drspod

joined 2 years ago
[–] [email protected] 6 points 5 hours ago (1 children)

Does Croc have a big enough fanbase to be able to pull off an exclusivity deal?

[–] [email protected] 13 points 2 days ago (2 children)

I've had this one in my images folder for at least a couple of decades. No idea where I saved it from:

[–] [email protected] 13 points 2 days ago (2 children)

What an inflammatory headline.

[–] [email protected] 0 points 2 days ago* (last edited 2 days ago)

If you're assuming that we have the technology now in its prototypical early-adopter phase then your estimate of 2030 is for adoption of LLMs and generative AI.

We don't have even prototypical AGI yet, and it is AGI which is necessary to "do all the work." The s-curve of technological adoption assumes that the technology exists at the start of the curve. This is what I meant when I said "I really don't think we are anywhere close to this."

[–] [email protected] 5 points 2 days ago (1 children)

He refers to himself as "Ba3" but a bishop on a3 would be a dark-square bishop 🤔

[–] [email protected] 10 points 2 days ago (3 children)

alt text: "We're going to have to work together to get over our hangups if we're going to learn to move on Catan's hexagonal grid. It's bad enough that we lost our crew of pawns when we passed within firing range of Battleship."

[–] [email protected] 0 points 2 days ago (4 children)

The day is coming when AI & robots can do all work

I really don't think we are anywhere close to this. I don't even expect to see it in my lifetime.

[–] [email protected] 0 points 3 days ago (20 children)

Older games are better than a lot of modern AAA slop, but not for the reasons she describes.

I was hoping she would talk about game design, or writing, mechanics, player agency, gameplay before graphics or literally anything else but she spent nearly 15 minutes only talking about tired culture wars talking points like, "why don't women look feminine aymore," "why are characters designed for diversity/inclusion first before story," "Concord sucks lol."

Yeah AAA writing is shit, please change the record so all the sweaty neckbeard virgins complaining about Aloy's facial hair can crawl back in their caves. So sick of hearing about it.

She shouts out Asmongold in her comments. Disgraceful.

[–] [email protected] 9 points 4 days ago (2 children)

The binary blobs match which checksums? The ones provided by the ventoy developer?

GLIM is an alternative that's much simpler (it just uses Grub configs) so it is easy to audit:

https://github.com/thias/glim

[–] [email protected] -2 points 4 days ago (4 children)

Please don't continue to recommend Ventoy. It has serious and unanswered security questions hanging over it, and the developer seems to be completely AWOL.

https://github.com/ventoy/Ventoy/issues/2795

https://lemmy.ml/post/20404494

[–] [email protected] 0 points 4 days ago

This same article has already been posted 3 times to this community:

24 hours ago

19 hours ago

15 hours ago

Please check if you're reposting before clicking submit!

 

Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously deleted packages to conduct supply chain attacks.

The technique "could be used to hijack 22K existing PyPI packages and subsequently lead to hundreds of thousands of malicious package downloads," the researchers say.

If you ever install python software or libraries using pip install then you need to be aware of this. Since PyPI is allowing re-use of project names when a project is deleted, any python project that isn't being actively maintained could potentially have fallen victim to this issue, if it happened to depend on a package that was later deleted by its author.

This means installing legacy python code is no longer safe. You will need to check every single dependency manually to verify that it is safe.

Hopefully, actively maintained projects will notice if this happens to them, but it still isn't guaranteed. This makes me feel very uneasy installing software from PyPI, and it's not the first time this repository has been used for distributing malicious packages.

It feels completely insane to me that a software repository would allow re-use of names of deleted projects - there is so much that can go wrong with this, and very little reason to justify allowing it.

 
 

Description: "Featured is a playthrough of a blitz chess game between Rodrigo Vasquez and Vladimir Kramnik from an Early Titled Tuesday event which was held on October 17th, 2023. Kramnik recently admitted, via a YouTube comment on this topic of fair play surrounding him, that he played several tournaments under someone else’s chess.com account. This act violates chess.com’s Fair Play Policy. Kramnik played under Denis Khismatullin’s account, “Krakozia”. I share reasons why this is a violation of fair play policy, how a player can be negatively impacted because of it, and provide Kramnik’s YouTube comments where he attempts to explain it all."

 

A reported Free Download Manager supply chain attack redirected Linux users to a malicious Debian package repository that installed information-stealing malware.

The malware used in this campaign establishes a reverse shell to a C2 server and installs a Bash stealer that collects user data and account credentials.

Kaspersky discovered the potential supply chain compromise case while investigating suspicious domains, finding that the campaign has been underway for over three years.

view more: next ›