Skip Navigation

User banner
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)H
Posts
0
Comments
27
Joined
3 mo. ago

  • I don’t believe Debian is susceptible to worms — it wasn’t even susceptible to last year’s xz attack — and if you have a network firewall with port forwarding disabled, there is no way in unless your router’s firmware is compromised. If you’re running any community driven software like, for example, game plugins for servers you’re hosting, those could be suspect. Anything not FOSS is also a suspect. Otherwise, if you’ve already done a secure wipe (using dd, hdparm/nvme, or your UEFI) and used another motherboard then it probably isn’t your firmware that is compromised. You mentioned SSH and credential reuse, so this leads me to think a device on your network, like an IoT device (thermometer, baby monitor, home assistant, Roku, etc.) could be infected with malware. You really can’t trust these things to have any security whatsoever and they need to be placed on a segmented or guest network. This attack honestly seems very immature, something a script kiddie would do, or perhaps it is automated. On that note, automation loves vulnerabilities, so if you forgot to change the default credential on your router for example, I would fix that. Make sure everything is on the latest version and patch everything. I would also start suspecting neighbors and juvenile kids around high school age. If nothing else works then I would do a full Mr. Robot wipe down ;)

  • Halloween!

  • ODT is better than whatever abomination Microsoft calls a document format.

  • That executive order was only for their free speech. Not yours.

  • I haven’t even graduated yet and I’m already in a weird IT stint.

  • Agreed, if there was concern about the data falling into the wrong hands then there’s many different ways to secure the data (encryption w/ a secure enclave, masking, hardening) besides just deleting it. Tesla’s strategy here totally foregoes any typical data retention lifecycle like you mention, which is usually to delete old data that has little to no benefit besides just adding additional risk (e.g. trips older than 1 year or if there’s no space left). Plus you have to take into account the additional consequences you take on by deleting the data locally such as not being in compliance with regulations, and potentially risking sanctions or heavy fines.

  • sigh

    Jump
  • real question what is that? I mean kinda looks the same as the dnc but I’m assuming it’s for republicans since we’re on lemmy

  • wow yeah this article is a load of bullshit. A steaming pile of journalism. Actually a bit of an insult.

  • Taco!🌮

  • ALERT ALERT ALERT

    Sorry dude I forgot to add your bio signature to my WiFi router.

  • $20 👍

  • Deleted

    Permanently Deleted

    Jump
  • This is probably the #1 reason I started using qbit and now use it in my homelab’s docker container.

  • Ayyy

  • 1337x.to was blocked for me today! Even though it doesn’t stream content. Feels like an “enshittification pincer” is happening right now.

  • Did the same with Biden. I’m tired, boss.

  • That one guy eating rapeseed oil:

  • I like flatpaks, kinda. If something is in the standard repo, I install it. If it’s a library or CLI tool, I add the repository. If it has simple build instructions, I build it. If all of those things are too complicated or they want me to run a script, I just install the flatpak.