• 0 Posts
  • 33 Comments
Joined 1 year ago
cake
Cake day: August 6th, 2023

help-circle


  • data such as host name,

    Okay why do they need to know that? Why do they need to know if the computer is called “Melissa’s Laptop” or “Workstation 15, Internal security division”? Seems like this kind of data could if stolen be misused and it has minimal legitimate purpose IMO as anyone can put anything as host name and while in organizations it often corresponds to use it doesn’t have to for individuals. Someone could call their machine “Mack’s Porn Rig” and they only use it for doing banking and a little coding.

    kernel version, desktop component versions, detailed information about hardware and drivers involved, screen size and resolution information,

    This all seems legitimate enough, this would be helpful for understanding the hardware their users run on and targeting features or bug fixes.

    network device MAC addresses,

    Not great but there is an argument for it, they could just grab and send the first 3-4 octets which would give them the info they need on manufacturers without getting uniquely identifiable data that along with some of this other stuff is concerning for fingerprinting.

    disk serial numbers,

    Okay, what the fuck. Why do they need disk serial numbers? What possible use is there for that. Those are used for warranty claims and could be used as part of uniquely fingerprinting a computer and person. Not cool.

    disk partition data,

    This is vague enough. I guess one could choose to see this as just info about partitions in use say if there’s also an NTFS partition that looks like a Windows install that would be useful but on the other hand data encompassed within a partition could also nefariously be read as allowing them access to all your data. Partition layout, partition labels, and file systems used on disks available to the system would be a clearer way to put this and erase any doubt.

    information about the number of running processes and installed packages, versions of basic packages such as systemd, gcc, bash and PipeWire.

    All this is also fine just technical data stuff.




  • Lot of cope and denial in these threads. Yes the same-day is probably a rosy estimate based off people using 6 digit codes or something easy to crack, doesn’t mean it’s false or that they can’t hypothetically target longer alpha-numeric passwords. For all we know they might not even be brute-forcing and could be conducting some sort of exploit that over time reveals the encryption keys themselves in some way.

    I’m still very curious about the nature of the mechanisms of action. I assume they manage to bypass the basic lock-out against entering too many passcodes too quickly somehow which is what enables this. If throttling could be properly enforced (to say nothing of something like 10 attempts and it refuses all future attempts and erases the key type of thing) this type of attack wouldn’t be practical for anyone using anything above a 6 digit numerical passcode in any reasonable timeframe. I wonder if they exploit wireless radios including cellular, wifi, bluetooth and force some code on the phones via these usually-on chips that enables this via exploiting problems in their architecture. Perhaps something that locks up, prevents functioning or resets certain checks via flooding parts of the hardware/software from these points of access. Or if it really is purely phy/log access to the lightning/usb-c port.



  • Politely agree to disagree and I’ll elaborate. Thanks for your input.

    LTH are all marked as such. MABL normal (non LTH) discs such as verbatim sells for less than half the cost of M-Discs have the same physical properties as M-Discs, the protective layers are the same, the recording methods are the same using the same materials. Therefore the longevity is the same or near the same without getting into M-Disc’s ridiculous marketing claims of 1000 years (when NIST and others agree the poly-acrylic protective layer would degrade and decompose after a century or two at most even in ideal circumstances).

    /r/Datahoarder has had this argument several times and the consensus so far seems to comes out to the fact that M-Discs were a DVD-era innovation that in the BD era offer no meaningful advantages in technologies.

    I’d rather have two BD’s from a reputable company like Verbatim (not fly by night plain white discount bulk BD’s from who knows where) from separate batches bought 6 months apart stored properly than rely on one overly expensive M-Disc that isn’t going to last any longer and probably isn’t made to meaningfully tighter tolerances.

    NIST only estimates the lifetime of M-Discs, real world abuse tests on BD’s (non LTH, should have mentioned that to be honest) show good endurance that far exceeds DVDs. It comes down to however burning it right and storing it right. A pile of M-Disc left in a window in your uninsulated garage year after year and burned at 16x are not on the whole going to be in a better state in 20 years than a pile of BD-R’s burned at 4x, stored in protective sleeves in a case in a temperature controlled, insulated environment. Add in having a back-up copy and the chances of total data failure on both primary and backup disc and you’re looking at better survivability. NIST numbers generally assume things like storage in archival quality environments such as old salt mines which are a controlled environment, low humidity, neither excessively hot or cool and not subject to shifts in temperature. Most people can’t store things in an environment like that and those who can usually have the finances for a better solution like multiple tape copies and/or continually updating and refreshing hashed/checksumed files and moving on a schedule to new better storage mediums (e.g. keeping files in a raid array in a plugged in NAS, checking for failures regularly, replacing disks and upgrading disks every 5-10 years one at a time).

    I wouldn’t trust any media not professionally stored in a purpose-built archival environment and with at least two copies to last more than 25 years without degradation or loss. Anyone trying to store stuff really long-term and cannot afford degradation or loss needs to have a plan to update their archival copies every 15 years or at least do an assessment that often and survey the options as well as the physical and ideally logical state of their chosen back-ups.



  • There is just no excuse for not even salting or SOMETHING to keep the secrets out of plaintext. The reason you don’t store in plaintext is because it can lead to even incidental collection. Say you have some software, perhaps spyware, perhaps it’s made by a major corporation so doesn’t get called that and it crawls around and happens to upload a copy of a full or portion of the file containing this info, now it’s been uploaded and compromised potentially not even by a malicious actor successfully gaining access to a machine but by poor practices.

    No it can’t stop a sophisticated malware specifically targeting Signal to steal credentials and gain access but it does mean casual malware that hasn’t taken the time out to write a module to do that is out of luck and increases the burden on attackers. No it won’t stop the NSA but it’s still something that it stops someone’s 17 year old niece who knows a little bit about computers but is no malware author from gaining access to your signal messages and account because she could watch a youtube video and follow along with simple tools.

    The claims Signal is an op or the runner is under a national security letter order to compromise it look more and more plausible in light of weird bad basic practices like this and their general hostility. I’ll still use it and it’s far from the worst looking thing out there but there’s something unshakably weird about the lead dev, their behavior and practices that can’t be written off as being merely a bit quirky.


  • I wish they would just push all the big mainstream porn sites to remove the most abusive misogynistic content rather than slapping these checks on everything.

    Also this will never be okay until there is a zero knowledge version that means neither the government, nor the sites, nor any other party can establish a given person’s habits which is probably not something they’ll ever do because tracking is probably part of the point.

    I’m not a fan of the easy access to porn that kids have or the proliferation of the industry in general but I am worried that as part of this harmless things like erotic roleplaying websites will be swept up as part of it and well I use those. And their point is not porn though some people host and share porn as part of it (which is why it’d get swept up with it eventually probably), it’s about writing, smutty, erotic writing. And I’d rather not have to tie my identity to my desires to roleplay out an elf who ends up making “friends” with the wolf-men tribe to my real life identity (I’m not claiming that’s something I do there but it’s an example of something that would be kind of embarrassing for others to know and it’s far from the weirdest stuff that goes on in places like that).

    Government having credits for how often I could say log in and continue a long-term erotic writing campaign with someone is just weird but that’s the end point of this kind of thing. Having credits seems not helpful anyways, the true porn addicts are just going to download stuff then share it in private forums, discords, p2p, etc. If the point is to stop kids from accessing this the credits thing seems odd.


  • M-Discs had merit in the DVD era. It’s a common refrain of those who don’t know the intricacies and read a wired article years ago to claim they mean anything in the Blu-ray era. They don’t.

    Standard Blu-ray Discs have all the technologies that supposedly make m-discs so long lasting and as far as media that isn’t continuously updated and hashed from live storage medium to live storage medium (cold, archival storage unpowered) they are about as good as you’ll get.

    They are much tougher than DVDs. Of course a variety of things go into how long a disc remains readable and without damage to data including luck with regards to no impurities in the batch. Even m-disc themselves based their longest claims off storage in ideal situations like an inactive salt mine (commonly used for archives by governments). Kept out of sun, away from extreme heat (including baking in uninsulated 120 degree F heat all summer year after year), away from high humidity and away from UV exposure to the data side of the disc as well as scratches and such and they should last a quarter to half a century, some more.

    In the Blu-ray era m-discs are just an overly expensive brand.



  • It should be considered illegal if it was used to harm/sexually abuse a child which in this case it was.

    Whether it should be classed as CSAM or something separate, I tend to think probably something separate as a revenge porn type law that still allows for distinguishing between this and say a girl whose uncle groomed and sexually abused her while filming it as while this is awful it can (and often does seem) be the product of foolish youth rather than the offender and those involved all being very sick, dangerous, and actually violent offending adult pedophiles victimizing children.

    Consider the following:

    1. Underage girl takes a picture of her own genitals, unfortunately classified as the unhelpful and harmful term “child porn” and she can be charged and registered as a sex offender but it’s not CSAM and -shouldn’t- be considered illegal material or a crime (though it is because the west has a vile fixation on puritanism which hurts survivors of childhood sexual trauma as well as adults).

    2. Underage girl takes a picture of her genitals and sends it to her boyfriend, again /shouldn’t/ be CSAM (unfortunately may be charged similarly), she consented and we can assume there wasn’t any unreasonable level of coercion. What it is unfortunately is bound by certain notions of puritanism that are very American.

    3. From 2, boyfriend shares it with other boys, now it’s potentially CSAM or at the least revenge porn of a child as she didn’t consent and it could be used to harm her but punishment has to be modulated with the fact the offender is likely a child himself and not fully able to comprehend his actions.

    4. Underage boy cuts out photo of underage girl he likes, only her face and head, glues it atop a picture of a naked porn actress, maybe a petite one and uses it for his own purposes in private. Not something I think should be classed as CSAM.

    5. Underage boy uses AI to do the same as above but more believably, again I think it’s kind of creepy but if he keeps it to himself and doesn’t show anyone or spread it around it’s just youthful weirdness though really he probably shouldn’t have easy access to those tools.

    6. Underage boy uses AI to do same as 4-5 but this time he spread it around, defaming the girl, she/her friends find out, people say mean things about her, she has to go to school with a bunch of people who are looking and pleasuring themselves to fake but realistic images of herself against her consent which is violating and makes one feel unsafe. Worse probably being bullied for it, mean things, called the s-word, etc.

    Kids are weird and do dumb things though unfortunately boys especially in our culture have a propensity to do things that hurt girls far more than the inverse to the point it’s not even really worth talking about girls being creepy or sexually abusive towards peer-aged boys in adolescence and young adulthood. To address this though you need to address patriarchy and misogyny on a cultural level, teach boys empathy and respect for girls and women and frankly do away with all this abusive pornography that’s super prevalent and popular which encourages and perpetuates abusive actions and mentalities towards women and girls, this will never happen in the US however because it’s structurally opposed to being able to do such a thing. Also couldn’t hurt to peel back the stigma and shame around sexuality and nudity in the US which stems from its reactionary Christian culture but again I don’t think that will ever happen in the US as it exists, not this century anyways.

    Obviously not getting into adults here as that doesn’t need to be discussed, it’s wrong plain and simple.

    Bottom line I think is companies need to be strongly compelled to quickly remove revenge-porn type stuff (regardless of the age of the victim though children can’t deal with this kind of thing as well as adults so the risk of suicide or other self-harm is much higher so it should be treated as higher priority) which this definitely is. It’s abusive and unacceptable and they should fear the credit card companies coming down on them hard and destroying them if they don’t aggressively remove it and ban it and report those sharing it. It should be driven off the clear-web once reported, there should be an image-hash data-set like that used for CSAM (but separate) for such things and major services should use it to stop the spread.


  • So first it’s client-side scanning for CSAM. Not without some nobility. But the problem is once you wedge open that door it’s technically possible to do it for other things and so you become compelled to.

    It’ll move from just CSAM to stopping and tracking “propaganda” as deemed by them which will be narrow-ish at first (anything pro-Russia, RT links, etc) but gradually expand over time to anything outside the mainstream branded as extremist (and guess what, privacy advocates will definitely fall within that label). And once that’s in place the private stake-holders, copyright holders will come knocking, they’ll say rightly so “hey you have the capability right now, we demand you implement client-side scanning to detect copyright violations” and then that will be ordered by a court, further enshrined by a law and oh look now you can no longer send political thought that the ruling regime disagrees with, can no longer surf the high seas, and so on and so forth. Congratulations and please enjoy living in the “garden” of Europe.




  • DVD’s max out at about 580p (for PAL, NTSC is 480p), resolutions are measured by the number of horizontal lines of pixels (counted from top to bottom of video/screen), not vertical which at 4:3 square aspect ratio on dvds does tend to be 720 pixels (by contrast full resolution HD video’s number of vertical lines is 1920 while it’s horizontal lines are of course 1080, hence 1080p). You’re not the first person to be confused by this.

    Professional encoders who fully understand the encoders and the schemes in use and care about not seeing artifacting or low quality would never intentionally go as low as 300mb for a feature length movie of even an hour. Yes there are people who do such things but they’re not well regarded and it won’t look even passable on anything larger than a phone screen.

    Recognized quality groups that seek low sizes might get an animated feature (less bitrate needed due to lack of fine detail in animation vs real film) in SD quality down to around that. But for most live action content the sizes I see from the best of the best concerned with smaller release sizes are in the 900mb to 1.5GB range for 60-90 minute features.

    300mb for a 90 minute live action feature even in SD is just not going to look good, some of the groups who get those sizes make them look even half-passable by running pre-filters in virtualdub that smooth, reduce grain and detail, etc before passing to the encoder. That kind of thing is way beyond anything you’re going to learn in a few youtube videos though, that’s advanced stuff with scripting.

    Think about it this way, if you shoot for 1GB encodes with 265 or AV1 you can store over 900 movies on a 1tb drive which can be had for well under a hundred dollars.

    I would like the best and fanciest algorithms to have least dataloss.

    There is no magic that will get you where you want. If you want detail preserved you need more bitrate which translates to larger sizes. Modern codecs like HEVC and AV1 mean you need as much as 1/5th the bitrate you needed with old MPEG2/4 encoding schemes used on DVDs, that’s darn good savings but it has its limits.

    Do as you will but anything live action (non-animated) significantly under 1000kbps average bitrate is going to look awful on a 1080p screen and much worse than what it would look like if you popped your dvd in the disc drive and played it from there.

    Opus is fine if you’re not worried about compatibility and just playing on a computer.


  • Majestic@lemmy.mltoAsklemmy@lemmy.mlProblem with Lenovo B50
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    8 months ago

    Well re-applying thermal paste is a big matter. I’d try stressing it and seeing if you can force it after cleaning the vents.

    So do things to stress the processor and see if you can force it to happen repeatedly. If it is a thermal issue you should be able to cause it by inducing high load. If you can’t it points more towards other issues. A fault in RAM or the motherboard for example, a loose module or connection, etc.

    And just FYI if you need more help in future this community isn’t intended for it. Try posting in a tech or computer help community for a better chance more people engage.


  • Randomly or after a set time of use or intense use? Could be processor is overheating past safety thresholds (new thermal paste could fix this IF that’s the issue).

    I’d try cleaning vents and fans before changing thermal paste though. Could be they’re clogged and not working right.

    Failing that it could be multiple things. But I’d try to address cooling being adequate first. Make sure vents are unobstructed during use. Use it on a flat hard surface, clean the vents with a vacuum and/or canned air duster.