[-] [email protected] 5 points 1 month ago* (last edited 1 month ago)

xzbot from Anthony Weems enables to patch the corrupted liblzma to change the private key used to compare it to the signed ssh certificate, so adding this to your instructions might enable me to demonstrate sshing into the VM :)

Fun :)

Btw, instead of installing individual vulnerable debs as those kali instructions I linked to earlier suggest, you could also point debootstrap at the snapshot service so that you get a complete system with everything as it would've been in late March and then run that in a VM... or in a container. You can find various instructions for creating containers and VMs using debootstrap (eg, this one which tells you how to run a container with systemd-nspawn; but you could also do it with podman or docker or lxc). When the instructions tell you to run debootstrap, you just want to specify a snapshot URL like https://snapshot.debian.org/archive/debian/20240325T212344Z/ in place of the usual Debian repository url (typically https://deb.debian.org/debian/).

[-] [email protected] 27 points 1 month ago* (last edited 1 month ago)

A daily ISO of Debian testing or Ubuntu 24.04 (noble) beta from prior to the first week of April would be easiest, but those aren't archived anywhere that I know of. It didn't make it in to any stable releases of any Debian-based distros.

But even when you have a vulnerable system running sshd in a vulnerable configuration, you can't fully demo the backdoor because it requires the attacker to authenticate with their private key (which has not been revealed).

But, if you just want to run it and observe the sshd slowness that caused the backdoor to be discovered, here are instructions for installing the vulnerable liblzma deb from snapshot.debian.org.

[-] [email protected] 2 points 1 month ago

because i thought the situation described by the post was tragicomic (as was somewhat expressed by the line from it quoted in the post title)

[-] [email protected] 1 points 1 month ago

You can use Wireshark to see the packets and their IP addresses.

https://www.wireshark.org/download.html

https://www.wireshark.org/docs/

A word of warning though: finding out about all the network traffic that modern software sends can be deleterious to mental health 😬

[-] [email protected] 2 points 1 month ago* (last edited 1 month ago)

I do have wireguard on my server as well, I guess it’s similar to what tailscale does?

Tailscale uses wireguard but adds a coordination server to manage peers and facilitate NAT traversal (directly when possible, and via a intermediary server when it isn't).

If your NAT gateway isn't rewriting source port numbers it is sometimes possible to make wireguard punch through NAT on its own if both peers configure endpoints for eachother and turn on keepalives.

Do you know if Yggdrasil does something similar and if we exchange data directly when playing over Yggdrasil virtual IPv6 network?

From this FAQ it sounds like yggdrasil does not attempt to do any kind of NAT traversal so two hosts can only be peers if at least one of them has an open port. I don't know much about yggdrasil but from this FAQ answer it sounds like it runs over TCP (so using TCP applications means two layers of TCP) which is not going to be conducive to a good gaming experience.

Samy Kamkar's amazing pwnat tool might be of interest to you.

[-] [email protected] 2 points 1 month ago

I have a device without public IP, AFAIK behind NAT, and a server. If I use bore to open a port through my server and host a game, and my friends connect to me via IP, will we have big ping (as in, do packets travel to the server first, then to me) or low ping (as in, do packets travel straight to me)?

No, you will have "big ping". bore (and everything on that page i linked) is strictly for tunneling which means all packets are going through the tunnel server.

Instead of tunneling, you can try various forms of hole punching for NAT traversal which, depending on the NAT implementation, will work sometimes to have a direct connection between users. You can use something like tailscale (and if you want to run your own server, headscale) which will try its best to punch a hole for a p2p connection and will only fall back to relaying through a server if absolutely necessary.

[-] [email protected] 5 points 1 month ago

See https://github.com/anderspitman/awesome-tunneling for a list of many similar things. A few of them automatically setup letsencrypt certs for unique subdomains so you can have end-to-end HTTPS.

[-] [email protected] 2 points 2 months ago

Color can provide useful context. For example, in the case of this image, imagine if in a thread about it there was some discussion of the ripeness of the yuzu fruit.

[-] [email protected] 1 points 2 months ago

Tell me you didn't click either link in my comment without telling me you didn't click either link

[-] [email protected] 16 points 2 months ago

FICO is just one of a multitude of scoring systems which impact people's lives in the US today.

https://en.wikipedia.org/wiki/Criticism_of_credit_scoring_systems_in_the_United_States

You and your friends' social media activity, among numerous other things, can absolutely affect your ability to get a loan, a job, a rental contract, etc.

0
First post (lemmy.ml)
submitted 3 months ago by [email protected] to c/[email protected]
1
submitted 3 months ago* (last edited 3 months ago) by [email protected] to c/[email protected]

captionscreenshot of a post saying "I have been at conferences with many tools who will offer real time feedback" above a quoted post saying "ChatGPT is the first tool that offers real-time feedback on the quality of your thinking."

source.

1
submitted 3 months ago by [email protected] to c/[email protected]
1
submitted 4 months ago by [email protected] to c/[email protected]
0
very upsetting (lemmy.ml)
submitted 4 months ago* (last edited 4 months ago) by [email protected] to c/[email protected]

captiona screenshot of the text:

Tech companies argued in comments on the website that the way their models ingested creative content was innovative and legal. The venture capital firm Andreessen Horowitz, which has several investments in A.I. start-ups, warned in its comments that any slowdown for A.I. companies in consuming content “would upset at least a decade’s worth of investment-backed expectations that were premised on the current understanding of the scope of copyright protection in this country.”

underneath the screenshot is the "Oh no! Anyway" meme, featuring two pictures of Jeremy Clarkson saying "Oh no!" and "Anyway"

screenshot (copied from this mastodon post) is of a paragraph of the NYT article "The Sleepy Copyright Office in the Middle of a High-Stakes Clash Over A.I."

-1
submitted 4 months ago by [email protected] to c/[email protected]
1
submitted 5 months ago by [email protected] to c/[email protected]

It looks like the paper is paywalled and not yet on scihub but i did find 38 pages of supplemental information with more details than the article.

3
submitted 11 months ago by [email protected] to c/[email protected]
0
submitted 11 months ago by [email protected] to c/[email protected]
2
submitted 11 months ago by [email protected] to c/[email protected]
0
submitted 11 months ago* (last edited 11 months ago) by [email protected] to c/[email protected]
2
submitted 11 months ago* (last edited 11 months ago) by [email protected] to c/[email protected]

.

view more: ‹ prev next ›

cypherpunks

joined 2 years ago
MODERATOR OF