I’m the administrator of kbin.life, a general purpose/tech orientated kbin instance.

  • 0 Posts
  • 142 Comments
Joined 2 years ago
cake
Cake day: June 29th, 2023

help-circle






  • They didn’t close it. They provided an answer early. That as they see it, existing trade and consumer law should cover games and they don’t plan on carving out extra legislation for it but they will “keep an eye on it”.

    Now it is over 100k, it doesn’t actually mean anything more than they “might” debate it in parliament.

    Now, don’t get me wrong. I signed the petition, and I think they SHOULD look into it. But, my old cynical bones tell me that even if they do have a debate in parliament. It will be at a time when there will be 5 MPs in there, who will have nothing to say on the matter and it will be swept under the rug with a further canned statement drawn up by some civil servant in whitehall talking about consumer law just like the statement before.

    Most western governments are on the side of industry, and that includes game developers. I cannot imagine they care about this subject and will do the bare minimum lip service to move past it.

    I hope I’m wrong.

    I do have a bit more hope for the European parliament. Just a little. They do seem to be a bit more pro-consumer. That is the one that matters most IMO.






  • Doesn’t the motorola phone have a settings screen for defining what the button does? For Samsung they like to re-purpose the power button.

    First of all, it brought up bixby. I turned it back to powering off the phone and disabled bixby.

    Then, with the new update they re-assigned the power button to gemini. So, I turned it back to powering off the phone and disabled gemini too.

    However, the problem these days is that I’m never completely sure I’ve turned off all of the AI nonsense on my phone.



  • Linux secure boot was a little weird last I checked. The kernel and modules don’t need to be secure boot signed. Most distros can use shim to pass secure boot and then take over the secure boot process.

    There are dkms kernel modules that are user compiled. These are signed using a machine owner key. So the machine owner could for sure compile their own malicious version and still be in a secure boot context.



  • They send fake (non-existing) actor ids for votes to obfuscate the identity of the real user. It is “compliant”, but completely against the spirit of a public social network.

    There have been discussions about how to implement this before. But it has to be done in a way that is agreed by other threadiverse software. Unless they actually provide profiles for these fake actors there will be problems since some software will look up the profile info to cache it, even for likes…

    Personally I’m of the opinion of a standard header to mark a favourite message as a private one and use a random ID that the originating instance can use to validate the message as genuine. But, this needs to be adopted properly by all.




  • Actually how is your ISP giving out IPs to you? Mine uses IPv6 PD to give me a /48. And I then use SLAAC locally on the first /64 prefix on my LAN. Plus another /64 for VPN connections.

    If you mean receiving RA/ND packets from your ISP (which are used to announce IPv6 prefixes) then you need to allow icmpv6 packets (if you don’t want to be able to be pinged, just block echo requests, ICMP in v4 and v6 carry important messages otherwise).

    If your ISP uses DHCPv6 Prefix delegation you will need to allow packets to UDP port 546 and run a DHCPv6 client capable of handling PD messages.

    If you have a fixed prefix, then you probably don’t need to use your ISPs SLAAC at all. You could just put your router on a fixed IP as <yourprefix>::1 and then have your router create RA/ND packets (radvd package in linux, not sure what it would be on pfsense) and assign IPs within your network that way.

    If you have a dynamic prefix… It’s a problem I guess. But probably someone has done it and a google search will turn up how they handled it.

    EDIT: Just clarified that the RA/ND packets advertise prefixes, not assign addresses.


  • I believe the privacy concerns are made moot if all consumer level routers by default blocked incoming untracked connections and you need to poke holes in the firewall for the ports you need.

    Having said that, even knowing the prefix it’s a huge address space to port scan through. So it’s pretty secure too with privacy extensions enabled.

    But for sure the onus is on the router makers for now.