qqq

joined 1 year ago
[–] [email protected] 2 points 1 day ago* (last edited 1 day ago)

The GOP was maybe mad, but more importantly to me the people who actually study voting systems for a living were "mad", and the people who hurt their favored candidate by voting for them were likely upset.

Ignoring that the outcome was maybe what I would have wanted, it is definitely pathological that you can hurt a candidate by voting for them. Quoting the Wikipedia:

The election was also a negative voting weight event, where a voter's ballot has the opposite of its intended effect (e.g. a candidate being disqualified for having "too many votes"). In this race, Begich lost as a result of 5,200 ballots ranking him ahead of Peltola; Peltola also would have lost if she had received more support from Palin voters.

What do you find wrong with those other systems? RCV is also not "one person one vote". Approval voting is used in the UN and neither seem to have some of the pathologies of RCV.

Bit of a late edit here, but isn't "one person one vote" basically the description of our current problem with voting? All of these systems are trying to solve that issue.

[–] [email protected] 5 points 1 day ago* (last edited 1 day ago) (2 children)

Ever since reading about some strange properties of RCV -- which ended up being displayed in Alaska's first election using it and caused it to be repealed in Vermont -- I've been a bit suspect of it. Systems such as STAR voting and approval voting seem better.

[–] [email protected] 5 points 2 days ago* (last edited 2 days ago) (1 children)

Related and interesting podcast: https://podcasts.apple.com/us/podcast/search-engine/id1614253637.

According to what he found that is somewhat the way it works: two fake candidates and the one with more yard signs got way more votes. Doubt that generalizes to the US presidency though; especially with this election.

[–] [email protected] 1 points 3 days ago (1 children)

I almost never use Windows, but aren't commands and variables in PowerShell case insensitive?

[–] [email protected] 11 points 4 days ago* (last edited 4 days ago)

As long as it's installed on a device you control it's pretty easy to sniff TLS traffic from an Android application, even if they're pinning certs. I do this all the time for work. Frida makes it extremely easy, even giving you the ability to edit boringssl if something important is happening in native code. I've had to do this a couple times.

If you don't have root you'll have to recompile the application though which could matter if you need the signature to not change, but that isn't a common requirement.

It'd be nice to have a better way to test though; I've wanted to check out Waydroid. Some coworkers just use an emulator which works great if it doesn't need specific hardware.

[–] [email protected] 1 points 5 days ago* (last edited 5 days ago)

Oh oof I misunderstood because of the parent comment talking about NixOS oops

[–] [email protected] 9 points 6 days ago

Hm I always remember hearing this:

In a confidential memo to the Republican party, Luntz is credited with advising the Bush administration that the phrase "global warming" should be abandoned in favour of "climate change", which he called a "less frightening" phrase than the former.

https://en.m.wikipedia.org/wiki/Frank_Luntz

https://www.theguardian.com/environment/2014/may/27/americans-climate-change-global-warming-yale-report

[–] [email protected] 19 points 6 days ago* (last edited 6 days ago)

This is not legal; you have a right to vote. Call those numbers if you have an issue and don't leave the line.

We don't all have to be activists, but one day of the year we can spend a little extra time ensuring we remain a democracy.

[–] [email protected] 5 points 1 week ago* (last edited 1 week ago)

Did you read the article..? They're saying it is illegal to offer money to register to vote.

Though maybe some of the other things Musk was doing were of murky legality, this one is clearly illegal. See 52 U.S.C. 10307(c): “Whoever knowingly or willfully gives false information as to his name, address or period of residence in the voting district for the purpose of establishing his eligibility to register or vote, or conspires with another individual for the purpose of encouraging his false registration to vote or illegal voting, or pays or offers to pay or accepts payment either for registration to vote or for voting shall be fined not more than $10,000 or imprisoned not more than five years, or both…” (Emphasis added.)

[–] [email protected] 14 points 1 month ago* (last edited 1 month ago) (2 children)

This is a real exploit chain in cups-browsed. The tl;dr is that it will add basically anything that knows the correct protocol to your list of available printers, and this can be exploited for RCE if you print to the malicious printer. The service listens on all interfaces by default on UDP 631.

It is not as horrible as it was marketed, but it's real and not great. You may or may not have this service running by default; I didn't on Fedora.

His full write-up is here: https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/

view more: next ›