Then provide better streaming options including price and service. Piracy will always win whether they like it or not.
I’m surprised Netflix is still around at their price rate and the way they keep canceling shows. I jumped on the BF deal for Peacock, because I wasn’t gonna pay the full price.
I only have Peacock for WWE, so everything is a bonus. But not everybody is gonna pay for 7 services monthly or yearly. Either put it all under one service or understand some of us are gonna pirate.
Amazon prime is gonna start having ads this month, so people are gonna have to pay more for ad free on top of prime membership or pirate to avoid ads. Before we know, they’ll start putting ads in games while they load.
They have failed one of their code jobs: validating advertisements are legitimate. I don't know why any legitimate company would advertise with google as you get associated with the scams they allow on their ad platform.
As its name suggests, LogoFAIL involves logos, specifically those of the hardware seller that are displayed on the device screen early in the boot process, while the UEFI is still running. Image parsers in UEFIs from all three major IBVs are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now. By replacing the legitimate logo images with identical-looking ones that have been specially crafted to exploit these bugs, LogoFAIL makes it possible to execute malicious code at the most sensitive stage of the boot process, which is known as DXE, short for Driver Execution Environment.
So, does disabling the boot logo prevent the attack, or would it only make the attack obvious?
Not necessarily, I guess. They’re talking about a firmware upgrade of sorts, and, at least on the machines I own(ed), performing it didn’t reset user settings (which disabling the logo is)
At first I was like WTF but actually it makes sense. A screen showing an error code is much better than a hard reset, blinking cursor, kernel panic, or just black screen you usually get when something bad happens on linux.
As far as I understand it, the studios are trying a different angle: They are not suing Reddit this time, but an ISP and want Reddit to provide the data of costumers of that ISP.
Stupid question: What’s the point behind this? Is this actually financially viable for a company in the long run? Was this an attempt to get Reddit to crack down on those subs?
Isn’t this always a fight against windmills? i.e., you can’t fight a symptom without addressing the market as a whole?
I think this was related to their plan before, in the case that got decided (specifically that Reddit didn’t have to reveal the IP addies of its clients), but that’s always been a problem especially if an ip address leads to a router or is dynamic at the ISP, then there’s no certainty it can be identified with a single person.
This is how the whole twelve-strikes program was formed where big name ISPs would (hypothetically) give demerits and eventually throttle or disconnect ISP addies that were identified as engaging in infringing activity. The problem is, clients stopped wanting to pay their bills when quality deteriorated, so it’s not consistently enforced. In fact, companies that are not Comcast or Xfinity are motivated not to do anything beyond threats.
ETA: Similarly, it’s actually to the benefit of social media websites to preserve the privacy of their clients, since incidents in which they cooperate with law enforcement reduces engagement. Google used to have a robust legal resistance to giving away personal data. It was deteriorated through enshittification, but now Google has lost enough reputation that it’s looking for ways to preserve privacy, like the new effort to constrain personal map data to devices, so Google is unable to respond to location dragnet warrants. They’re still in trouble for search-term warrants.
(Note the map thing is not yet rolled out, so don’t use Google maps when burying your bodies.)
It is crazy how in a country where everyone sues everyone all the time things like that happen. I had assumed that such a system would lead to a more robust system where every manager to ceo is vetting their business against these problems to not get sued. Apparently the liberal system of suing anyone all the time does not at all replaces a governmental body that defines strong consumer protection rights. Reading this, Turbotax and Wells Fargo News teaches me that a suing society is not cleansing itself from predatory behaviour.
Here is a list of the top 5 most litigious countries by capita: 1. Germany: 123.2/1,000 2. Sweden: 111.2/1,000 3. Israel: 96.8/1,000 4. Austria: 95.9/1,000 5. U.S.: 74.5/1,000. The Top 10 also includes the UK (64.4); Denmark (62.5); Hungary (52.4); Portugal (40.7); and France (40.3).
As you can see, the risk of lawsuits in the U.S. is less than in Germany, Sweden, Israel, and Austria, and not much greater than the other countries listed in the top 10. Simply stated, Americans are not as litigious as many believe. While the large verdict against McDonalds for serving hot coffee received enormous publicity, that judgment was significantly reduced on appeal and the plaintiff spent the left of her life being ridiculed.
Hasn’t Steam just beat its record of simultaneously online users? And while I’m sure Steam Decks contributed to this, we’re taking of numbers an order of magnitude bigger. Hell, PC gaming is doing so well that we’re seeing until then console exclusive games come out on Steam.
I think the problem is that it’s super popular for those who already own a PC and have a huge Steam Library. I got console friends wanting a Steam Deck but ultimately don’t want to buy one because it means rebuying their games.
So you need an MitM situation to even be able to perfom the attack, and the the attack on works on two ciphers? The article says those ciphers are commonly enabled, but are they default or used in relatively modern distributed versions of openssh?
A scan performed by the researchers found that 77 percent of SSH servers exposed to the Internet support at least one of the vulnerable encryption modes, while 57 percent of them list a vulnerable encryption mode as the preferred choice.
That means a client could negotiate one or the other on more than half of all internets exposed openssh daemons.
I haven’t got too whizzed up over this, yet, because I have no ssh daemons exposed without a VPN outer wrapper. However it does look nasty.
To expand on this. If you are talking about anything online it is not private. That doesn’t matter if it’s in a WhatsApp chat, a telegram chat, a Lemmy post, a Facebook feed, etc. as soon as it hits a computer if someone wants to see it they will. There’s just hurdles to get it.
Depends what and how you do it. VPN gives some level of anonymity. TOR even more so. These give you probably greater anonymity than anything else you have in offline live.
Few things more fun than telling people who harp about vaccines being tracking chips that if they’re worried about tracking they should ditch their smartphone, and watching them rage.
You mean the always-on GPS-enabled internet-connected microphone and camera which is also likely Bluetooth and NFC beaconing and contains all of my most personal data including my name, contacts, unencrypted chats facilitated by major cell phone carriers, photos, emails, and other personal files which are also likely synced with a cloud service operated by major multi-national corporations, and also stores biometric data such as facial recognition, fingerprints, time spent sleeping, and even heart rate and number of steps taken assuming you have “fitness” features enabled?
With those last couple items, these massive companies that regularly share data with law enforcement are literally tracking your every step and nearly every beat of your heart.
Well don’t worry about that, I’ve got Express VPN.
Detectives were able to run relatively simple tests to determine that the file had last been saved by a user named “Dennis,” and it had been printed using one of the printers at the nearby Christ Lutheran Church.
Maybe the article is badly worded, but it seems like they got metadata from the file, not the floppy disk itself.
I’m not sure that this is how it works in practice, but ideally: Unless you are registered in their stance / are browsing directly in their website, your client shouldn’t be making any direct requisitions to their instance, so there is nothing they can infer your IP from. (Everything you interact with is comes directly your instance - the only thing that interacts with other instances is the server) That said, it’s possible for some links to direct to the original stance, in which case your client will have to make requests directly to the original instance hosting the content… looking around in this page a bit, it looks like the Community images (banner, icon etc.) are linking directly to the original instance, so I guess that’s a little bit of a problem - but just that shouldn’t be enough information for them to connect the dots between the IP address fetching the image and the account you’re using to browse
Yup. About 7 years ago I used to darkweb pretty hard in the drug scene (I haven’t in years so have at it, Mr. FBI).
Anyway I used Reddit subs a lot for info on new markets and onions, reliable sellers, and news on exit scams etc, but I only lurked - never commented. Anyone with a brain in their head knew they were honeypots.
arstechnica.com
Top