NaibofTabr

@[email protected]

This profile is from a federated server and may be incomplete. View on remote instance

Judge acquits 28 people accused in Panama Papers case, including law firm co-founder ( apnews.com )

A judge has acquitted 28 people accused of money laundering in an international case known as the Panama Papers, including the co-founder of a law firm that authorities say was at the center of a conspiracy to hide money linked to illegal activities....

NaibofTabr ,

The Laundromat (2019) attempts to describe the human impact of this kind of large-scale money laundering. It's worth watching.

Shopping app Temu is “dangerous malware,” spying on your texts, U.S. lawsuit claims ( arstechnica.com )

Temu—the Chinese shopping app that has rapidly grown so popular in the US that even Amazon is reportedly trying to copy it—is "dangerous malware" that's secretly monetizing a broad swath of unauthorized user data, Arkansas Attorney General Tim Griffin alleged in a lawsuit filed Tuesday....

NaibofTabr ,

Believe it or not, I can be concerned about both.

The difference is, the place where I live has some data privacy regulations which actually get enforced, and I have some legal recourse against organizations which mishandle my data. China does not have such regulations and I do not have any recourse against organizations based there, so my risk from them is significantly higher.

NaibofTabr ,

The US government system was set up to be better than the monarchies its designers had grown up under. In this sense it has been wildly successful. But... it wasn't really designed to scale to the size it has, nor to account for the massive changes in technology that have occurred since it was written.

The leaders of the time decided to replace the first attempt only 6 years after it was ratified, and I believe they fully expected any future government to do the same if they found the current system wasn't working. They did try to make the new system more adaptable by adding the Amendment process, which was frankly genius and unprecedented in government systems prior to that.

I think it's very important to remember where and when the system we have came from, and to try to think like the people who wrote it, and to remember that at the time they had no other models for successful government beyond the writings of Enlightenment-period historians. It's very easy to criticize the current system. It's far more difficult (and substantially more important) to draft a better system.

NaibofTabr ,

Just don't walk behind them, or they might try to kick you.

This is really good advice for basically every animal with hooves. They mostly have a blind spot directly behind, like horses:

https://www.allhorsebreeds.info/horse-vision-chart.jpg

If you walk up behind them inside that blind spot and then move out to either side and suddenly appear in their vision, they'll react defensively, usually by trying to kick you with their hind legs.

Basically if you can't see the animal's eyes then assume it can't see you, and stay out of kicking range.

NaibofTabr ,

Or just reinstalls it in the next update.

NaibofTabr ,

This kind of action is more likely to make people reject the message.

You're right that this doesn't compare to the death and destruction in Gaza, but that doesn't make it productive or helpful.

NaibofTabr ,

I'll take "what is reductivism?" for $400, Alex.

NaibofTabr , (edited )

So your goal is to host a publicly accessible static website from a computer in your home. There are a few problems you need to overcome before even worrying about configuring any software. You need some more basic networking knowledge first.

  1. Basic Networking Theory - you should read a brief explanation of the OSI 7-layer network model. You don't have to try to memorize this and you won't really understand it until you start actually doing stuff, but you should read it for some basic terminology and to understand that there are distinct steps through which communication between computers happens.

    When you start running into problems ("why can't I access the server? I did all the tutorial steps"), figuring out which layer the problem is in will help guide you to the solution:

    • is there a bad cable? -> 1. Physical
    • do I have the right IP address? -> 3. Network
    • is the firewall port closed? -> 4. Transport

  1. Privacy/Security/Safety - don't host a publicly accessible website from your personal computer. Just don't. To make this happen you will have to open a hole in your network security that makes your computer accessible from the public internet. Don't do this on your daily driver computer. Don't do this with any device that has any files on it that you care about or any access to any personal information. Don't.

    Set up your web server/learning environment on a clean, dedicated system. This could be an old laptop or a Raspberry Pi (an older 3B model will work just fine for this) or whatever cheap computer hardware you have, as long as it can run Linux and has a physical network port (using WiFi will give you extra headaches for getting this working). If you think you might want to expand your projects in the future, you can get a used Dell server for very little money, and add more hard drives as needed. Wipe the hard drive and install Debian or Ubuntu server as a base, there's lots of resources out there for setting up web services on either.


  1. Restricted Ports - you are most likely on a residential internet connection. Most residential ISPs close ports for security reasons, especially 80. For example, here is Cox's list of restricted ports. You will need to find your ISP's equivalent list and understand what you can and can't do with your connection.

    There are workarounds, primarily through port forwarding. You will need admin access to your router to set this up. I recommend that you read that entire article because it probably applies directly to your situation.


  1. Dynamic IP Address - most people still find it easier to work with IPv4 addresses - I won't go into IPv6 right now, but you should read a little about it just for awareness. Your residential internet most likely has a dynamic IPv4 address, which means you can't rely on that address staying the same forever (or even until next week), which means that you can't configure your Cloudflare domain name to point to a single IPv4 address.

    Dynamic DNS is the solution for this, and again you'll need admin access to your router to set it up.


  1. HTTPS/TLS/SSL - if you get through all those issues then you probably have a working website, but now you're seeing something like this when you try to view it in your browser:
    https://www.isitwp.com/wp-content/uploads/2021/08/site-is-not-secure-warning.png

    This doesn't mean that you can't get to your website - it just means that you can only do it via HTTP and not HTTPS, which the browser is warning you (and anyone else trying to view your website) is not secure. You can either just accept that this alert will always come up, and that you have to click through it, or you can learn about TLS and getting an SSL/TLS certificate. This is a later topic - it doesn't matter and probably won't make sense until after you've got your web server online.

NaibofTabr ,

You're welcome. I tried to do basically the same thing a few years back (run a WordPress site from a RPi on my home network - and also a Minecraft server) and so I tried to write up the problems I ran into - I probably forgot some, but those are the major hurdles. I learned a lot along the way.

I should also point out that if you rent hosting space (from linode or inmotion or digitalocean or many other options) then problems 1 & 4 become much easier, and 2 & 3 go away entirely (most people don't host public websites on their home networks because of these and other issues).

Happy to help. If you're interested in learning networking more thoroughly, I want to point you to Professor Messer especially the Network+ content. He has far more complete explanations than I could write (and it's free!). Even if you're not interested in getting any certs, the explanations will be helpful.

Men are from Mars...

Disclaimer: This meme may include negative depictions and/or mistreatment of people or cultures. These stereotypes were wrong then, and are wrong now. Rather than remove this content, I want to acknowledge its harmful impact, learn from it, and spark a conversation to create a more inclusive future together.

NaibofTabr ,

That can't be right. Those controls have labels.

NaibofTabr ,

What are your interests like? Do you want to do engineering-type stuff in your personal time, or not-work-related stuff?

Do you have a separate room from your bedroom, or is it a studio? Some projects are small enough for an apartment, but you don't want to sleep with them (anything involving harsh chemicals or hot plastic).

Do you have space for a dedicated workbench/desk? One thing that really helps with my own projects is having space to leave them out while they're in progress. Having to pack them up and then unpack them again is a real hassle.

Do you have a balcony/patio/outdoor space?

Is money a consideration? Some projects have a high barrier-to-entry (a usable 3D printer will cost several hundred dollars up front).

Possibly most important, do you have any ideas that you want to create but aren't sure how to get there? Projects are most successful when you have a vision for what you want to do, and the skills and tools you pick up along the way are just a means to an end.

NaibofTabr ,

"Manipulate" is perhaps an overly cynical way of saying that everyone has their own motivations, which they pursue both consciously and unconsciously.

NaibofTabr ,

China is probing the US's willingness to get involved in another conflict.

"Stupid and petty" is how international bullies operate. Pointless violence is how immature people express their "strength".

I know there have been maritime issues between China and others within the last few years or so

All of the maritime issues have been caused by China attempting to claim the entire South China Sea as their private property, in defiance of international agreements about national coastal waters. All of those issues were provoked by China trying to exert control over coastal waters that are rightfully the property of other nations, such as Malaysia, Singapore, and the Philippines. China is a bad neighbor.

NaibofTabr ,

I don't think it's valid to compare a full-scale ground invasion with smashing up a patrol boat. Ground invasions are overt acts of war, no matter how much the invader might want to label them as "special". In this case I don't think China wants an open conflict with the Philippines, not yet anyway. If you're actually invading you don't vandalize one boat with hand tools and then run off, like teenager leaving a burning bag of shit on someone's porch.

This is about China doing whatever it wants, and international law be damned. It's more of a Cartman-esque demand for obedience and submission.

NaibofTabr ,

Considering that this particular incident happened near the Second Thomas Shoal:

https://d18x2uyjeekruj.cloudfront.net/wp-content/uploads/2024/03/sts.jpg

which is awfully close to Philippine territory and nowhere near China, I find your "but-what-about" attempt here specious and shallow.

NaibofTabr ,

No, I think it's an invalid comparison. Do you struggle with reading comprehension?

NaibofTabr ,

Yeah, attacking a military unit seems like an act of war to me. Pretty blatant. Demonstrates that China only behaves as a bad actor with its neighbors, and can't be trusted to be anything other than a bully.

This is basically China daring the US to do something about it. We shouldn't take the dare, but we should respond with a show of support for the Philippines. China is flexing because they think the US is too busy with Ukraine, Israel, and the upcoming election.

NaibofTabr , (edited )

It factors into China's ambitions to control the entire South China Sea:

https://sovereignlimits.com/wp-content/uploads/sites/2/2021/01/OverviewMap-scaled.jpg

Straight-up imperialism. All your ocean are belong to us.

NaibofTabr , (edited )

InControl by Steve Gibson allows you to set a specific Windows release version and prevent further feature updates, but does allow security updates:

InControl controls Windows automatic updating/upgrading system by targeting it to a specific major version and feature update release. By default, the current release will be used. So if you “Take Control” with the major version and feature release shown in the boxes in the lower left, Windows will remain right where it is – only installing monthly security updates – until you “Release control”.

Also:

Like all of GRC's ultra lightweight freeware utilities, no setup or installation is required. Just run the utility with administrative rights. InControl's operation can be scripted from the command line, and full technical details about the Registry keys it changes is provided.

NaibofTabr ,

Yeah, I started listening to the podcast a couple years ago, and based on that I'd trust Steve's opinion on basically everything related to computers & networking - largely because I know he'd be able to explain in detail why he has that opinion.

NaibofTabr , (edited )

Steve is one of those guys that has done so much with computers that if you have a problem it's highly likely that he's already dealt with that problem too and has a solution or workaround, or knows where to find one.

NaibofTabr ,

It's not a problem, until it is a problem.

"It hasn't happened yet" is not a valid basis for making decisions.

NaibofTabr ,

The legal precedents that have been set in this area basically boil down to this: if the police could unlock your phone while you were unconscious (e.g. by placing your finger on it or pointing it at your face) then they are allowed to do so.

You cannot be legally compelled to reveal your password or unlock a device with your password. Obviously you could be forced anyway, but evidence collected this way would be inadmissable in court.

NaibofTabr ,

It probably heavily depends on where you are from.

What makes you think so?

NaibofTabr ,

Hmm... I wonder if I could run pihole in an onboard container and force all my local device traffic through it...

NaibofTabr , (edited )

I think the tricky part is getting a virtual network interface from pihole that can be properly configured in the Android Settings > Connection & sharing > Private DNS > Specified DNS.

For this to work on the mobile device, you don't want pihole to make itself accessible on the external network interface, but rather an internal (virtual) interface that Android sees as a valid DNS server so that it can be permanently configured (otherwise you would have to reset the private DNS IP address every time you connected to a new WiFi network, and it would be tricky to get it working on the cell network at all).

I'm not sure if this is possible without running a more complete virtual machine that creates a virtual network adapter. Maybe a VPN app could be abused to redirect Android's outbound DNS requests to localhost?

NaibofTabr ,

“Following recent regulatory changes in Russia, we received persistent requests from Roskomnadzor demanding that five add-ons be removed from the Mozilla add-on store,” a Mozilla spokesperson told The Intercept in response to a request for comment. “After careful consideration, we’ve temporarily restricted their availability within Russia. Recognizing the implications of these actions, we are closely evaluating our next steps while keeping in mind our local community.”

People are getting upset about this, but it only applies within the country where Roskomnadzor has authority, and it's temporary pending further review.

Slow down your condemnations. Mozilla, as a law-abiding organization, must at least acknowledge the requests of a regulatory agency within its own country. Whether you agree with their requests or not, Roskomnadzor has governmental authority in this context within Russia.

Stop jumping to conclusions, actually read the article, and put the fucking pitchforks away.

NaibofTabr ,

The laws of a country apply to the activity of a company that is operating within that country, regardless of what that company considers its home country.

NaibofTabr ,

But seriously why the hell would Mozilla be obliged to acknowledge this request? Do they have offices in Russia?

Roskomnadzor has regulatory authority in Russia. Roskomnadzor has the legal authority to regulate communications technology within Russia. They are completely within their rights to enforce this within Russia, regardless of what people living in other countries think about it, and organizations operating within Russia are legally bound to abide by the Russian government's regulations within Russia, just as they are in every other country.

NaibofTabr ,

Do they distribute a Russian version of their software to Russian citizens?

Why is End of Life of an OS bad for an average user?

I get that there won't be any security updates. So any problem found can be exploited. But how high is the chance for problems for an average user if you say, only browse some safe websites? If you have a pc you don't really care much about, without any personal information? It feels like the danger is more theoretical than...

NaibofTabr ,

There is a lot of crap crawling around on the internet that will infect any vulnerable machine it finds, completely automatically. There's no human behind it trying to hack you specifically on purpose. A fair amount of it is orphaned - the original creator doesn't have any control over it anymore. It's just spreading on the network through anything it can infect.

If you connect a vulnerable machine to the network, it will get infected by something and end up continuing to spread this kind of crap.

NaibofTabr ,

Ok, let's assume (for the sake of argument) that everything is on the up-and-up, and Microsoft will behave in a completely equitable and user-friendly way with regard to this feature going forward. Where does that leave us?

There is a spyware feature built into Windows 11. It is off by default, but a malware that wants to capture this kind of information doesn't have to install anything, and it doesn't have to run any background processes that might get caught by a system monitor or blocked by application whitelisting. All it has to do is turn this built-in feature on, and then exfiltrate the data later.

Setting this off by default doesn't remove the security issue.

NaibofTabr ,

Here is an album of photos from the protest in 1989, along with explanations of the historical context:

https://archive.ph/7Tdzh

Warning: blood, gore, visible injuries, death

be4foss , to KDE
@be4foss@floss.social avatar

Opt out? Opt in? Opt Green!

50% of consumers buy new devices due to unsupported software, while the "tsunami of " continues to rise.

can keep those devices in use and out of the landfill. Today!

Say hello to the new project ": For Sustainable Hardware".

https://eco.kde.org/blog/2024-05-29_introducing-ns4nh/

You don't need new hardware for a secure, up-to-date device; you just need the right software!

@kde

NaibofTabr ,

Fairphone is offering a solution to this by designing devices that are repairable and have guaranteed software updates, though it requires some compromises.

  • because the phone is not sealed, its waterproof/dustproof rating is lower
  • the specs are lower than other phones in the same price range - this is probably due to the modular design and the need to assure the supply of replacement parts
  • the phone is only designed for the EU - it may not support the network bands used in other parts of the world
NaibofTabr ,

Yeah, it's a good concept and I'd like to see more options like it on the market, but it kind of runs against the current consumer electronics profit model and the way the electronics supply chain is structured.

It does seem like consumer awareness is changing, and there's more and more demand for sustainable and long-life products. Hopefully that continues. I think "vote with your wallet" applies to this sort of thing.

NaibofTabr ,

I mean... yes, if you place any kind of permanent structure in the ground, water will have to flow around it... it doesn't really matter what the structure is for.

I'm curious, how do you think that this differs from any other type of building or transportation structure?

Also, you're aware that landscape engineering is a thing right? In many jurisdictions in the US, building codes require that new construction plan for and conduct studies to ensure that there is minimal impact to water collection and runoff. The EPA has a page on ordinances for urban runoff.

NaibofTabr ,

I plan to RAID1 them and use them as boot drives

This will not work unless the mainboard is handling the RAID control in firmware. If you are doing software RAID then the OS must boot before the array can be accessed.

If you just want to set up a NAS, you can get a used PowerEdge tower for very little money, and it will work a lot better than what you have planned.

NaibofTabr ,

Everyone in this thread is missing that this is just a copy of the OS. OP said nothing about having a computer, or internet, or electricity.

I'll take Windows 7 because it was still issued on DVD which would be useful as a signal mirror for getting rescued.

NaibofTabr ,

Their track record isn't safer than a human driver... because their system is a mechanical turk.

NaibofTabr ,

So if we could completely annihilate a mass equivalent to the Moon with an equal mass of antimatter and capture all of the energy with no losses to heat and without ripping the device apart, that would work?

No problem, we'll have it done next week.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • kbinchat
  • All magazines