5
submitted 10 months ago by himazawa@infosec.pub to c/nixos@infosec.pub

Used nix last year but dropped it after home-manager decided to unlink the apps from the Applications directory.

How is the current situation on usability of nix-Darwin + home-manager + brew?

Packages still fails to get indexed correctly in spotlight? I really like a fully repro environment but the fact that the usu ability was low bothered me a lot.

[-] himazawa@infosec.pub 1 points 10 months ago

BG3 is unmatchable, not only for hogwarts legacy but for every other game.

Starfield on the other end.. is the same oblivion stuff but in 2023 and without 2023 capabilities

[-] himazawa@infosec.pub 1 points 11 months ago

Don’t expose anything from your local network to the internet (unless you want multiple new sysadmins in your house). Try tailscale instead.

1
submitted 11 months ago* (last edited 11 months ago) by himazawa@infosec.pub to c/ergomechkeyboards@lemmy.world

I am looking for a low profile keyboard compatible with the choc switches. I plan to put the choc sunset on it. I was looking for something similar to the Corne, just without the ergo-split thing. A standard 65-75% would work.

Bonus for hot swappable and no soldering required.

[-] himazawa@infosec.pub 0 points 11 months ago

I don't know why the author of the video didn't mention it but LockDown mode is really useful.

At least for me the default is lockdown mode on and appropriate exceptions for websites I trust.

[-] himazawa@infosec.pub 1 points 11 months ago* (last edited 11 months ago)

Perhaps images, video, font etc. rendering could be compromised?

Yes, it already happen in the past. Also the Wi-Fi and Bluetooth stack got exploited, like multiple kernel drivers.

But it shouldn't be a matter of "in the past was X exploited?" but more on having a correct security posture.

Honestly if you are arguing about wasting a "perfectly working phone" you should blame it on the vendor, especially Android devices vendors have this let's say "defect" of dropping the support after 4/5 years.

Also not going to talk about custom ROMs (with the super rare exclusion of some) managed by god knows who, without any security team behind.

Since even the NFC and Cellular Network stack got vulnerabilities the only way you would consider an old phone "safe" to use is just turning it into the equivalent of a local ARM server.

Also pretty fun seeing the replies in the original post talking about how Google Play store shouldn't have malware on it.

[-] himazawa@infosec.pub 6 points 11 months ago

Do anyone knows if it support local-only without joining the p2p network?

[-] himazawa@infosec.pub 1 points 1 year ago

I use the Inbox-Zero method

https://youtu.be/al1QXFQjq1s

So far no issues.

1
submitted 1 year ago* (last edited 1 year ago) by himazawa@infosec.pub to c/infosecpub@infosec.pub

What about setting the new language of a post to English? There are people that don’t know how lemmy works that keep on opening new posts and leaving the language to “Undetermined” by mistake so no one can answer them.

[-] himazawa@infosec.pub 1 points 1 year ago

Soon, people will join the strange and buggy world of YouTube alternative frontends

[-] himazawa@infosec.pub 1 points 1 year ago

Because I wanted to try if others URI schemas were supported instead of http / https. file:// was a valid one. Don't worry, the day an attempt of data exfil will happen, you will not see it though your console logs.

[-] himazawa@infosec.pub 11 points 1 year ago* (last edited 1 year ago)

Is this, by any chance, originated from the sub called ignore me? In that case is probably my bad because is set as the image of the channel. I was playing with lemmy in the previous version and forgot about it, sorry.

I created that channel to investigate why the lemmy instance was hanging every time there was a symbol in the URL, added that URI as icon for fun and forgot about it.

That alert appears because your browser is trying to load an image with that path, nothing dangerous or remotely exploitable, don't worry.

Edit: I removed it so you shouldn't see the alert anymore.

P.S. no, it's not trying to steal anything, it's your browser trying to load that file as an image but instead of being let's say this url: https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png (this sub icon) , it's this one file:///etc/passwd so you browser is doing the request to your own file. Don't worry, nothing got compromised.

/cc @shellsharks@infosec.pub

1

himazawa

joined 1 year ago
MODERATOR OF