• 1 Post
  • 51 Comments
Joined 2 years ago
cake
Cake day: June 14th, 2023

help-circle
  • Yeah so targeting individuals or specific organisations is pretty hard. It sounds dumb but how do you get someone’s phone number if they don’t give it to you? Its hard unless you’re determined tbh which most people aren’t.

    Most hackers setup watering hole style attacks, or use phishing which is roughly the same concept. Basically they cast a wide net and see what they can grab, like the browser credentials of Debra from accounting who knows everything about compound interest and nothing about opening an .exe file in an email. There are some big game hunting groups, and the LinkedIn breach made some waves (see the fappening), but your run of the mill discord-as-a-c2 style hacker isn’t going after rich people.

    Someone “hacking a phone” likely put a kitchen scale iPhone app on the app store, which when first opened asks for permissions for microphone, camera, text messages, contacts and file storage, and sends all that information to Argentina for a week or so until their app gets banned.

    Also, the most likely person to hack your phone seems to be someone in your household, abusive parent or spouse sorta thing. Most common devices to get hacked are laptops, usually windows. Its just kinda hard to hack a phone. Unless you know a lot about compressed image formats and the iPhone messages app apparently because NSO made like 5 zero days in a row out of that.








  • There are definitely some VPN providers to worry about.

    VPNs are a security tool but they don’t protect people as much as they think. They hide DNS traffic your ISP would have received, so that your ISP can’t tell everyone which cuckold or affair site you access (except you probably forgot to turn the VPN on one time or another so…)

    Your ISP can still see IP addresses you connect to, they forward all your traffic [I need to proof read before I press post - this is just misinformation]. Good opsec is a nightmare. Ad blocking does more for less cost than getting a VPN will ever do (except for certain human rights circumstances but I’d wager they’re actually going to be careful).

    My personal tip is use DNS over HTTPS/TLS where possible, and don’t use Cloudflare or Google. Add an ad blocker and it’s far easier to setup and way more cost effective than VPN.


  • I’ve got no experience with it but at first glance it seems like a very positive direction for the project:

    Collaborate, not Compete

    We are proud of our community and closely interact with projects around it. If we build a platform feature that can be useful in an upstream project, we prefer to contribute it to that project, rather than keep it in the platform.

    You don’t hear that often enough these days, everyone seems to be siloing information.








  • Yeah look that was the front page of the repo talking about how it has C/C++ and Fortran code, sorry for not reading the docs and finding out that yes they still use C/C++ and Fortran code in the form of OpenBLAS which is a dependency… f2py is just a method of doing the following:

    F2PY facilitates creating/building native Python C/API extension modules that make it possible

    • to call Fortran 77/90/95 external subroutines and >Fortran 90/95 module subroutines as well as C functions;

    • to access Fortran 77 COMMON blocks and Fortran 90/95 module data, including allocatable arrays

    from Python.

    Correct me if I’m wrong here but if you’re implementing an api for one programming language to talk to another then that means you have 2 programm-

    I wake up as a lizard. The meaning of kernels, subroutines and programming languages is already fading. I realise the rock I am lying on is slightly in a shadow and move into the sun. Might eat a bug later…