Reddeet

51 readers
0 users here now

Welcome !

This instance is open to ideas as to where it should go. Contact the admin at admin@reddeet.com if you have any suggestions/issues.

Like the old Reddit style ?

Cool links !

Technical

This instance is hosted on an ARM based server (Hetzner CAX Server) :

Analytics

You can check out the data we collect when you visit this instance right there : analytics.kawa.zip/reddeet.com

None of this data is sold to anyone, it is used for educational purposes only.

founded 2 years ago
ADMINS
1
2
 
 

The investment will be used to strengthen the structural reliability and security of KDE's core infrastructure, including Plasma, KDE Linux, and the frameworks underlying its communication services.

3
4
 
 

https://old.reddit.com/r/cemu/comments/1tbbusq/security_psa_linux_malware_from_cemu_official/

Windows, MacOSX and the Flatpak are unaffected.

The compromised releases are:

Cemu-2.6-x86_64.AppImage

cemu-2.6-ubuntu-22.04-x64.zip

SAFE SHA256 checksum:

Cemu-2.6x86_64.AppImage 0c20c4aeb800bb13d9bab9474ef45a6f8fcde6402cad9b32ac2a1bbd03186313

cemu-2.6-ubuntu-22.04-x64.zip5e4592d0dae394fa0614cb8c875eff3f81b23170b349511de318d9caf7215e1b

Infected SHA256 / Checksums:

sha256: f140e76236b96adf7cdc796227af9808665143bc674debb77729fa3e4b8327cc

sha256: d07a29c4458d00e42d5d9e6345932592e91644d6b821bacdb7a543c628e0b41a

KDE: (Right-click your CemuApp Image -> Properties -> Checksum -> SHA256 button).

If you've run either (f140e or d07a29) to play some games or configure you may want to consider reinstalling your system if you've got any sensitive information, passwords or any of that in use. You're most likely safe if you didn't run the infected releases, but if you've updated and run Cemu recently, you're going to want to make sure you're in the clear, because if you're not then a reinstall may not be the worst idea.

From preliminary analysis it seems that mostly it is trying to spread itself rather than cause direct >damage, it does that by stealing SSH keys, github tokens and a lot of other passwords or keys that >they can then use to infect more packages or software releases.

This is likely also how we got affected. The other Cemu author (MangleSpec/Petergov) ran software >in WSL which was compromised through which they got hold of his github token. At least that is our >leading theory.

HOWEVER if your region is Israel (it detects this via keyboard layout and timezone settings), then it >will have a random chance to wipe your filesystem (subprocess.run(["rm", "-rf", "/*"])) every time you >start the compromised software.

So my immediate advice is this:

Delete the compromised Cemu files (Cemu-2.6-x86_64.AppImage and cemu-2.6-ubuntu-22.04-x64.zip). Note: You are not affected if you downloaded before 6th May. Reset all your passwords, ssh keys and service tokens Block IP 83.142.209.194 just in case. This is hardcoded and used as a remote endpoint

Source: ExZap - https://github.com/cemu-project/Cemu/issues/1911

5
6
7
 
 

A man is going away on charges that he distributed drugs "shaped like cartoon characters."

8
 
 

Today's game is Ghost of Tsushima. I climbed the mountain in the northern province while looking for a quest, and i have to say. This is a beautiful sight, and it really puts game worlds into scale. It's really fucking cool in a way. I like how i can see the past area too my left, and on the horizon i can see a fuck ton of other things, such as what i think is some burned down woods.

Also something i noticed was that you can see Japan, just on the horizon. Either that or it's South Korea, i'm pretty sure it's Japan though due to the location. This also got me on a rabbit hole of just looking at the Island's Geography and Terrain Map

Of course, the game isn't just Horizons. On the way to the quest i found this lovely sight at a river. I love the way the sun plays with the water and creates this leading line. It drew my eyes out to sea, which i'm sure everyone can tell by now i'm rather fond of.

Finally, that brings me to the actual mission i've been building up towards. I liked this one, i felt like it was a lot more open ended than other missions tend to be. I really liked how it gave me the choice of going stealth or charging the bridge. In a way it's a good representation of the moral dilemma Jin faces. He could stick to tradition and charge the bridge, which i feel most players wouldn't pick due to the challenge, or he could sneak around and hijack the Hwacha which would be far easier. Or at least that's how i saw it. It's an interesting gameplay choice interpretations aside. It's weird to think i'm nearing the end. I still have the DLC, but man, it went by fast.

9
 
 

Hey everyone,

We just released new features this week and wanted to share what's in them.

Quick Recap: Dograh is an open-source voice AI agent platform - a visual workflow builder like n8n, but for voice. You design conversational flows by dragging and dropping, connect your own LLM, TTS, and STT providers, and deploy agents that handle real phone calls. Inbound, outbound, call transfer to humans, voicemail detection, knowledge base, variable extraction, web widget, tool calls to CRM, n8n, WhatsApp, SMS, email, Calendly - anything with an API.

What's new in 1.27.0:

MCP capabilities to create new workflows using natural language instructions ⁠

Multi tenancy for telephony support - wherein you can create multiple telephony configurations for various providers (Plivo, Telnyx, Vobiz, Vonage, Cloudonix, Twilio)

Made it easier to set up telephony with deeper API integration with telephony providers

Github: https://github.com/dograh-hq/dograh

Let me know if you have any feedback after trying it A star would mean a lot

10
11
 
 

This looks interesting. Not federated or anything, but the general ethos seems in line with the Fediverse.

12
13
14
15
16
17
 
 

A case study in why credentials are revoked before firings.

18
19
 
 
20
 
 
21
 
 

cross-posted from: https://sopuli.xyz/post/45586653

From the Emudeck discord:

@everyone Hey everyone, apologies for the ping but since this is deemed as critical to the security of people's devices here, I will have to. Cemu (The Wii U emulator) was recently compromised by a malicious attacker using a known developers account, this compromise took place from May 6th to May 12th, and introduces malware that is known to steal passwords, SSH keys, GitHub tokens, and likely more they are not fully aware of at this moment. We recommend anybody who is on Linux or SteamOS to go into the EmuDeck app, Manage Emulators tab, Cemu, and click Reinstall/Update, and make sure the hash of the AppImage (Located in Home/Applications, right click Cemu AppImage, go into Properties, Checksums, and Calculate the SHA256 hash) matches the non-compromised version provided by the Cemu developers, if you have used Cemu from the dates I have mentioned, and the SHA256 hash does not match what is listed, assume your system may be compromised if it was ran. If you are on Windows, MacOS, or used the Flatpak version, you are not affected by this malware. More information regarding this attack can be found here. https://rentry.org/cemu-security-psa

The specifically affected packages were:

Cemu-2.6-x86_64.AppImage

cemu-2.6-ubuntu-22.04-x64.zip

22
 
 

Crossposted from https://fedia.io/m/technology@lemmy.world/t/3871099

TLDR: Tesla will have as many robotaxis as Waymo in the year 2111, if the current growth rate holds (and if Waymo doesn't add a single additional vehicle). So... I'm guessing the Tesla stock price will skyrocket.

23
24
25
 
 

TLDR: Tesla will have as many robotaxis as Waymo in the year 2111, if the current growth rate holds (and if Waymo doesn't add a single additional vehicle). So... I'm guessing the Tesla stock price will skyrocket.

view more: next ›