@Squire1039@lemm.ee avatar

Squire1039

@[email protected]

This profile is from a federated server and may be incomplete. View on remote instance

Squire1039 ,
@Squire1039@lemm.ee avatar

VirusTotal doesn’t indicate keepassxc.exe 2.7.7 contacts this address. I’d be careful. Check the binaries’ signatures. Try a full install to see if that behaves differently.

keppassxc.exe: www.virustotal.com/gui/file/…/relations

KeePassXC-2.7.7-Win64.msi: virustotal.com/…/9c3dab957db0f769c4e67bfdf4f0134a…

Squire1039 ,
@Squire1039@lemm.ee avatar

140.82.121.5

Well, apparently, this is an A record for api.github.com. This name resolves to a different IP around the globe. See www.whatsmydns.net/#A/api.github.com

The IP is detected as “clean” on VirusTotal: www.virustotal.com/gui/ip-address/…/detection , although apparently (probably not surprising as it is github) is also a favorite address for everything including malware.

Maybe you can ask in the keepassxc discussion forum on github.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

… officials had opened a fraud investigation against the man, confirming 130 vaccinations over nine month… The man then reported an additional 87 vaccinations to the researchers, which in total included eight different vaccine formulations, including updated boosters.

Squire1039 ,
@Squire1039@lemm.ee avatar

I am somewhat reluctant to say it, but if you get into a top-branded school, it will absolutely help you as it will open doors that otherwise would be closed. People will look at you differently, expect from your differently, and you’ll expect from yourself differently.

OTH, look at Bill Gate, Steve Job, Michael Dell, etc.; extraordinary people will be extraordinary given the right circumstances, ideas, and perseverance.

Squire1039 ,
@Squire1039@lemm.ee avatar

Spoofing a number means they can call somebody and appears as calling from your number. In order to receive SMS or call made to your number, they would have to hijack your SIM, typically convincing your telecom provider to transfer your phone info over to theirs.

In the US, someone knowing your full name and phone number is commonplace. There is no wide-spead havoc because of this. Someone who wants to harm you would really have to be motivated to get more information from the info you gave them. This is obviously possible because of wide-spread data leaks, but does your emissary have the perseverance and the knowledge to do this?

Squire1039 ,
@Squire1039@lemm.ee avatar

Have I been pawned is really nice, but only includes confirmed data leaks. If you use other services like Google or Malwarebyte, they will tell you more leaks. I was involved with the MoveIt data leak from a financial institution recently, which basically leaked all the information that possibly can be partly/wholely used for identity theft. This didn’t show up in HIBP. Fidelity Financial Life Insurance just leaked enough info via Infosys for another 30,000 customers with enough data for identity thefts recently.

In the US, it seems if somebody is able financially to aggregate all these sensitive data leaks, they probably can cause havocs to many people. These info often come from financial institutions, which you can’t totally withhold or lie about your personal information.

UK Trial: Pornhub's Chatbot Halts Millions from Accessing Child Abuse Content ( www.wired.com )

A trial program conducted by Pornhub in collaboration with UK-based child protection organizations aimed to deter users from searching for child abuse material (CSAM) on its website. Whenever CSAM-related terms were searched, a warning message and a chatbot appeared, directing users to support services. The trial reported a...

Squire1039 OP ,
@Squire1039@lemm.ee avatar

The MLs have been shown to be extraordinarily good at statistically guessing your words. The words covered are probably comprehensive.

Green Alley Award Celebrates Decade of Circular Economy Innovation: Recognizing Startups Turning Waste into Resources ( www.positive.news )

The Green Alley Award is celebrating its 10th anniversary. It’s a European award that recognizes and supports startups focused on the circular economy, aiming to reduce waste and resource consumption....

Cutout.Pro, an AI-powered visual design platform, leaked 20M records, including email and IP addresses, names and salted MD5 password hashes, which have then been broadly distributed. ( haveibeenpwned.com )

Haha, brand new company with MD5 password hashes. Maybe they oughta consult about securities with their/other AIs more often. Hopefully, nobody did anything naughty on the site....

Late Actor Matthew Perry's Twitter Hacked: Fake Charity Plea Targets Fans with Cryptocurrency Scam ( www.bitdefender.com )

Scammers hacked the late actor Matthew Perry’s Twitter account and posted a fake plea for cryptocurrency donations in the name of his foundation. The foundation confirmed the post was a scam and urged people not to donate....

Squire1039 OP ,
@Squire1039@lemm.ee avatar

I agree with you. The article give a good warning about downloading applications in general, but hand-wave how they escalated from “file/photo” access to capturing your data. The recent Anatsa malware’s details seem to imply accessibility service. This is a Thread Fabric article about Anatsa malware: threatfabric.com/…/anatsa-trojan-returns-targetin…

Squire1039 OP ,
@Squire1039@lemm.ee avatar

Yeah, the app data are separated and inaccessible, unless specified by the developer. Accessibility service is a separate permission, and should almost never be asked or granted, where as file/photo accesses are more common.

Squire1039 ,
@Squire1039@lemm.ee avatar

both

Town-square when they lure you in, they own everything when they sell you ass off.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

No, it appears to be an external headset, although it was noted that people wearing it looked like they had head injuries, but they are working on improving it so that it is less visible.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

No dirty thoughts! No dirty thoughts!

Squire1039 OP ,
@Squire1039@lemm.ee avatar

From the project’s page:

The wearable system captures peripheral neural signals when internal speech articulators are volitionally and neurologically activated, during a user’s internal articulation of words.

It doesn’t capture the central signal, but peripheral, most likely from the nerves running around your face and your neck used to produce speech.

https://static.greatbigcanvas.com/images/singlecanvas_thick_none/jrl-group/nerves-of-head-and-neck-lateral-view-nervous-system,2279887.jpg

Squire1039 OP ,
@Squire1039@lemm.ee avatar

It looks like you can switch the assistant to the old one, and then turn that one off.

But just like Microsoft, Google is going to use this technology everywhere. If in the future (or now, if it is already available to you), you use features to describe images, summarize data, create texts, you probably will be using some form of Gemini.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

Google assistant “app”: play.google.com/store/apps/details?id=com.google.…

I think once it’s rolled out in your region, the assistant will pester you to switch to Gemini.

There is no Gemini app of any kind for me either.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

Lovely, that’s a trick I haven’t tried on Andorid.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

The article claims that the default assistant for a new phone is Gemini, but it seems people who responded here haven’t seen it. I already have the option to switch to Gemini, which I haven’t.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

Yeah, check out this link: www.top10vpn.com/research/wifi-vulnerabilities/ , it says any Linux device running Intel’s iNet Wireless Daemon in an AP mode.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

The CVE-2023-52160, which applies to Android/linux/ChromeOS devices connecting to WPA2/WPA3 Enterprise, allows an attacker to fool the user to connect to a malicious SSID and intercept the traffic. So unencrypted traffic can be compromised. So, their listing of sensitive data, BEC, and password theft sound scary but probably affects very few services that don’t encrypt the data.

Squire1039 OP ,
@Squire1039@lemm.ee avatar

Considered it done. ;-)

Squire1039 OP ,
@Squire1039@lemm.ee avatar

AI is most likely here to stay, so if you have it do “good” things effectively, then’s it’s a good boi. If it is ineffective or you have it do “bad” things, then it’s a bad boy.

Squire1039 ,
@Squire1039@lemm.ee avatar

Tools, yes, instances, no, but there are Lemmy explorer (lemmyverse.net) which you can search for both instances and communities.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • tech
  • kbinEarth
  • testing
  • interstellar
  • wanderlust
  • All magazines