* Posts by suburbazine

13 publicly visible posts • joined 19 Nov 2018

Russia says software malfunction caused Nauka module to unexpectedly fire thrusters, tilt space station

suburbazine

Maybe it's an industrial virus like Stuxnet, except designed to randomly activate Russian rocket engines to destroy their spacecraft.

SteelSeries Apex Pro plays both sides of the mechanical keyboard fence – and wins

suburbazine

Steelseries is so... 2000 and late?

I think Reg ought to demo a Wooting 2 Lekker or HE edition (when available). It will utterly dominate the Apex Pro in every way except maybe less OLED. Software is mature, everything just works but has ridiculous amounts of customization available. MUCH higher sensitivity range (0.1mm to 4mm) with full analog translation over the entire keystroke if needed. Can also fire multi actions based on key travel.

https://wooting.io/wooting_two_lekker

PS: Linux is supported natively

NurseryCam hacked, company shuts down IoT camera service

suburbazine

So 125 Euro per hour for security consulting is extortion?

Such tender emotions on these people. I'll build them a safe space they can be protected from reality in for a modest $185/hr.

The killing of CentOS Linux: 'The CentOS board doesn't get to decide what Red Hat engineering teams do'

suburbazine

Doing the math...

It would be cheaper for me to register many different businesses and then register different domains for them, to run different email accounts, just to abuse the "free developer" RHEL tier, than it would be to pay for RHEL. Not that I would consider even using RHEL at this point, since they backstabbed all their Centos users for what they're amounting the profit to "a dime, or less".

Hollywood drone pilot admits he crashed gizmo into cop chopper, triggering emergency landing

suburbazine

Re: Not really the brightest bulb, was he?

Since nobody has answered this exactly- yes, drone altitude limit (assuming no RPIC license and associated waiver) is 400' AGL, daylight hours between civil twilight and yield airspace to all manned traffic at any altitude.

This bloke was at ~1490' AGL, at night, and climbing at FULL THROTTLE. Apparently this was not his first high-altitude night flight either, just that this one wound up embedding bits of his extremely strong carbon fiber rotor blades in the helicopter fuselage under the chin antennas.

There is not a significant amount of downdraft under a helicopter blade when under way, only when in a stationary hover (and then not much, ground effect makes it look much more turbulent) and it's very easy for a drone to penetrate what little local aerodynamic effect the helicopter has surrounding it at altitude.

We didn't collude with Twitter to throw Parler off our servers, says AWS in court filing

suburbazine

Re: Small difference

It's not private ownership when you're publicly traded. You're a public company and do not get to dictate public policy. THAT is the issue here- these publicly traded companies are acting as if they're privately held corporations and are allowed to suppress any speech they want.

If they want to censor things like the bakers did, they can be private companies like the bakers were. That means not living on the investments of the government and traders. What is Twitter or Facebook selling you... oh wait- they're selling YOU.

As Uncle Sam continues to clamp down on Big Tech, Apple pelted with more and more complaints from third-party App Store devs

suburbazine

Epic's taking to court of Apple was the moment I decided it was time to cut myself free of all Apple entanglements. I'm jumping to Android this year and if my Apple apps don't port or have an equivalent, I will find a way to live without. I really doubt I won't find an equivalent that's not actually way better, though.

The solution to Apple turning the screws on developers is not to sue Apple. All Apple customers need to jump to other platforms entirely... it's not like their hardware and OS is particularly good or reliable or anything. The App store is already chock full of ripoff apps that Apple never removes, many of which are in violation of numerous terms of service... so Apple is already no better than the Play store.

Lenovo ThinkPad Carbon X1 Gen 8: No boundaries were pushed in the making of this laptop – and that's OK

suburbazine

Re: Pricey!

It's only $1500 USD as reviewed...except with a 1yr premiere warranty instead of base. Granted, that's with a $1400 discount code...

If you wanted to save even more, go with the cheapest SSD and swap it to a 1TB Samsung drive for 50% the price. No warranties voided.

Satellites with lasers and machine guns coming! China's new plans? Trump's Space Force? Nope, the French

suburbazine

It's France. We'll soon have entire guns floating around in orbit after their satellites drop them.

Great, you've moved your website or app to HTTPS. How do you test it? Here's a tool to make local TLS certs painless

suburbazine

That feature photo

Is an awesome conglomeration of incompatible products. Also, very in keeping with certificate setup.

Domain name 'admin' role eyed up as latest victim of Whois system's GDPRmeggdon

suburbazine

Unicorn startup idea

Let's start a new company called EUROCANN. We'll make a billion GDPR compliant Euros in a year.

A little phishing knowledge may be a dangerous thing

suburbazine

I've submitted a question to the authors of the study regarding how it was conducted and the way they published the results. If anyone is interested, this is the question I submitted:

Hello all,

Your paper is beginning to spread around the world, with tech websites and security moguls alike seeing it. I have a question about the way you've defined a successful "phishing" though- it seems like you based a success on simply clicking the link, not the actual act of being phished which is submitting valid user information. I'm not sure if the scope or authorization of the phishing would have permitted the actual collection of information. However, the study as published doesn't indicate any restrictions on the methodology (Either preface the study with this, or include it in Limitations).

In corporate phishing tests, companies generally opt to capture their employees' data as it pertains to the company (no outside/unaffiliated data). In Experiments 1 and 2, this restriction would have denied collection of data, but in 3 it may have been permissible to capture credentials if overseen by your university's administration.

The reason I raise this question is because you're redefining phishing as the world knows it- not as the loss of user data, but as the act of clicking a link in a poorly constructed email. Your experiment as operated does not take into account the "outliers" as I will categorize them: the phishing-aware demographic that

Clicked the link in order to collect relevant information to report the phish to others in the affected groups (this happened apparently?)

Clicked the link to troll the phishermen by submitting falsified information

Clicked the link to otherwise hamper the phishing campaign (track down abuse teams of registrars or hosts)

The only way to sanitize these possibilities is to actually collect some information, qualify it, then sort it into legitimate and illegitimate results. Your after-action report could have been plied to better educate the ones that actually did fall for the phish and possibly commend the ones that didn't. But right now, you've got everyone lumped into the "you failed" group.

suburbazine

But were they phished? Clicking an email does not count as being phished or even being susceptible to phishing. What if they simply wanted to fill out the phish field with phish food like I do...random insulting information to hurt the phisherman's feelings.