charonn0

joined 2 years ago
[–] charonn0@startrek.website 3 points 1 year ago (14 children)

If it's not infringement to input copyrighted materials, then it's not infringement to take the output.

Copyright can be enforced at both ends or neither end, not one or the other.

[–] charonn0@startrek.website 66 points 1 year ago (3 children)

And their Christofascist fans don't even realize it's a sin to consult a psychic.

[–] charonn0@startrek.website 6 points 1 year ago

That's kind of the point.

Clementine originally forked from Amarok 1.4 because Amarok 2.0 changed too much.

[–] charonn0@startrek.website 2 points 1 year ago (1 children)

What does this mean for shows and movies that I purchased? Will they have ads unless I pony up? If I cancel Prime will I lose access to them?

[–] charonn0@startrek.website 16 points 1 year ago (4 children)

Because SI prefixes are always powers of the base. Base 10 is the most common, but that's more human psychology that math.

[–] charonn0@startrek.website 0 points 1 year ago

It's all part of the Prime package. I signed up because they had the new Star Trek shows.

[–] charonn0@startrek.website 5 points 1 year ago (3 children)

Looks like I'm cancelling.

[–] charonn0@startrek.website 68 points 1 year ago (3 children)

Even the researcher who reported this doesn't go as far as this headline.

"I am an admin, should I drop everything and fix this?"

Probably not.

The attack requires an active Man-in-the-Middle attacker that can intercept and modify the connection's traffic at the TCP/IP layer. Additionally, we require the negotiation of either ChaCha20-Poly1305, or any CBC cipher in combination with Encrypt-then-MAC as the connection's encryption mode.

[...]

"So how practical is the attack?"

The Terrapin attack requires an active Man-in-the-Middle attacker, that means some way for an attacker to intercept and modify the data sent from the client or server to the remote peer. This is difficult on the Internet, but can be a plausible attacker model on the local network.

https://terrapin-attack.com/

[–] charonn0@startrek.website 1 points 1 year ago* (last edited 1 year ago) (1 children)
[–] charonn0@startrek.website 13 points 1 year ago

Usually you can, though the setting might be listed under something like "show diagnostic during boot".

[–] charonn0@startrek.website 31 points 1 year ago (4 children)

As its name suggests, LogoFAIL involves logos, specifically those of the hardware seller that are displayed on the device screen early in the boot process, while the UEFI is still running. Image parsers in UEFIs from all three major IBVs are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now. By replacing the legitimate logo images with identical-looking ones that have been specially crafted to exploit these bugs, LogoFAIL makes it possible to execute malicious code at the most sensitive stage of the boot process, which is known as DXE, short for Driver Execution Environment.

So, does disabling the boot logo prevent the attack, or would it only make the attack obvious?

view more: ‹ prev next ›