A1kmm

joined 2 years ago
[–] A1kmm@lemmy.amxl.com 7 points 1 day ago* (last edited 1 day ago)

Apparently the xitter tweet was a eulogy for Yahya Sinwar.

Now Yahya Sinwar was a war criminal, so they kind of have a point.

However, if that is the standard they set, saying anything positive about Benjamin Netanyahu, Yoav Gallant, Ron Dermer, Aryeh Deri, Benny Gantz, Gadi Eisonkot, Bezalel Smotrich and Itamar Ben-Gvir, who are all also leaders who have supported war crimes should also be grounds for having awards rescinded. But what are the chances that there is a double standard?

Perhaps a good approach is to check other recipients who are pro-Zionist‡ and see if they have anything praising war criminals, and complain - if there is no similar response, it is clear there is a double standard.

‡: And before anyone tries to twist my words as a smear, I define a modern Zionist in the usual way as someone who wants to expand the state of Israel beyond the 1967 boundaries, other than as a one-state solution with the consent of the people of the lands.

[–] A1kmm@lemmy.amxl.com 2 points 4 days ago

I think the whole case seems super suss.

The photos of someone in the area look nothing like him.

But supposedly they found him days later, based on someone recognising him (from what? he doesn't even look like the publicly shared suspect photos), and despite him supposedly having travelled a great distance - enough to scatter any evidence over large distances where it would never be recovered, he happened to have a complete set of evidence on him, including a paper "manifesto" and the weapon. That seems like a rather unlikely story. And then they try to seek the death penalty, and double up federal and state.

I think what happened is the authorities decided they probably would never find the real killer, but it was also unacceptable not to have someone to blame - they'd rather kill an innocent to send a message than let crime against the rich go without a response. So they picked some random they didn't like and set him up.

[–] A1kmm@lemmy.amxl.com 10 points 6 days ago (3 children)

In Australia, there is a strong presumption towards keeping left as a pedestrian (and overtaking on the right - e.g. etiquette on escalators is to keep left, but if you are walking up the escalator, overtake to the right).

In some particularly busy places (especially on shared footpath / bike lane zones) there are even arrows on the pavement to ensure tourists know what side to keep to.

There are always a few people (probably tourists) who don't follow the local etiquette.

[–] A1kmm@lemmy.amxl.com 4 points 1 week ago (1 children)

Or at least the other way around. Reddit is banned from me.

[–] A1kmm@lemmy.amxl.com 1 points 1 week ago

to lose 100% of the court cases where they try this defense

I don't think the litigants actually know this. The shady characters they are paying for the information probably know that, but represent that it will just work if they do it right.

Imagine you have some kind of legal problem, and you go to your lawyer, and your lawyer tells you they know what to do that will let you win. You'll probably do it. Now for the litigants, it is the same thing, except instead of a lawyer, it is some person with an Internet and/or in real life following, who dazzles you with lots of fake formality that aligns to your preconceptions of the legal system based on TV. Of course, it is all just pseudolegal and a scam, but you don't know that.

Now you might except that some critical thinking and/or research of authoritative sources like case law, or consulting a real lawyer might let the litigant see that it is a scam, but critical thinking skills are not as common as you might hope, and secondary education in many places doesn't cover much about the law or how to do legal research.

Consider that 49.8% of voters in the 2024 US Presidential election voted for Trump, even after seeing the first term. Many people are easily hoodwinked into acting against their own best interests, especially if they are convinced there is a community of other people like them acting the same way (SovCit like groups do have some numbers), that people who endorse those theories get a lot of recognition / are influential (the leaders of the groups can create that impression), and that their theories have a long traditional backing (usually they make up a historical backstory).

[–] A1kmm@lemmy.amxl.com 0 points 1 week ago

That catholics should practice confession is a religious belief. But the confidentiality part is from canon law - i.e. in terminology of most other organisations, it is a policy. It is a long-standing policy to punish priests for breaking it, dating back to at least the 12th century, but nonetheless the confidentiality is only a policy within a religious organisation, and not a religious belief.

Many organisations punish individuals who break their policy. But if an organisation has a policy, and insist that it be followed even when following it is contrary to the law, and would do immense harm to vulnerable individuals, then I think it is fair to call that organisation evil - and to hold them culpable for harm resulting from that policy.

Even if the confidentiality itself was a core part of the religious belief itself, religious freedom does not generally extend to violating the rights of others, even if the religion demands it. Engaging in violent jihad, for example, is not a protected right even in places where religious freedom cannot be limited, even if the person adheres to a sect that requires it.

[–] A1kmm@lemmy.amxl.com 12 points 1 week ago

"Except for Claims (i) in which a party is attempting to protect its intellectual property rights (such as its patent, copyright, trademark, trade secret, anti-circumvention, or moral rights, but not including its privacy or publicity rights) ..."

So in other words, the types of matters Nintendo thinks it might have a dispute against users, court and class actions are okay, but for everything that they think users might file against Nintendo, they think arbitration is best.

[–] A1kmm@lemmy.amxl.com 9 points 2 weeks ago (1 children)

Easy! Why do you think it happened? Inadequate food regulation? Underfunded healthcare? Insufficient regulation of pollutants that can impact health and cause chronic disease?

I don't know your individual circumstances, but given the state of the world right now, I'd bet it's a combination of all three.

[–] A1kmm@lemmy.amxl.com 15 points 2 weeks ago (3 children)

bootloader unlocking

I used to buy Xiaomi products because of the bootloader unlocking, but in practice it is a dystopian nightmare - they have built it so to unlock the bootloader you need a cryptographic signature from them, and they don't give that out all that easily.

You have to sign up for an account with them, use a Windows-only tool to request unlocking, and they have a long wait period (deliberately imposed) to unlock, which sometimes randomly restarts. The wait period is different for different models, and can be weeks.

Their support are unwilling to help unlock immediately even for replacement devices where you want to get up and going quickly - if your device breaks (they are not the most durable phones IMO, as you note) and you get a replacement, you'll have to wait the time again before you can restore a backup of a phone using a custom ROM.

It's possible they have improved, but because of their attitude around what I can do with my own hardware, I've stopped buying Xiaomi gear.

[–] A1kmm@lemmy.amxl.com 4 points 1 month ago

The resulting waste from a thorium reactor is radioactive for dozens or hundreds of years not tens of thousands of years so you don’t need a giant Yucca Mountain style disposal site

That is assuming they don't make significant amounts of Fe-60 (2.6 My half-life) by exposing steel pipes to neutron flux. While the fuel itself might have a shorter half-life, other waste still needs to be dealt with.

[–] A1kmm@lemmy.amxl.com 3 points 1 month ago

To save on costs, QAs could be paid in exposure.

[–] A1kmm@lemmy.amxl.com 5 points 2 months ago

As an experiment / as a bit of a gag, I tried using Claude 3.7 Sonnet with Cline to write some simple cryptography code in Rust - use ECDHE to establish an ephemeral symmetric key, and then use AES256-GCM (with a counter in the nonce) to encrypt packets from client->server and server->client, using off-the-shelf RustCrypto libraries.

It got the interface right, but it got some details really wrong:

  • It stored way more information than it needed in the structure tracking state, some of it very sensitive.
  • It repeatedly converted back and forth between byte arrays and the proper types unnecessarily - reducing type safety and making things slower.
  • Instead of using type safe enums it defined integer constants for no good reason.
  • It logged information about failures as variable length strings, creating a possible timing side channel attack.
  • Despite having a 96 bit nonce to work with (-1 bit to identify client->server and server->client), it used a 32 bit integer to represent the sequence number.
  • And it "helpfully" used wrapping_add to increment the 32 sequence number! For those who don't know much Rust and/or much cryptography: the golden rule of using ciphers like GCM is that you must never ever re-use the same nonce for the same key (otherwise you leak the XOR of the two messages). wrapping_add explicitly means when you get up to the maximum number (and remember, it's only 32 bits, so there's only about 4.3 billion numbers) it silently wraps back to 0. The secure implementation would be to explicitly fail if you go past the maximum size for the integer before attempting to encrypt / decrypt - and the smart choice would be to use at least 64 bits.
  • It also rolled its own bespoke hash-based key extension function instead of using HKDF (which was available right there in the library, and callable with far less code than it generated).

To be fair, I didn't really expect it to work well. Some kind of security auditor agent that does a pass over all the output might be able to find some of the issues, and pass it back to another agent to correct - which could make vibe coding more secure (to be proven).

But right now, I'd not put "vibe coded" output into production without someone going over it manually with a fine-toothed comb looking for security and stability issues.

 

spoilerHe was the instar pupa.

92
submitted 4 months ago* (last edited 4 months ago) by A1kmm@lemmy.amxl.com to c/selfhosted@lemmy.world
 

Today, lemmy.amxl.com suffered an outage because the rootful Lemmy podman container crashed out, and wouldn't restart.

Fixing it turned out to be more complicated than I expected, so I'm documenting the steps here in case anyone else has a similar issue with a podman container.

I tried restarting it, but got an unexpected error the internal IP address (which I hand assign to containers) was already in use, despite the fact it wasn't running.

I create my Lemmy services with podman-compose, so I deleted the Lemmy services with podman-compose down, and then re-created them with podman-compose up - that usually fixes things when they are really broken. But this time, I got a message like:

level=error msg=""IPAM error: requested ip address 172.19.10.11 is already allocated to container ID 36e1a622f261862d592b7ceb05db776051003a4422d6502ea483f275b5c390f2""

The only problem is that the referenced container actually didn't exist at all in the output of podman ps -a - in other words, podman thought the IP address was in use by a container that it didn't know anything about! The IP address has effectively been 'leaked'.

After digging into the internals, and a few false starts trying to track down where the leaked info was kept, I found it was kept in a BoltDB file at /run/containers/networks/ipam.db - that's apparently the 'IP allocation' database. Now, the good thing about /run is it is wiped on system restart - although I didn't really want to restart all my containers just to fix Lemmy.

BoltDB doesn't come with a lot of tools, but you can install a TUI editor like this: go install github.com/br0xen/boltbrowser@latest.

I made a backup of /run/containers/networks/ipam.db just in case I screwed it up.

Then I ran sudo ~/go/bin/boltbrowser /run/containers/networks/ipam.db to open the DB (this will lock the DB and stop any containers starting or otherwise changing IP statuses until you exit).

I found the networks that were impacted, and expanded the bucket (BoltDB has a hierarchy of buckets, and eventually you get key/value pairs) for those networks, and then for the CIDR ranges the leaked IP was in. In that list, I found a record with a value equal to the container that didn't actually exist. I used D to tell boltbrowser to delete that key/value pair. I also cleaned up under ids - where this time the key was the container ID that no longer existed - and repeated for both networks my container was in.

I then exited out of boltbrowser with q.

After that, I brought my Lemmy containers back up with podman-compose up -d - and everything then worked cleanly.

 

Looks like it is also flowing into huge numbers of people using the trams.

 

The new laws are coming into force in the current election. It is a sweeping change impacting all councils. It makes councils much less representative - it means that one ticket of councillors can have 51% support but 100% of all seats on the council.

Based on the speeches, it sounds like basically everyone was against Labor on this, both the VEC expert recommendation, and also pretty much everyone in state parliament except Labor - see the linked hansard starting from page 30. That said, when the Greens proposed an amendment to it, the Liberals voted with Labor to defeat it, and the single-member ward thing became law.

 

Stallman was right - non-Free JavaScript does hostile things like this to the user on who's computer it is running.

view more: next ›