Kailn

joined 6 months ago
[–] Kailn@lemmy.myserv.one 1 points 2 weeks ago

I also had audio issues with windows in the past,
But to be fair, it was a driver issue and it fixed itself when I updated it,
It still was random.

[–] Kailn@lemmy.myserv.one 3 points 1 month ago

There, exacly what you want.
Here's a more budget one.

GPD has been making "mini laptops" for a long while, now they try to make similar gaming handheld.
I'm not sponoered nor I've bought this for myself. (yet)

[–] Kailn@lemmy.myserv.one 2 points 1 month ago

Reminds me of Death Note,
Except it's not a game.

[–] Kailn@lemmy.myserv.one 6 points 1 month ago

Well, that doesn't sound civil or lawful at all and more like kindoms of the dark ages degree of "rules" where it doesn't apply to a choosen few.

If Meta and other bigcorps that support the US goverment get the special "avoid-judgment" card and you face punishment then there's no law, only bigotry.

That would encourage individuals and small groups to keep their activites a secret (go anonymous) and break the law whenever they can,
because the "king and his followers" don't follow their own "rules".

The US is not only getting dystopian, they're commiting primitive mistakes.

[–] Kailn@lemmy.myserv.one 1 points 1 month ago

Just...
Don't let them deceive you;

If you must use deceitful software like Gmail, Whatsapp, Discord, office or whatever, just try your best not to leak your personal data on them, and if you can hinder the tracking, do so.

If you can use other (preferably FOSS) software, do so, there's plenty of solutions out there and most of them are free, and sometimes selfhost-able.

Google, Meta, Microsoft or whatever corp can lie about security or privacy all they want, but in the end, they only fool themself thinking their monetary practices aren't obvious and they can fool everyone, trust is a hard thing to earn and they can't earn it with fraud.

The product mostly show itself, and you have to go around it to know what's it's deal, if you prefer to not do so, you can search if any security researcher or analyst did investigate the product; For example Google claims Chrome browser is "safe" and "secure" dispute them giving so much trackable APIs for websites, and having a horrable default permissions, and don't forget the "Manifest V3" transition just to remove ads (and trackers) blockers like uBlock Origin.
You don't need solid proof to know what is what.

And then you just type " Foss Chrome Alternatives" or "Private Browsers" on a search engine like DDG where you can find many articles to help you find one (like this) and you'd be done.

Forget about ""Others"" right now, your well-being matters the most.

[–] Kailn@lemmy.myserv.one 1 points 1 month ago

IDK if this is a usable design...
it looks like a large tablet convertable to a labtop, not a foldable laptop of it's own.

Also, is it X86 or Arm CPU?

[–] Kailn@lemmy.myserv.one 2 points 1 month ago

Again, as I said, whatsapp doesn't feel like a genuine messenger app as much as an oversimplified garbage made for tracking users on the background for profiting.
Even the deal of "giving" Llama LLMs (Meta AI) to everyone feels sketchy and look abusive the way it is pushed to users.

Likewise all of meta's services, the only catch with whatsapp that it used to be good and it's a well-spread application, that's why they bought it instead of improving FB's messenger, as meta want to benefit of it's naive userbase who think whatsapp is "As fine as ever";

To you, publicity is nothing important and it doesn't make a good product, to meta however, publicity is "everything" and it shall be all-time high, they have more analytical data about their userbase and have a good idea of what they would do and what decision they would take.

[–] Kailn@lemmy.myserv.one 21 points 1 month ago (4 children)

Yes, but how would you know Meta doesn't have a copy of your encryption key (ex: when you sign up) and keeps a copy of your encrypted messages somewhere?
AFAIK your encryption key resides as whatsapp's data folder but since whatsapp is closed-source you can't guarantee that whatsapp gave the encryption key to Meta's server at some point when it was created; (or it was created on their servers and sent to your device.)

One would just assume the encryption key is made on your device and never sent to Meta and all the E2EE messages aren't kept on Meta's server after they are sent.

Again, Meta is a company that is profiting on targeted advetising and selling user data, how would whatsapp be a free service without any profit?

Also, Here's someone who saw their whatsapp chat used for targeted ads on them in case you have doubt.

[–] Kailn@lemmy.myserv.one 36 points 1 month ago (6 children)

As much as I'd like to favor foss and federated messenger apps, telegram isn't as much garbage as whatsapp:

1.The client is somewhat open source and have forks like Forkgram, Materialgram and unoffical clients like Telegrand.
2. Telegram isn't E2EE by default but at least it doesn't lie about it and have E2EE secret chat when nessesary, that means crucial chats stay on your device and the rest stay on their database recoverable and syncable across devices.
(Yes, whatsapp supposedly is E2EE but we can't know for sure, it's closed-source.)
3. You can use telegram as a cloud service with only 2GB per file limit, unlike whatsapp.
(There's even a third-party app that utilise this as a cloud gallery.)
4. Even tho telegram has ads in large channels, telegram isn't funded by a greedy big-corp and it doesn't datamine you, ads are based on the channel's topic.

Yes, in terms of privacy, telegram isn't the best option, Signal, Session, XMPP, Matrix, or SimpleX have better privacy features, less linkability and E2EE by default but telegram is very mainstream and got more publicity, making it the whatsapp alternative it advertises itself as-is.
Publicity doesn't make a better messenger app, but for what it tries to do, it's adoptable for simple users, doubles as cloud storage and is more secure than the garbage being whatsapp.

Immigrating users to different apps is a headache on it's own, but if they know of telegram and it's not privacy invasive, that's not bad.

[–] Kailn@lemmy.myserv.one 4 points 1 month ago

Peviously posted on an another lemmy community.

 
  • The Chocolate Factory announced the Google Threat Intelligence Group-led actions on Wednesday and said that, in partnership with other teams, it terminated all Google Cloud Projects that had been controlled by UNC2814, a group that GTIG has tracked since 2017. They also disabled all known UNC2814 infrastructure and accounts, and revoked access to the Google Sheets API calls used by the Chinese snoops for command-and-control (C2) purposes.
  • "As of Feb. 18, GTIG's investigation confirmed that UNC2814 has impacted 53 victims in 42 countries across four continents, and identified suspected infections in at least 20 more countries," the threat hunters said in the report.
  • The security sleuths uncovered this campaign during a Mandiant investigation into suspicious activity in a customer's environment. Specifically, this binary, "/var/tmp/xapt," initiated a shell with root privileges, and then executed a command to retrieve the system’s user and group identifiers to confirm it had successfully escalated to root.
  • Google suspects the payload was named xapt, after the command-line tool in Debian and Ubuntu systems, to make it easier to hide in the victim's environment and look like a legitimate tool.
  • The intruders also used a novel backdoor, Gridtide, that abuses legitimate Google Sheets API functionality to disguise its command-and-control (C2) traffic. Mandiant has linked Gridtide to UNC2814.
  • The intruders also used a novel backdoor, Gridtide, that abuses legitimate Google Sheets API functionality to disguise its command-and-control (C2) traffic. Mandiant has linked Gridtide to UNC2814.
  • After breaking in, the spies moved laterally via SSH, performed reconnaissance, escalated privileges, and then deployed the Gridtide backdoor using a command, "nohup ./xapt," that allows it to run even after the user closes the session.
  • "Subsequently, SoftEther VPN Bridge was deployed to establish an outbound encrypted connection to an external IP address," the threat intel team wrote. "VPN configuration metadata suggests UNC2814 has been leveraging this specific infrastructure since July 2018."
  • The C-based backdoor uses Google Sheets as its C2 platform, can execute shell commands, and can upload and download files. In this case, the attacker deployed Gridtide on an endpoint containing personal information - likely to identify and track persons of interest - including full name, phone number, date and place of birth, voter ID and national ID numbers.
[–] Kailn@lemmy.myserv.one 16 points 1 month ago

Kent overstreet?
Of all people?

It seems like he didn't get enough harrasment from linux maintainers and went for AI one. Poor developer...

[–] Kailn@lemmy.myserv.one 3 points 2 months ago

Imagine if they put all that money into developing a decent product that might return some actual revenue.

Nah, let use all these PC components for something wasteful.

view more: next ›