phobic. You don't get to dictate how other people express their sexuality just because it doesn't align with your own sexuality. You have to learn to live in a world with other people who are not like you.

Do better.

 

Most people know at this point that when searching for a popular software package to download, you should be very careful to avoid clicking on any of the search ads that appear, as this has become an extremely common vector for distributing malware to unsuspecting users.

If you thought that you could identify these malicious ads by checking the URL below the ad to see if it directs to the legitimate site, think again! Malware advertisers have found a way to use Google's Ad platform to fake the URL shown with the ad to make it appear like a legitimate ad for the product when in fact, clicking the ad will redirect to an attacker controlled site serving malware.

Don't click on search ads or, even better, use an ad-blocker so that you never see them in the first place!

 

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

view more: next ›