- 34 Posts
- 56 Comments
Squire1039@lemm.eeto Privacy@lemmy.ml•Unexpectedly, after updating KeePassXC started knocking on the Internet. Is this behavior normal?English6·1 year agoVirusTotal doesn’t indicate keepassxc.exe 2.7.7 contacts this address. I’d be careful. Check the binaries’ signatures. Try a full install to see if that behaves differently.
keppassxc.exe: https://www.virustotal.com/gui/file/fea4df5024f83155f6742a3372a801fc6cc97ed82627b36fce6f0caed54506cf/relations
KeePassXC-2.7.7-Win64.msi: https://www.virustotal.com/gui/file/9c3dab957db0f769c4e67bfdf4f0134a65ecfa65c5569718a36aa88e649158cd
The canon is used to induce a radical evasive movement. Probably need lots of airbags. Looks awesome, though; would have loved it as a toy car.
Squire1039@lemm.eeOPto Technology@lemmy.world•A 62-Year-Old German Man Got 217 Covid Shots—and Was Totally FineEnglish14·1 year ago… officials had opened a fraud investigation against the man, confirming 130 vaccinations over nine month… The man then reported an additional 87 vaccinations to the researchers, which in total included eight different vaccine formulations, including updated boosters.
Squire1039@lemm.eeto Lemmy Shitpost@lemmy.world•I don't think this needs explainingEnglish41·1 year agoChocolate chip-shrimp cookies with dip… yum…
It’s like saying, if you can’t figure this out, you aren’t worth the one extra dog you have, please give it away.
Squire1039@lemm.eeto Ask Lemmy@lemmy.world•If someone nefarious has your full legal name and your phone number, can they wreak any havoc in our life with that info?English3·1 year agoHave I been pawned is really nice, but only includes confirmed data leaks. If you use other services like Google or Malwarebyte, they will tell you more leaks. I was involved with the MoveIt data leak from a financial institution recently, which basically leaked all the information that possibly can be partly/wholely used for identity theft. This didn’t show up in HIBP. Fidelity Financial Life Insurance just leaked enough info via Infosys for another 30,000 customers with enough data for identity thefts recently.
In the US, it seems if somebody is able financially to aggregate all these sensitive data leaks, they probably can cause havocs to many people. These info often come from financial institutions, which you can’t totally withhold or lie about your personal information.
Squire1039@lemm.eeto Ask Lemmy@lemmy.world•If someone nefarious has your full legal name and your phone number, can they wreak any havoc in our life with that info?English81·1 year agoSpoofing a number means they can call somebody and appears as calling from your number. In order to receive SMS or call made to your number, they would have to hijack your SIM, typically convincing your telecom provider to transfer your phone info over to theirs.
In the US, someone knowing your full name and phone number is commonplace. There is no wide-spead havoc because of this. Someone who wants to harm you would really have to be motivated to get more information from the info you gave them. This is obviously possible because of wide-spread data leaks, but does your emissary have the perseverance and the knowledge to do this?
Squire1039@lemm.eeto Ask Lemmy@lemmy.world•What were the consequences of you going to college? Do you think it helped you in life or did it only hold you back?English51·1 year agoI am somewhat reluctant to say it, but if you get into a top-branded school, it will absolutely help you as it will open doors that otherwise would be closed. People will look at you differently, expect from your differently, and you’ll expect from yourself differently.
OTH, look at Bill Gate, Steve Job, Michael Dell, etc.; extraordinary people will be extraordinary given the right circumstances, ideas, and perseverance.
Squire1039@lemm.eeOPto Technology@lemmy.world•UK Trial: Pornhub's Chatbot Halts Millions from Accessing Child Abuse ContentEnglish41·1 year agoThe MLs have been shown to be extraordinarily good at statistically guessing your words. The words covered are probably comprehensive.
Squire1039@lemm.eeto Technology@lemmy.world•HDMI Forum to AMD: No, you can’t make an open source HDMI 2.1 driver | Linux users can't hit the same resolutions and speeds as Windows—or DisplayPort.English151·1 year agoA speculation, https://www.phoronix.com/news/HDMI-2.1-OSS-Rejected, about HDCP, i.e. not exposing technical details as to prevent video copying, was offered.
Squire1039@lemm.eeto Technology@lemmy.world•WordPress and Tumblr Plan to Sell User Content to AI CompaniesEnglish2·1 year agoboth
Town-square when they lure you in, they own everything when they sell you ass off.
Squire1039@lemm.eeOPto Technology@lemmy.world•[Malwarebytes Blog] Android banking trojans: How they steal passwords and drain bank accountsEnglish3·1 year agoYeah, the app data are separated and inaccessible, unless specified by the developer. Accessibility service is a separate permission, and should almost never be asked or granted, where as file/photo accesses are more common.
Squire1039@lemm.eeOPto Technology@lemmy.world•[Malwarebytes Blog] Android banking trojans: How they steal passwords and drain bank accountsEnglish11·1 year agoI agree with you. The article give a good warning about downloading applications in general, but hand-wave how they escalated from “file/photo” access to capturing your data. The recent Anatsa malware’s details seem to imply accessibility service. This is a Thread Fabric article about Anatsa malware: https://www.threatfabric.com/blogs/anatsa-trojan-returns-targeting-europe-and-expanding-its-reach
Squire1039@lemm.eeOPto Technology@lemmy.world•MIT Researcher Creates Mind-Controlled Internet Search HeadsetEnglish5·1 year agoFrom the project’s page:
The wearable system captures peripheral neural signals when internal speech articulators are volitionally and neurologically activated, during a user’s internal articulation of words.
It doesn’t capture the central signal, but peripheral, most likely from the nerves running around your face and your neck used to produce speech.
Squire1039@lemm.eeOPto Technology@lemmy.world•MIT Researcher Creates Mind-Controlled Internet Search HeadsetEnglish8·1 year agoNo dirty thoughts! No dirty thoughts!
Squire1039@lemm.eeOPto Technology@lemmy.world•MIT Researcher Creates Mind-Controlled Internet Search HeadsetEnglish6·1 year agoNo, it appears to be an external headset, although it was noted that people wearing it looked like they had head injuries, but they are working on improving it so that it is less visible.
Squire1039@lemm.eeto AI Generated Images@sh.itjust.works•Sailor moon commanding the starship Enterprise. 1960s star trek style.English1·1 year agoBeam me up, Scotty!
Squire1039@lemm.eeto Videos@lemmy.world•Supreme Court Ethics: Last Week Tonight with John OliverEnglish2·1 year agoLove it. Thanks.
Squire1039@lemm.eeOPto Technology@lemmy.world•Google has replaced the Google Assistant app on Android with Gemini by defaultEnglish1·1 year agoThe article claims that the default assistant for a new phone is Gemini, but it seems people who responded here haven’t seen it. I already have the option to switch to Gemini, which I haven’t.
Well, apparently, this is an A record for api.github.com. This name resolves to a different IP around the globe. See https://www.whatsmydns.net/#A/api.github.com
The IP is detected as “clean” on VirusTotal: https://www.virustotal.com/gui/ip-address/140.82.121.5/detection , although apparently (probably not surprising as it is github) is also a favorite address for everything including malware.
Maybe you can ask in the keepassxc discussion forum on github.