@doctorn@r.nf
@doctorn@r.nf avatar

doctorn

@doctorn@r.nf

Check out cVn! cryptovision.liveWhere you can watch user-sourced pre-listed synchronized youtube videos while earning some XNO (Nano) for it, or queue your own youtube video of choice to the list for some crypto-dust, all while chatting in a chatroom with the rest of the viewing community.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

doctorn, (edited )
@doctorn@r.nf avatar

Y’all should try Ingress. 😅 Doesn’t really have fog of war, but you do get to visit art in search of portals for portal-keys. 😜

It’s the company that made Pokemon Go’s more-serious first app that came out years before P-Go did, as one of the first of its kind, though it only got interest from the more niche communities. I played it until G+ got slaughtered, as it was the main base of communications and Ingress communities.

doctorn, (edited )
@doctorn@r.nf avatar

Humans…

Can agree over a universal charging cable, but not over simple math rules…

doctorn, (edited )
@doctorn@r.nf avatar

Everytime I pass this meme, my mind auto-ignores it cause it’s been brainwashed to automatically think it’s an embedded ad. 😅

This just shows how I still need to get used to the fact Lemmy doesn’t do that and and that this image is actually well made. Kudos! 😅

doctorn,
@doctorn@r.nf avatar

If I could find a good Peertube instance, I’d take it upon myself to reupload everything I like there. I collect the 1080p(60h if available) clips locally for Kodi anyway…

doctorn,
@doctorn@r.nf avatar

Oh boy, can’t wait to see if the commenter upvoted my reply for the effort.

On TikTok, the war in Gaza is a game (english.elpais.com)

One of the TikTok trends is to show the process of loading a projectile into a tank and firing it. Another is to put trance music to a video, along with the words “2-3, sha-ger.” This is the order that a military drone operator is given to drop a bomb, with the syllables separated so that the message is clear. The trend...

doctorn,
@doctorn@r.nf avatar

I suppose this is not the place to post memes about it right now… 😅

doctorn,
@doctorn@r.nf avatar

All conspiracies come true if you spread them and wait long enough… Eventually some crazy rich guy will have heard it and make it real. 😅

Humans are weird. 😅

Switching to Debian on my gaming pc

Hello everyone - I have been wanting to ditch windows on my gaming pc for a while now, and since I have recently finished a large project, I now have the free time to switch. I am relatively comfortable with Debian having used it for a while on my web server as well as school laptop, but I am concerned about using it on my...

doctorn,
@doctorn@r.nf avatar

Last time I tried this myself I could play a lot, but never the ones I wanted and ended up switching back anyway. Ever since I’ve just always been running a linux and a windows PC, each to its best use.

I must stress however this experience of mine was over a decade ago and I have heard there’s been a lot of improvement on the subject, with steamdeck becoming a thing and alike, so I have no up-to-date experience in what runs and what doesn’t anymore. What I cán tell you however is that whichever Windows-only game did play (using Wine back then, dunno how it’s done these days) always played at least 2-5x better than on the actual Windows it was made for. 😅

So good luck and I would love some information as to your eventual result!

doctorn,
@doctorn@r.nf avatar

So for any supposedly malicious activity (infected) it wants to do, it just has to hold until you save and give admin access? 😅

doctorn, (edited )
@doctorn@r.nf avatar

But, in that example:

If I’m the admin it doesn’t matter I use it.

If I’m not it’s not my problem that I could get more privileges than allowed. I’d probably even use the possibility then. 😅

So it poses a risk if you allow none-admin users to do that on your system, but I still don’t see why I must choose to not use nano as root myself. 😅

Anyway, good practice to me is ease-of-use instead of with 7 protections against things that rarely happen.

Like, I’m pretty sure you are better protected from burglars if you also lock all doors inside your house, but I’m definitely not doing that either. 😅

Edit: Also, if you have users on your system, just chroot/vroot/lxc them, so they be free to ‘sudo nano’ too… 😅

doctorn,
@doctorn@r.nf avatar

Wouldn’t that logic count for anything, including sudo itself?

doctorn,
@doctorn@r.nf avatar

Indeed… Hence why I use ‘sudo nano’. 😜

doctorn,
@doctorn@r.nf avatar

You assume this malicious code is lame enough not to gain root itself with a modified su.

doctorn, (edited )
@doctorn@r.nf avatar

I appreciate all the answers on what started out to mostly be a joke (the first comment, I’m not saying the rest was, I actually do mean my follow-up discussions and am enjoying them more than I should). 😅

Anyway, first I must disagree with sudo being useless in a single-user environment since some services have non-user (nologin) accounts as which you still need to run things sometimes, so sudo is commonly useful in single-user environments (though you could technically go set bash for those, I suppose.)

But yeah, I’m already used to “bad practices” as I have been using linux for 24 years now (when it still was it’s predecessor ‘pico’ 😅) (I said over ‘10’ years in an earlier comment, but I just realized I’m 40 and still calculated from 30. 😂 Wishful thinking. 😅) in what is assumed a bad practice, not only without any problems, but even because it never gave me problems.

Might be an age thing too, but I hold on to ease of use over best-practice, especially if it hasn’t failed me in two decades and a half. I think it would take an actual attack on me abusing this behavior for me to stop doing it by now… And even then, I installed linux so many times in my life, even that seems more musclememory and not such a hassle anymore… 😅 At least I could make use of my backup system for once then… 😅

doctorn, (edited )
@doctorn@r.nf avatar

Any attack is usually non-intended vulnarabilities. Same argument applies to any software, like nano, if it can open doors to your system.

doctorn,
@doctorn@r.nf avatar

Yeah, well, as you said: it’s probably fixed by now, but I used to have a universal su that would work on any armv7 linux (so basically every phone back then, but also on my armv7 little laptop I had at the time…) with which I was able to easily root any phone by putting it in /data/local and making it bootable, then using full path to move any Android root files in place (though I did also just copy that su itself to /system/bin for root on cheaper phones sometimes, which is just playing with fire as it basically makes any root action unseen and allowed. 😂). That did work for years though, but that’s probably cause Android minimizes the linux and never actually updated the kernel so much, and the laptop’s flashed OS was something altered with also very little updates. And ARM was still quite new to the public too. 🤷‍♂️

I remember I came across it in the rooting package for my Kindle Fire and only found out it could do that by accident,… 😅 It couldn’t change user, though, it had only 1 use without parameters, which resulted as if you do a ‘sudo su’ if you remove the sudo password-requirement.

Hence why I used the example. I wasn’t being limitative to it, though. There’s so many things that could screw you if it has a vulnerability, if it happens I very much doubt it’ll be through nano, though.

doctorn,
@doctorn@r.nf avatar

Yep, as opposed to algea’s none.

doctorn,
@doctorn@r.nf avatar

I might have eyed over some parts as it’s lengthy and I have little time rn, but that seems to mostly agree with what I said?

doctorn,
@doctorn@r.nf avatar

Oh, so thát’s what ‘cat’ does!

doctorn, (edited )
@doctorn@r.nf avatar

That news header and picture is actually more hilarious than the comment. 😂

I can’t help but wonder how many extra minutes the photographer was taking to take the best picture before telling the poor guy. 😂

Edit: Until I noticed the topic only after posting this. 😂

What's the deal with the private trackers?

I’ve read on reddit I think that if you are torrenting using a private tracker you’re gonna be fine even without VPN. The question is: isn’t the tracker is just a server that leads my torrent client to the pieces of the file on the seeders? And the connection between me and the seeders is p2p, isn’t that type of...

doctorn,
@doctorn@r.nf avatar

Just a fun FYI: If you want to know what can be seen torrenting from your current IP, visit iknowwhatyoudownload.com

It wil show you anything publicly trackable and occasionally assign tags according to your habits. You can also check anybody else’s IP you know of too, and look at what your IP-neighbors have on their name,…

Tags I’ve seen assigned are mostly ‘Porn’ if you torrent at least 1 known xxx and I even encountered a highlighted differently-colored tag twice in neigboring IP’s that clearly state it’s questionable content of subjects that did not go through the accepted minimum amount of birthdays yet.

Always an interesting tool to check when connected to a friend’s wifi or a public shared one… 😅

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #