Skip Navigation
I eat words
I eat words @ saint @group.lt

Linuxoid

Matrix - @saint:group.lt

Posts
952
Comments
86
Joined
3 yr. ago
Work @group.lt
I eat words @group.lt

Not my generation, but I support the message:

  • Why Gen Z isn't apologizing for their work boundaries: a revealing look at the generation redefining workplace norms
  • The economics behind Gen Z's "quiet quitting": how housing impossibility and stagnant wages created a generation of strategic workers
  • Inside the millennial manager's dilemma: balancing progressive values with frustration over Gen Z's approach to professional advancement
  • How AI tools are helping younger employees work smarter (not harder) while their bosses struggle to adapt
  • The death of company loyalty: why 75% of employees leave before getting promoted and what it means for workplace culture
Sysadmins for sysadmins @group.lt
I eat words @group.lt

cross-posted from: https://lemmy.world/post/27408560

cross-posted from: https://lemmy.world/post/27384100

The global backlash against the second Donald Trump administration keeps on growing. Canadians have boycotted US-made products, anti–Elon Musk posters have appeared across London amid widespread Tesla protests, and European officials have drastically increased military spending as US support for Ukraine falters. Dominant US tech services may be the next focus.

There are early signs that some European companies and governments are souring on their use of American cloud services provided by the three so-called hyperscalers. Between them, Google Cloud, Microsoft Azure, and Amazon Web Services (AWS) host vast swathes of the Internet and keep thousands of businesses running. However, some organizations appear to be reconsidering their use of these companies’ cloud services—including servers, storage, and databases—citing uncertainties around privacy and data acce

Robert Anton Wilson breadcrumbs @group.lt
I eat words @group.lt
reason.com The Conspiracy Jokers

A new book explores the legacy of the 'Report on Iron Mountain,' while another probes the life of the novelist and essayist Robert Anton Wilson.

The Conspiracy Jokers

Someone subscribed to Reason magazine solely for Jesse Walker's Robert Anton Wilson content, then read Hansen's "Trickster and Paranormal" book and now sees trickster archetypes in everything—including a future article called "The Conspiracy Jokers."

The trickster archetype has clearly worked its magic on this poor soul's perception.

  • I understand your point, but I would not imply that a backdoor has to be remote. Backdoors are essentially any alternative, often undocumented ways to access or gain privileges on systems. They don't always result from malicious intent either - many backdoors simply "happen" when developers haven't fully considered security implications. For the average user whose device contains such unintentional backdoors, the impact remains the same regardless of how they came to exist. Consider the times when vendors had default BIOS passwords - these created a nightmare for Uni IT staff (and others as well), even though they were not accessible remotely.

  • From security perspective, do you think the wording changes a lot here?

  • (safe) Unsecure security @group.lt
    I eat words @group.lt

    29 Undocumented commands found in ESP-32 microcontrollers CVE-2025-27840

    cross-posted from: https://lemmy.world/post/26598539

    cross-posted from: https://programming.dev/post/26664400

    Tarlogic developed a new C-based USB Bluetooth driver that is hardware-independent and cross-platform, allowing direct access to the hardware without relying on OS-specific APIs.

    Armed with this new tool, which enables raw access to Bluetooth traffic, Tarlogic discovered hidden vendor-specific commands (Opcode 0x3F) in the ESP32 Bluetooth firmware that allow low-level control over Bluetooth functions.

    In total, they found 29 undocumented commands, collectively characterized as a "backdoor," that could be used for memory manipulation (read/write RAM and Flash), MAC address spoofing (device impersonation), and LMP/LLCP packet injection.

    Espressif has not publicly documented these commands, so either they weren't meant to be accessible, or they were left in by mistake. The issue is now tracked under CVE-2025-27840.

    "it's just for testing"

    Matrix.group.lt support @group.lt
    I eat words @group.lt

    matrix.group.lt migration to a new server

    postgresql database hits again, migrating

    War in Ukraine @group.lt
    I eat words @group.lt

    Putin's Miracle: When the "Craziest Idea Possible" Became Reality

    Before Trump's return to office was secured, I was chatting online with a friend about Putin's strategy in Ukraine. "Putin is playing the long game," my friend observed, "he realizes he cannot win quickly, but he's patiently waiting for a miracle."

    "What miracle could possibly save him?" I asked.

    My friend's answer seemed absurd then: "Well, Trump could be elected." We both brushed it off as the craziest idea possible—a distant, unlikely scenario.

    That dismissal has now turned to a chill of recognition. The "miracle" has materialized.

    My friend also pointed out something crucial about Russian warfare that the West consistently underestimates: "Russia knows how to wage slow, grinding wars. They depend on sacrificing humans, which post-Soviet Russia has plenty of." While Western democracies measure war in weeks and political cycles, Putin measures it in years and generations. His strategic patience stems from a fundamentally different calculus of human life.

    The recent White House m

    Movies @group.lt
    I eat words @group.lt

    Zeinabu irene Davis’s Closet Picks

    Movies mentioned:

    • Black Orpheus
    • Bruce Lee (Box Set) -Battle of Algiers
    • Sambizanga
    • Muna moto
    • Drylongso
    • Watermelon Woman
    • Saint Omer
    • Emitaï
    • Xala
    • Ceddo
    (safe) Unsecure security @group.lt
    I eat words @group.lt

    Nobody seems to notice... nobody seems to care..

    War in Ukraine @group.lt
    I eat words @group.lt

    The Denazify Lie

    Russian leaders and propagandists have at once denied the existence of a Ukrainian nation and called for purging or cleansing the Ukrainian territory, in terms that often mirror rhetoric preceding past genocides. In this report, the authors seek to shed light on how Russia's extremist, hate-peddling narratives deployed in the war have spread online through social media.

    Russian propaganda is making inroads into some of the major European languages—Spanish and German, as well as French and Italian.

    REMVE narratives are also finding more-receptive audiences among relatively small linguistic communities in Eastern Europe. Serbian- and Bulgarian-language communities emerge as particularly vulnerable to cross-language and cross-cultural transmission of REMVE messages on both X and Telegram.

    However, Russia's ability to successfully mainstream its propaganda and mobilize its audiences against Ukrainians is limited: The most virulent REMVE conversations on these two platforms remain h

  • no, no and no, but you will have to find an answer if your decision to have or not to have kids was the right choice in any case.

  • (safe) Unsecure security @group.lt
    I eat words @group.lt

    Bypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blog

    If you left alone in the office and have nothing better to do..

    War in Ukraine @group.lt
    I eat words @group.lt

    After the War in Ukraine, European Boots on the Ground?

    The incoming Trump administration has been supportive of this European initiative. It is consistent with the president-elect's stated desire to disengage the United States from security matters on the continent, and instead have the European Union and the United Kingdom take the lead. But a deployment of European forces to Ukraine will inevitably entangle the Americans. European militaries depend on their U.S. allies for out-of-area operations. Inevitably, a large deployment to Ukraine will once again expose this dependency when they turn to the United States for help with critical tasks such as air lift, logistics, and intelligence that they cannot conduct alone.

    War in Ukraine @group.lt
    I eat words @group.lt

    The Ukrainian military faces critical challenges that demand immediate, honest evaluation:

    • Infantry roles becoming increasingly unsustainable
    • Recruitment system disproportionately burdens vulnerable populations
    • Command structures trapped in outdated bureaucratic frameworks
    • Morale gradually eroding under prolonged combat stress
    • No clear exit strategy for frontline soldiers
    • Commanders prioritizing reporting over human lives
    • Declining Western support momentum
    • Deeply entrenched leadership inefficiencies

    Suggested changes:

    • Implement merit-based officer promotion systems
    • Establish fixed, transparent service terms
    • Rebuild trust between military leadership and soldiers

    More in the article.

    War in Ukraine @group.lt
    I eat words @group.lt

    According to the article, Danieli continues to operate in Russia despite EU sanctions, collaborating with steel giants like Severstal and MMK, both linked to military production. Danieli reportedly uses its Chinese subsidiary to bypass sanctions, enabling the supply of equipment to Russia. In 2023, its Russian subsidiary’s cash flow increased 35-fold, contradicting claims that the business is unprofitable or disconnected from the military sector. The company’s justification hinges on technicalities, but the financial and strategic realities suggest complicity in sustaining critical industries that support Russia’s war economy. At what point does this move from legal maneuvering to outright enabling?

    Work @group.lt
    I eat words @group.lt

    ILA President Daggett on Automation and the Future of Work

    • Companies are earning billions while pushing for automation that cuts jobs.
    • Automation is replacing workers across industries, from shipping terminals to retail. “Who pays taxes when machines replace workers?”
    • A dockworker strike could halt the economy.

    I think automation is unavoidable, but what is next?

    (safe) Unsecure security @group.lt
    I eat words @group.lt

    The CALEA system, designed in the U.S. for mass surveillance, has become a global threat. Telecom equipment with "back doors" isn't just an American issue—it's a worldwide risk. Trusting the "good guys" is naive; any end with "back doors" can be a target. Encryption is our defense, and we must be careful about what we buy. #security #technology

    Science @beehaw.org
    I eat words @group.lt

    How Base 3 Computing Beats Binary

    Metadata

    Highlights

    Three, as Schoolhouse Rock! told children of the 1970s, is a magic number. Three little pigs; three beds, bowls and bears for Goldilocks; three Star Wars trilogies. You need at least three legs for a stool to stand on its own, and at least three points to define a triangle.

    If a three-state system is so efficient, you might imagine that a four-state or five-state system would be even more so. But the more digits you require, the more space you’ll need. It turns out that ternary is the most economical of all possible integer bases for representing big numbers.

    Surprisingly, if you allow a base to be any real number, and not just an integer, then the most efficient computational base is the irrational number e.

    Despite its natural advantages, bas

    Software Engineering @group.lt
    I eat words @group.lt

    Highlights

    The first scaling crisis happened in 1996, when Linus wrote that he was "buried alive in emails". It was addressed by adopting a more modular architecture, with the introduction of loadable kernel modules, and the creation of the maintainers role, who support the contributors in ensuring that they implement the high standards of quality needed to merge their contributions.

    The second scaling crisis lasted from 1998 to 2002, and was finally addressed by the adoption of BitKeeper, later replaced by Git. This distributed the job of merging contributions across the network of maintainers and contributors.

    In both cases, technology was used to reduce the amount of dependencies between teams, help contributors keep a high level of autonomy, and make it easy to merge all those contributions back into the main repository, Bernhard said.

    Technology can help reduce the need to communicate between teams whenever they have a dependency on another team to get their work done.

    (safe) Unsecure security @group.lt
    I eat words @group.lt
    docs.google.com Gibler - How to 10X Your Security

    How to 10X Your Security (Without the Series D) Clint Gibler @clintgibler Watch on Youtube Hey everyone, thank you very much for coming and thank you to the organizers for having me. Over the past few years, I’ve spent 1000’s of hours studying how companies are scaling their security. Not the one...

    Gibler - How to 10X Your Security

    Good slides on how to reduce risks

  • Būtų įdomu paskaityt tai kas ten iš tiesų įvyko ir kaip buvo tvarkoma, bet turbūt Cloudflare lygio post-mortem analizės tikėtis neverta.

  • What about it? ;)

  • (safe) Unsecure security @group.lt
    I eat words @group.lt

    Highlights

    In analyzing 138 actively exploited vulnerabilities in 2023, Google Mandiant reported Oct. 15 that 70% of them were zero-days, indicating that threat actors are getting much better at identifying vulnerabilities in software.

    It’s a worrying trend in and of itself, but what caused even more concern among security analysts was that Google Mandiant also found that the time-to-exploit (TTE) — the time it takes threat actors to exploit a flaw — was down to a mere five days in 2023 compared with 63 days in 2018-19 and 32 days in 2021-22.

    Sysadmins for sysadmins @group.lt
    I eat words @group.lt

    Will be interesting to see how it works out

    The Indian nonprofit People+ai wants to fix this by creating an open and interoperable marketplace of cloud providers of all sizes. The Open Cloud Compute (OCC) project plans to use open protocols and standards to allow cloud providers of all sizes to offer their services on the network. It also plans to make it easy for customers to shift between offerings depending on their needs. People+ai held a hackathon on 20 September at People’s Education Society University (PES University) in Bengaluru to test out an early prototype of the platform.

  • They cut all such scenes and pasted into The Boys, in a Mark Twain style “Sprinkle these around as you see fit!”.

  • I liked the book as well. The show had some similar feeling in some ways, but also had a distinct character for itself.

  • Reread today again, with some highlights:

    Lessons Learned from Twenty Years of Site Reliability Engineering

    Metadata

    Highlights

    The riskiness of a mitigation should scale with the severity of the outage

    We, here in SRE, have had some interesting experiences in choosing a mitigation with more risks than the outage it's meant to resolve.

    We learned the hard way that during an incident, we should monitor and evaluate the severity of the situation and choose a mitigation path whose riskiness is appropriate for that severity.

    Recovery mechanisms should be fully tested before an emergency

    An emergency fire evacuation in a tall city building is a terrible opportunity to use a ladder for the first time.

    Testing recovery mechanisms has a fun side effect of reducing the risk of performing some of these actions. Since this messy outage, we've doubled down on testing.

    We were pretty sure that it would not lead to anything bad. But pretty sure is not 100% sure.

    A "Big Red Button" is a unique but highly practical safety feature: it should kick off a simple, easy-to-trigger action that reverts whatever triggered the undesirable state to (ideally) shut down whatever's happening.

    Unit tests alone are not enough - integration testing is also needed

    This lesson was learned during a Calendar outage in which our testing didn't follow the same path as real use, resulting in plenty of testing... that didn't help us assess how a change would perform in reality.

    Teams were expecting to be able to use Google Hangouts and Google Meet to manage the incident. But when 350M users were logged out of their devices and services... relying on these Google services was, in retrospect, kind of a bad call.

    It's easy to think of availability as either "fully up" or "fully down" ... but being able to offer a continuous minimum functionality with a degraded performance mode helps to offer a more consistent user experience.

    This next lesson is a recommendation to ensure that your last-line-of-defense system works as expected in extreme scenarios, such as natural disasters or cyber attacks, that result in loss of productivity or service availability.

    A useful activity can also be sitting your team down and working through how some of these scenarios could theoretically play out—tabletop game style. This can also be a fun opportunity to explore those terrifying "What Ifs", for example, "What if part of your network connectivity gets shut down unexpectedly?".

    In such instances, you can reduce your mean time to resolution (MTTR), by automating mitigating measures done by hand. If there's a clear signal that a particular failure is occurring, then why can't that mitigation be kicked off in an automated way? Sometimes it is better to use an automated mitigation first and save the root-causing for after user impact has been avoided.

    Having long delays between rollouts, especially in complex, multiple component systems, makes it extremely difficult to reason out the safety of a particular change. Frequent rollouts—with the proper testing in place— lead to fewer surprises from this class of failure.

    Having only one particular model of device to perform a critical function can make for simpler operations and maintenance. However, it means that if that model turns out to have a problem, that critical function is no longer being performed.

    Latent bugs in critical infrastructure can lurk undetected until a seemingly innocuous event triggers them. Maintaining a diverse infrastructure, while incurring costs of its own, can mean the difference between a troublesome outage and a total one.

  • This is what you get when are not sleeping during biology classes.

  • i am all for normalizing raiding ambassies for [put the cause you support] as well

  • looks interesting, but not this one.

  • from the logs it would seem that synapse went down not due to share volume of traffic, but special malformed usernames - so it seems a different pattern was used (if it is was an attack)

  • I am not sure if that is related, but technically Matrix uses a different protocol from ActivityPub, so it had to be targeted specifically

  • can do, if you could provide the link to the debunking source - would be great!