Atemu

joined 4 years ago
MODERATOR OF
[–] Atemu@lemmy.ml 5 points 7 months ago (2 children)

Typing anything in another window that is not my browser

Which windows exactly? The apps you're typing things into might be spying on you.

M$ and their 738 parters really value your privacy, so if you're typing things into Excel...

copypasting the words "trans" and "talking"

What applications were running on your computer while you did this? Any of them could be recording clipboard history; it requires no special privilege.

Heck, I wouldn't be surprised if Windows itself was recording this and sent it to daddy M$ to train LLMs and maybe sell it as a little multi-billion side hustle.

transgender videos about "How to change your voice" start popping up in my feed. Please know I have zero interest in transgender politics/culture/anything, it is not something I have ever searched for or engaged in online.

Maybe Google knows something you don't? JK.

A more plausible explanation is that Google knows that you're in the Fediverse (ever Googled it?) which has a far above average concentration of queer people.

What is also plausible is that someone living with you (i.e. your family) or a friend is trans and you're obviously associated with them.

Google doesn't recommend queer content because they think you're queer but because it's what their data-defined statistical algorithms (""AI"") predicts you are likely to be interested in and therefore watch ads for. If you know a queer person or are often in contact with them, you are simply quite a bit more likely to be interested in queer people than the average and therefore more likely to click on queer content.

Possible that Youtube is reading my clipboard? Reading my keystrokes?

Youtube itself? Near impossible.

Other applications? Possible but likelihood unknown.

Listening to an album via VLC, while Youtube is open in my browser. Suddenly, more tracks from that album start showing up in my suggested feed. Possible Youtube is reading the titles of other apps current open on my machine? (VLC changes its active title to the name of whatever file is currently open)

Again, Youtube itself directly isn't doing anything like this. If that album is related to what you were listening to on YT or is even simply also popular with people who listed to the same things on YT as you do or are just generally similar to your person; that's all it takes for YT to attempt to show it to you.

Also note again that any application on your Windows or Linux PC can read the window titles of any other application or even simply scan your media library or other files.

Discord does this for instance for their rich presence function for instance and I would again not be surprised if there was a little multi-billion side-hustle going on.

I use Youtube all the time as my personal version of Spotify.

If you're not reliant on YT's recommendations, I'd recommend you to download the songs you want to listen to and listen to them on a local player.

[–] Atemu@lemmy.ml 6 points 7 months ago

XZ is a slog to compress and decompress but compresses a bit smaller than zstd.

zstd is quite quick to compress, very quick to decompress, scales to many cores (vanilla xz is single-core only) and scales a lot further in the quicker end of the compression speed <-> file size trade-off spectrum while using the same format.

[–] Atemu@lemmy.ml 1 points 7 months ago

Those packages themselves depend on xz. Pretty much all of them.

What you're suggesting would only make the xz executable not be backdoored anymore but any other application using liblzma would still be as vulnerable as before. That's actually the only currently known attack vector; inject malicious code into SSHD via liblzma.

[–] Atemu@lemmy.ml 7 points 7 months ago (5 children)

The settings layout is a big step up but I'm not such a great fan of the theme changes. The new "Royal Blue" theme has lost quite a bit of contrast.

[–] Atemu@lemmy.ml 1 points 7 months ago (2 children)

That works for leaf packages but not for core node packages. Every package depends on xz in some way; it's in the stdenv aswell as bootstrap.

[–] Atemu@lemmy.ml 2 points 7 months ago* (last edited 7 months ago)

That's a nice idea in theory but not possible in practice as the last Nixpkgs revision without a tainted version of xz is many months old. You'd trade one CVE for dozens of others.

[–] Atemu@lemmy.ml 24 points 7 months ago

This blog post misses entirely that this has nothing to do with the unstable channel. It just happened to only affect unstable this time because it gets updates first. If we had found out about the xz backdoor two months later (totally possible; we were really lucky this time), this would have affected a stable channel in exactly the same way. (It'd be slightly worse actually because that'd be a potentially breaking change too but I digress.)

I see two way to "fix" this:

  • Throw a shitton of money at builders. I could see this getting staging-next rebuild times down to just 1-2 days which I'd say is almost acceptable. This could even be a temporary thing to reduce cost; quickly renting an extremely large on-demand fleet from some cloud provider for a day whenever a critical world rebuild needs to be done which shouldn't be too often.
  • Implement pure grafting for important security patches through a second overlay-like mechanism.
[–] Atemu@lemmy.ml 12 points 7 months ago* (last edited 7 months ago)

It was not vulnerable to this particular attack because the attack didn't specifically target Nixpkgs. It could have very well done so if they had wanted to.

[–] Atemu@lemmy.ml 7 points 7 months ago

This has nothing to do with "unstable" or the specific channel. It could have happened on the stable channel too; depending on the timing.

[–] Atemu@lemmy.ml 5 points 7 months ago

AFAIK, affected versions never made it to stable as there was no reason to backport it.

[–] Atemu@lemmy.ml 8 points 7 months ago

xz is necessarily in the stdenv. Patching it means rebuilding the world, no matter what you optimise.

view more: ‹ prev next ›