Giver of skulls

Verified icon

  • 6 Posts
  • 1.62K Comments
Joined 101 years ago
cake
Cake day: June 6th, 1923

help-circle

  • Your lack of control over the security of your phone is exactly what’s keeping the bad guys out. The extra control you have over your computer is what leads to people getting scammed out of their life savings. Perhaps you’re an expert in fraud detection or banking trojan analysis, but 99.9% of the population doesn’t have that knowledge, and that’s who the apps are built for.

    Phones and tablets have either dedicated hardware or super low level software that runs alongside the other software to do secure computing. These features are used to detect if the device’s operating system has been altered in any way.

    Without alterations, the bank can trust that its security code will execute as intended, and that nothing can spy on your connection or steal your money. If your phone has been rooted or jailbroken, that’s no longer the case. Some banks (like mine) don’t really care. Others will disable certain features or refuse to work. Many rooted phones are rooted without the owner’s knowledge by malware, so these concerns are legit.

    On PC, there are very few ways to get the same level of trust. In theory, Windows with Secure Boot cranked up and a signed TPM can be trusted (using security mechanisms such as Windows Hello to authenticate using the TPM as dedicated security hardware). In practice, this is all very recent and because Windows allows arbitrary drivers to be loaded, the guarantees are much weaker.

    Furthermore, phone apps are sandboxed. They can’t interact with each other beyond a few predefined APIs, they’re basically stuck in their own, separate sandbox, doing whatever they like, never crossing boundaries. PC software isn’t like that most of the time. Even if they are (i.e Windows UWP applications, Flatpak apps), other software may be running outside of the sandboxed environment making it impossible for a sandboxed app to protect itself.

    Phones aren’t hacked as often as PCs, broadly speaking. That’s why iOS lacks antivirus protections and Android only has very weak ones. It’s also why many banking apps lack MFA on mobile devices.

    As for your MacBook, your bank could probably make its authentication app work on your laptop, as Apple has very similar security APIs to the ones on iOS. Apple has a porting toolkit that will likely be able to run the iOS app directly on your MacBook, in fact! However, they would also need to ensure that you don’t break the MFA principle by logging in in a browser running alongside their app. And, let’s be honest, most people would do exactly that.





  • Many fairy tales are. Especially the oldest. Some of them have direct references to historic people. This is what I got out of the story:

    I think the sausage is supposed to be the rich class, safely hidden away, in a life of luxury, having others do most of her work. Leaving the safety of their own land without protection was no safe task for many nobles, especially with warring nobles around waiting for a chance to seize more power. With an excuse, the dog took out their neighbouring queen and left society to crumble.

    The mouse may be an allegory for the church (as the church, nobility, and the laymen were often grouped together). Though the sausage clearly had an easy life, the mouse had control in the end, and could be persuaded by the bird (the common people doing the hardest work). The second bird was a (foreign?) revolutionary, infecting the bird’s mind with dangerous ideas.

    In other words: stay in your lane, just do your chores, and everyone is better off. Start shit and society will collapse, and everyone will suffer. Probably written by someone well off.


  • Threadly reminder that “German fairy tales” were as much for adults’ entertainment as they were for kids. Just because a story has a moral, doesn’t mean it’s intended for toddlers

    It’s kind of the old school “cartoons are for children” vibe of stories. Don’t let the evil mouse corporation trick you into believing fairy tales always have a happy ending!



  • And then, as I’ve heard reported in several European countries, when they notice your broken grammar they switch to English for both of your conveniences. Caught myself doing that to some poor student a while back because I was in a hurry and couldn’t parse what they were trying to say.

    And then there’s the other language students, who studied very very well and now sounds like the voice of a kids’ TV show with their perfect “standard” pronunciation. I love seeing immigrants who were so dedicated to their language skills that they end up speaking the local language way better than any local you’ll meet. Sometimes it’s difficult too, because random words won’t have been part of their vocabulary training and they end up talking in-depth about the geopolitical landscape but don’t know what “backyard” means.

    Learning languages is cool, if only I had the patience to do it.



  • Administrator is not root. NT AUTHORIRY\System probably comes closest. You rarely need to interact with that account because Window’s security system doesn’t have the same mix of authentication systems most Linux systems have (users + container APIs + PolKit).

    Windows also supports mixed case filesystems just fine. It’s not the default, so your programs will probably screw up, but it’s just a flag. You can also mount filesystems like ext4 and btrfs on Windows (though booting from them doesn’t really work).

    Also, Windows runs Libreoffice and GIMP just fine. You don’t need to, because you have better sofware available (pirated or paid).

    As for security, Windows is MUCH better unless you’re a cybersecurity specialist with too much time in their hands. Most major distros don’t even come with a firewall enabled by default, let alone a firewall for outgoing traffic. And the best AV I’ve seen for Linux is Microsoft’s enterprise version of Windows defender. In terms of hacking tools, they’re mostly written in languages Python, most of them work on either platform.

    For development, Linux has a slight edge, but with WSL2 it really doesn’t matter much.


  • Running Linux on computers with Nvidia hardware proves that Linux and Windows both have their problems dealing with device drivers. Linux’ benefit is that is has higher standards because the kernel devs need to sign off on driver, but that has downsides of turning away potential driver developers (as getting your code into Linux is a quite a complex thing just on its own). Linux also doesn’t have many drivers in general it seems, unless your device has some kind of generic fallback that disables any special features.

    My kernel panics generally don’t display anything, the display just freezes and I need to force reboot the computer.






  • Votes federate, but only for communities followed. I won’t see your votes in a community that I don’t follow, but I can see when you upvoted or downvoted what post in the community.

    A scraper could simply follow every community on a Lemmy server and, barring Lemmy performance issues, will receive all comments and votes.

    Just a quick and dirty SQL query of which votes of yours are in my server’s database:

    select comment_like.score as score,comment_like.published as when, person.actor_id as who, comment.ap_id as what from comment_like join person on person.id = comment_like.person_id join comment on comment.id = comment_like.comment_id where person.actor_id = 'https://lemmy.ml/u/GolfNovemberUniform' order by comment_like.published desc; 
    

    The same info is also available for posts, of course, I just didn’t want to bother making the query any longer.

    Server admins/mods on Lemmy also have a button to see who upvoted and downvoted each post. This is just the inverse of that.