The amount of advertising for this tool in recent times is starting to look a lot like astroturfing.
The amount of advertising for this tool in recent times is starting to look a lot like astroturfing.
spinning around Earth in a horseshoe shape for about two months
what? what kind of orbit is that?
Not my post btw, just sharing the link :)
Sorry for the reddit link, I don’t know of a mirror. This was posted just today, running on an EeePC:
So your approach to security is that you cross your fingers and hope?
Ventoy has a lot of work to do if they want to earn our trust:
Remove BLOBs from the source tree #2795
This ticket has been open now for 5 months with no engagement from the maintainer.
Your install media and anything that modifies your EFI partition or UEFI firmware settings needs to be the most trusted part of your system. And here is Ventoy, a tool that looks open source and then includes a large number of binary blobs in its repository, with no indication of how they were compiled. This is horrible security practice and for me that’s enough for me to never use it.
You can also see a discussion on the subject on HN here: https://news.ycombinator.com/item?id=40689629
A much better alternative, if you want a multi-boot USB, is GLIM: https://github.com/thias/glim
It’s just a collection of Grub configs, so very simple and easy to audit.
From my understanding, a lot of code in the graphics drivers is special-case handling for specific games to optimize for the way that the game uses the APIs. Is this correct?
In which case it would make sense to have the game-specific code loaded dynamically when that game is launched, since 99.99% of the game specific code will be for games that the user never runs.
I used Ubuntu from version 8.04 to 18.04 and not once did I have a successful upgrade between major versions. There is always something that gets broken to the point that a reinstall is necessary.
That’s a huge difference, the estimate became 10,000 times smaller.
(Federated) email didn’t survive. It got completely subsumed by the major providers who now have control over everything email related. It’s now impossible to run your own email server since none of the major providers will deliver your email without your mail server having first built a reputation.
The fediverse analogy would be if 99.9999% of users were on Threads and you couldn’t interact with any of those users from any of the small independent fediverse servers. Frankly, that’s exactly what it looks like is happening.
Got a link to that?
Can’t wait to read about it telling someone to put glue on pizza.
It’s not reading the contents of RAM via EM emanations, it’s using the EM emanations caused by certain memory access patterns as a side channel to exfiltrate data. Of course, that data could be anything, including whatever is in RAM, but the point is that you need to be running the code that generates the necessary memory access patterns to transmit the bits of data. This is not like TEMPEST where you can reconstruct a video display just using the emanations.
Thanks! I was racking my brain trying to think of where I knew it from, and after seeing the page that you linked I’m almost certain that it’s After Burner that is causing my brain to trigger the 80s association.
You can tell just from the font that this book is from the 80s
She’s a great chess player but she’s never been a World Champion. There’s no need to embelish her story. She’s currently training to become a surgeon at University of Missouri School of Medicine.
Is there something significant about this release, or are we just going to have a post every time every piece of software releases a new version?
Discussed yesterday in !opensource@lemmy.ml:
Ventoy source code contains some unknown BLOBs, still no word on the issue from the dev after months