@Squire1039@lemm.ee avatar

Squire1039

@Squire1039@lemm.ee

This profile is from a federated server and may be incomplete. View on remote instance

Squire1039 ,
@Squire1039@lemm.ee avatar

The guy in the back looks like he's sniffing.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

I wouldn't know about the speed bump. They are dumping the water on the ice to refreeze it, though.

Squire1039 ,
@Squire1039@lemm.ee avatar

VirusTotal doesn't indicate keepassxc.exe 2.7.7 contacts this address. I'd be careful. Check the binaries' signatures. Try a full install to see if that behaves differently.

keppassxc.exe: https://www.virustotal.com/gui/file/fea4df5024f83155f6742a3372a801fc6cc97ed82627b36fce6f0caed54506cf/relations

KeePassXC-2.7.7-Win64.msi: https://www.virustotal.com/gui/file/9c3dab957db0f769c4e67bfdf4f0134a65ecfa65c5569718a36aa88e649158cd

Squire1039 ,
@Squire1039@lemm.ee avatar

140.82.121.5

Well, apparently, this is an A record for api.github.com. This name resolves to a different IP around the globe. See https://www.whatsmydns.net/#A/api.github.com

The IP is detected as "clean" on VirusTotal: https://www.virustotal.com/gui/ip-address/140.82.121.5/detection , although apparently (probably not surprising as it is github) is also a favorite address for everything including malware.

Maybe you can ask in the keepassxc discussion forum on github.

Squire1039 ,
@Squire1039@lemm.ee avatar

The canon is used to induce a radical evasive movement. Probably need lots of airbags. Looks awesome, though; would have loved it as a toy car.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

... officials had opened a fraud investigation against the man, confirming 130 vaccinations over nine month... The man then reported an additional 87 vaccinations to the researchers, which in total included eight different vaccine formulations, including updated boosters.

Study Links High-Refined Carb Breakfast to Lower Perceived Attractiveness Rating ( www.theguardian.com )

A French study found people who eat a breakfast high in refined carbs (like pastries and juice) were rated less attractive than those who ate whole grains (like wholemeal toast) for breakfast. This might be because refined carbs affect blood sugar and insulin, potentially impacting skin health and sex hormones. The researchers...

Squire1039 OP ,
@Squire1039@lemm.ee avatar

Maybe you oughta try adding different ingredients to it and experiment. Make it scientific.

Squire1039 ,
@Squire1039@lemm.ee avatar

Chocolate chip-shrimp cookies with dip... yum...

Squire1039 ,
@Squire1039@lemm.ee avatar

It's like saying, if you can't figure this out, you aren't worth the one extra dog you have, please give it away.

Squire1039 ,
@Squire1039@lemm.ee avatar

I am somewhat reluctant to say it, but if you get into a top-branded school, it will absolutely help you as it will open doors that otherwise would be closed. People will look at you differently, expect from your differently, and you'll expect from yourself differently.

OTH, look at Bill Gate, Steve Job, Michael Dell, etc.; extraordinary people will be extraordinary given the right circumstances, ideas, and perseverance.

Squire1039 ,
@Squire1039@lemm.ee avatar

Spoofing a number means they can call somebody and appears as calling from your number. In order to receive SMS or call made to your number, they would have to hijack your SIM, typically convincing your telecom provider to transfer your phone info over to theirs.

In the US, someone knowing your full name and phone number is commonplace. There is no wide-spead havoc because of this. Someone who wants to harm you would really have to be motivated to get more information from the info you gave them. This is obviously possible because of wide-spread data leaks, but does your emissary have the perseverance and the knowledge to do this?

Squire1039 ,
@Squire1039@lemm.ee avatar

Have I been pawned is really nice, but only includes confirmed data leaks. If you use other services like Google or Malwarebyte, they will tell you more leaks. I was involved with the MoveIt data leak from a financial institution recently, which basically leaked all the information that possibly can be partly/wholely used for identity theft. This didn't show up in HIBP. Fidelity Financial Life Insurance just leaked enough info via Infosys for another 30,000 customers with enough data for identity thefts recently.

In the US, it seems if somebody is able financially to aggregate all these sensitive data leaks, they probably can cause havocs to many people. These info often come from financial institutions, which you can't totally withhold or lie about your personal information.

Squire1039 ,
@Squire1039@lemm.ee avatar

I can't wait until they start delivering packages with humanoid robots... They could spike up Halloween.

UK Trial: Pornhub's Chatbot Halts Millions from Accessing Child Abuse Content ( www.wired.com )

A trial program conducted by Pornhub in collaboration with UK-based child protection organizations aimed to deter users from searching for child abuse material (CSAM) on its website. Whenever CSAM-related terms were searched, a warning message and a chatbot appeared, directing users to support services. The trial reported a...

Squire1039 OP ,
@Squire1039@lemm.ee avatar

The MLs have been shown to be extraordinarily good at statistically guessing your words. The words covered are probably comprehensive.

Squire1039 ,
@Squire1039@lemm.ee avatar

Apparently a common experience with no apparent satisfactory solutions to everybody involved.

Scientists Observe First Instance of Solo Orca Hunting Great White Shark ( www.bbc.com )

A rare event was documented: a single killer whale, or orca, successfully hunted and killed a juvenile great white shark. This "astonishing" attack, filmed in 2023, showcased the orca's exceptional predatory skills. It's the first recorded instance of a solo orca hunting a great white, highlighting the animal's adaptability and...

Green Alley Award Celebrates Decade of Circular Economy Innovation: Recognizing Startups Turning Waste into Resources ( www.positive.news )

The Green Alley Award is celebrating its 10th anniversary. It's a European award that recognizes and supports startups focused on the circular economy, aiming to reduce waste and resource consumption....

HDMI Forum to AMD: No, you can’t make an open source HDMI 2.1 driver | Linux users can't hit the same resolutions and speeds as Windows—or DisplayPort. ( arstechnica.com )

HDMI Forum to AMD: No, you can’t make an open source HDMI 2.1 driver | Linux users can't hit the same resolutions and speeds as Windows—or DisplayPort.::Linux users can't hit the same resolutions and speeds as Windows—or DisplayPort.

Squire1039 ,
@Squire1039@lemm.ee avatar

A speculation, https://www.phoronix.com/news/HDMI-2.1-OSS-Rejected, about HDCP, i.e. not exposing technical details as to prevent video copying, was offered.

Cutout.Pro, an AI-powered visual design platform, leaked 20M records, including email and IP addresses, names and salted MD5 password hashes, which have then been broadly distributed. ( haveibeenpwned.com )

Haha, brand new company with MD5 password hashes. Maybe they oughta consult about securities with their/other AIs more often. Hopefully, nobody did anything naughty on the site....

Late Actor Matthew Perry's Twitter Hacked: Fake Charity Plea Targets Fans with Cryptocurrency Scam ( www.bitdefender.com )

Scammers hacked the late actor Matthew Perry's Twitter account and posted a fake plea for cryptocurrency donations in the name of his foundation. The foundation confirmed the post was a scam and urged people not to donate....

Squire1039 OP ,
@Squire1039@lemm.ee avatar

I agree with you. The article give a good warning about downloading applications in general, but hand-wave how they escalated from "file/photo" access to capturing your data. The recent Anatsa malware's details seem to imply accessibility service. This is a Thread Fabric article about Anatsa malware: https://www.threatfabric.com/blogs/anatsa-trojan-returns-targeting-europe-and-expanding-its-reach

Squire1039 OP ,
@Squire1039@lemm.ee avatar

Yeah, the app data are separated and inaccessible, unless specified by the developer. Accessibility service is a separate permission, and should almost never be asked or granted, where as file/photo accesses are more common.

Squire1039 ,
@Squire1039@lemm.ee avatar

both

Town-square when they lure you in, they own everything when they sell you ass off.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

No dirty thoughts! No dirty thoughts!

Squire1039 OP ,
@Squire1039@lemm.ee avatar

From the project's page:

The wearable system captures peripheral neural signals when internal speech articulators are volitionally and neurologically activated, during a user's internal articulation of words.

It doesn't capture the central signal, but peripheral, most likely from the nerves running around your face and your neck used to produce speech.

https://static.greatbigcanvas.com/images/singlecanvas_thick_none/jrl-group/nerves-of-head-and-neck-lateral-view-nervous-system,2279887.jpg

  • All
  • Subscribed
  • Moderated
  • Favorites
  • supersentai
  • pixo
  • Rutgers
  • Lexington
  • cragsand
  • mead
  • RetroGamingNetwork
  • WarhammerFantasy
  • jeremy
  • xyz
  • PowerRangers
  • AnarchoCapitalism
  • WatchParties
  • kamenrider
  • space_engine
  • bjj
  • loren
  • neondivide
  • itdept
  • MidnightClan
  • AgeRegression
  • learnviet
  • mauerstrassenwetten
  • steinbach
  • Teensy
  • khanate
  • electropalaeography
  • Mordhau
  • All magazines