Skip to main content



isithran reshared this.


Content warning: block recommendation, csam

isithran reshared this.



Last week, the laying of submarine cable Natitua Sud has begun and should be completed with its landing in Tubuai on May 15th, should the weather be favorable.

https://www.datacenterdynamics.com/en/news/natituasud-subsea-cable-lands-at-toahotu-bay-french-polynesia/


isithran reshared this.


Fantastic reporting by @kimzetter here - a year long report into what went down with #Solarwinds.

I'd like to highlight this bit. Zero trust, my arse. Lots of new details in this report. https://www.wired.com/story/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever/

in reply to Kevin Beaumont

While investigating (and not finding) the Solarwinds incident in mid-2020, Mandiant installed Solarwinds and infected its own internal network.
in reply to Kevin Beaumont Éric Freyssinet reshared this.

The attackers were inside Solarwinds for 2 years before discovery.


New software release: LGlass, a multi-manufacturer looking glass written in PHP.

https://github.com/dscp46/lglass

If you wish support for another system type/brand, please drop a feature request with the commands you wish to see implemented.
This entry was edited (1 year ago)


Central Repeater management web interface v0.1 released.
https://github.com/dscp46/remara/

The remote repeater control agent will follow soon, I'm still adjusting some functions and the installer. Also the protocol specification needs to be completed and proofread.

#hamr #hamradio #svxlink #mqtt #remara


Short demo of our central repeater management utility.
Version 0.1 almost ready to ship.

youtube.com/watch?v=4ykdPrglnf…

With the growth of the regional repeater network, fellow hams asked for an easy way to control their repeaters. Here is version 0.1 of that product, which is able to manage a list of repeaters, then to send various commands (ping, change room, disconnect repeater, enable or disable repeater logic, reboot the system).

Next version will be shipped with proper privilege separation, group ACL management, and a few refinements.

Key moments:
0:00 Repeater agent running on our test stub. Network has just been cut, to show that connectivity loss can be recovered.
0:33 Repeater agent recovering its connection to the control segment.
0:39 Connecting to the management interface
0:44 Browsing through the repeater list.
0:49 Showing the repeater properties editor
1:05 Ping demo with our test laptop which is connected with user 'f4hof-s'. The UI shows a notification toast to confirm the "repeater" has acknowledged our command.
1:19 Changing conference room
1:34 Rebooting the remote system. Command hasn't been acked because the system rebooted too quickly. This will be fixed in the initial release. Please notice that the notification toast shows a warning as the command hasn't been confirmed.

@isithran@social.lkw.tf:

Coming soon: remote control of analog repeaters through #Hamnet. cc @[url=https://kloud.social/users/fred]Fr0de[/url] F4EED/KI7QQP
Control plane uses MQTT, either in fire and forget mode, or with reliable delivery and explicit command acknowledgement. #hamr #hamradio
SVXReflector log trace showing the controlled repeater leaving and connecting back, due to multiple "change module" commands being sent.

Sender debug trace showing the command being sent reliably through MQTT and the acknowledgement message being received.

Agent debug trace showing the command being received reliably through MQTT and the acknowledgement message being sent back and the action being launched (switching to room frm).



This entry was edited (1 year ago)


Short demo of our central repeater management utility.
Version 0.1 almost ready to ship.

https://www.youtube.com/watch?v=4ykdPrglnfA

With the growth of the regional repeater network, fellow hams asked for an easy way to control their repeaters. Here is version 0.1 of that product, which is able to manage a list of repeaters, then to send various commands (ping, change room, disconnect repeater, enable or disable repeater logic, reboot the system).

Next version will be shipped with proper privilege separation, group ACL management, and a few refinements.

Key moments:
0:00 Repeater agent running on our test stub. Network has just been cut, to show that connectivity loss can be recovered.
0:33 Repeater agent recovering its connection to the control segment.
0:39 Connecting to the management interface
0:44 Browsing through the repeater list.
0:49 Showing the repeater properties editor
1:05 Ping demo with our test laptop which is connected with user 'f4hof-s'. The UI shows a notification toast to confirm the "repeater" has acknowledged our command.
1:19 Changing conference room
1:34 Rebooting the remote system. Command hasn't been acked because the system rebooted too quickly. This will be fixed in the initial release. Please notice that the notification toast shows a warning as the command hasn't been confirmed.

Coming soon: remote control of analog repeaters through #Hamnet. cc @Fred F4EED/KI7QQP
Control plane uses MQTT, either in fire and forget mode, or with reliable delivery and explicit command acknowledgement. #hamr #hamradio

isithran reshared this.


The patriarchy is the reason you know the names Steve Jobs, Bill Gates, and Elon Musk, but you've never even once heard the name Evelyn Berezin.

reshared this


isithran reshared this.


:revblobfoxpeekowo:

Just a little WIP from my messy workshop (should see the other half of the table). Got the idea for pride month, but will probably have them in a shop earlier. Now.. what flag to create next? :blobfoxhyper:

#MastoArt #3DPrinting #WIPWednesday #Fox

reshared this



Coming soon: remote control of analog repeaters through #Hamnet. cc @Fred F4EED/KI7QQP
Control plane uses MQTT, either in fire and forget mode, or with reliable delivery and explicit command acknowledgement. #hamr #hamradio
in reply to isithran

Version 1 will include reboot, disconnect, change module, ping and RF kill/restore commands, version 2 will allow remote config provisioning. #hamr #hamradio #hamnet

isithran reshared this.


fail2bahn

reshared this

in reply to agatha, fangs gf 🎀

if you fail authentication enough you’re immediately put on the most delayed train in the DB network


Today in the mail:
楽園 − 石川セリ (1985, Philips 32LD-45)


RT @cronokirby@twitter.com

https://loper-os.org/?p=1913

Someone linked me to this site, and it has like, an entire book on finite field arithmetic.

Love discovering old internet monoliths like this


isithran reshared this.


coming soon: Intel 64 and IA-32 Reference Manual, the anime.
in reply to malevolent dictator for life polprog reshared this.

"senpai! why isn't VCVTNEPS2BF16 working?"
"it's very easy, just consult this table"


Coucou @MilkyWan - AS2027 est-ce que vous avez des retours en terme d'expérience et d'accidentologie en ZTD sur le secteur de St Etienne, Loire? Disons que les bruits sur le basculement des abonnés en CGNat chez Orange motivent à chercher mieux :)
This entry was edited (1 year ago)
in reply to isithran

4 abonnés dans la Loire et rien à signaler ;-)

isithran reshared this.


Fox chirality!

Do foxes obey Bose-Einstein statistics, in which case their spin quantum numbers would be +1 and -1, or do they obey Fermi-Dirac Statistics, +1/2 and -1/2?

If the latter, it is possible that the fox is a Majorana fermion, in which case a fox of the opposite spin would be its antiparticle.

reshared this


isithran reshared this.


HKDF is commonly used to derive key material just in time for its application. However, as a cryptography tool, HKDF is severely under documented and lacks prescriptive examples for intended use.

A large-tech blog shared their HKDF application and I identify several issues with its implementation. Inside is an anonymized version with critiques and improvements.

Tags: #cryptography #hkdf #blog #engineering #security

https://cendyne.dev/posts/2023-01-30-how-to-use-hkdf.html

reshared this


isithran reshared this.


How extremely convenient that IBM Research found a colorblind friendly color palette that includes roughly the colors of the bi pride flag :sparkles_bi:

https://davidmathlogic.com/colorblind/#%23648FFF-%23785EF0-%23DC267F-%23FE6100-%23FFB000

#Design #Accessibility
This entry was edited (1 year ago)

reshared this




isithran reshared this.


me

reshared this


f4ivy reshared this.


Petite astuce si vous souhaitez faire basculer votre TIC en mode standard sur votre compteur Linky en étant client.e EDF:

Contacter le 09 69 32 15 15 puis choix 1, 2 puis 4.
Si le conseiller ne connait pas la procédure, dites lui de faire une F185 sur le site SGE en choisissant le mode standard. Préciser que la procédure a été confirmée précédemment avec le groupe TD.

Appeler de préférence en période creuse (temps de midi par ex). Normalement, le changement devrait être effectif la nuit suivante.
This entry was edited (1 year ago)
in reply to Emmanuel Caillé

@Emmanuel Caillé la puissance réactive est indiquée pour les contrats <= 36kVA avec l'option production, d'après ce que j'ai pu lire. Ça ne remonte pas d'après zigbee2mqtt, en tout cas.
in reply to isithran

ha, j'ai pas d'option production.
Au passage, c'est plutôt bien documenté chez Enedis : https://www.enedis.fr/media/2035/download

isithran reshared this.


New blog post where I show a silly way to utilize Intel's AMX AI/Machine-Learning matrix-instructions to get the average color of an image.
https://wunkolo.github.io/post/2023/01/tdpbuud-average-color/

reshared this



Pew Pew Lasers (Final episode?)
18J/cm², 3ms, ø15mm
We definitely caught more hair this time. I've got an appointment in 5 weeks, that might be delayed or canceled if everything goes according to plan 💜

isithran reshared this.


A DICOM image.

DICOM is the medical image format, very TIFF-like.
Its preamble makes many polyglots possible, including TIFF-DICOM sharing the same image data.
It doesn't tolerate appended data - but just append a "private" tag if needed.

reshared this


isithran reshared this.


Every company saying that their data is encrypted at rest with "strong encryption" is saying nothing. It's a free, effortless and shameless statement to boost the org's false security posture to the untrained masses. It's even worse when they say it to justify that their security was sufficient after a breach.

Encrypted data at rest just means they use the cloud. It's standard cloud practise. They give it basically for free at a button toggle. "Using military grade encryption" yes I know it's AES. That shouldn't make you feel any safer. Optus even said their unauthenticated API was protected by double layers of encryption! (TLS in transit and AES at rest!). That meant nothing, and did nothing to protect their breach. Why?

Because the threat models that encryption at rest protects against is someone walking into some data center and grabbing hard drives. And no one does that. Every piece of encrypted information stored by your business is constantly decrypted at some point for use - especially customer and production data. Any attacker who compromises your employees with access to cloud resources, or an application/system with access to those cloud resources will have credentials and permission to decrypt the data. Because at the end of the day encrypted data is just as useless to you as it is to the attacker.

reshared this

in reply to h4sh

when we, 1Password, talk about our layers of encryption we don’t even mention the encryption that comes free with AWS. What matters is data encrypted with available only to our users.
in reply to Jeffrey Goldberg

yea no, I get that, and SRP is not in the typical encryption bullshit list that I meant. 1password being a password manager obviously needs to have its encryption described on the tin, in technical detail, which it does quite well.
in reply to h4sh Soatok Dreamseeker reshared this.

@h4sh, thank you. I wasn't taking your post as being about us. I, too, get very irritated when services call "encryption at rest" is a defense against an exceedingly narrow threat. (Someone walks away with the hard drives.)

I get even more irritated when auditors and the like conflate that with what we do.
@h4sh
in reply to h4sh Soatok Dreamseeker reshared this.

@WPalant this is how I feel about podcasters saying server side AES on S3 will solve public bucket leaks


- "How obscure are your musical tastes?"
- "Well, today I found out I've got a full shelf of CDs the national library in charge of the mandatory deposit in my country does not even have in its database, which lead me to read back the law to ensure I wasn't liable to a hefty fine."
in reply to lomn

Hum, that's not really an incitation to share...
in reply to isithran

tbf I share 99% of my library being online daily. But I still keep a few exclusive recordings which I know are either very rare to come by or shit I recorded from livesets from when I used to work as a sound engineer.

The rare records no one would actually be interested in, the live sets could easily be tied to me if they happend to leak on yt or something.


Blasting Cbat with the home theater rig made the periodic bed noises from upstairs that have been going on for more than an hour stop straight away.

I think the message has been received... 😈

isithran reshared this.


Note this is a choice some IT person made years ago and nobody realizes is optional, or something is actually broken and people just got used to it. Re-Auth could be entirely seamless if they wanted, or only enforced for certain apps. This is not intrinsic.

Something I see a lot is people accepting bad IT experiences as mandatory. Like this is life, get on with it. But this isn't remotely true.
It's a choice, sometimes just not a choice an organization realizes it has. I have to be the person calling bullshit on stuff because I know. Because I understand what's normal outside the org, or I have literally done their job before as an IT Generalist.

The business malaise in accepting deteriorated user experiences is frankly shocking.
You're being led like a dog by people who aren't being challenged to do better. Who often are not stupid and can do better, but have no mandate to venture it.

reshared this



Honestly, one good thing for 2023 would be to set back up a blog, importing my old articles, doing old links management and posting at least once per month.

isithran reshared this.


can't wait for 2050s ham radio repeaters where instead of old guys talking about the wife or whatever diseases they have, there's a bunch of trans girls complaining about drama in their polycule

reshared this




A lot happened in 2022 (in a good sense as far as I'm concerned). A few rough times, but I got to make things moving 💜. Let's make 2023 even better ✨

Happy new year, and all the best to all of you 🎇
Unknown parent

isithran
Thanks, all the best to you too.
This entry was edited (1 year ago)

isithran reshared this.


Ah ! À partir de demain un 02 ne sera plus forcément un 02 #téléphone #arcep

« A partir du 1er janvier 2023, les contraintes géographiques des numéros 01 à 05 s’assouplissent. Concrètement, il sera possible de conserver son numéro de téléphone fixe, notamment en cas de déménagement, dans une autre zone géographique de France métropolitaine. »
https://www.arcep.fr/demarches-et-services/utilisateurs/degeographisation-des-numeros-de-01-a-05-ce-qui-change-au-1er-janvier-2023.html

reshared this




TIL that friendica support CWs through ActivityPub, but hat not yet implemented support for posting with them


isithran reshared this.


A very interesting take on the universe as seen from the perspective of the 2m amateur radio band by the #LOFAR radio telescope.

RT @cosmos4u@twitter.com

V-LoTSS, The Circularly-Polarised #LOFAR Two-metre Sky Survey: https://arxiv.org/abs/2212.09815 -> https://twitter.com/AstroJoeC/status/1605512117376778242

🐦🔗: https://twitter.com/cosmos4u/status/1605750235875131392

isithran reshared this.

Unknown parent

Scott Tilley
@doctroid It changes constantly, but the later will give you a sense of the theme.