Buddahriffic

joined 1 year ago
MODERATOR OF
[–] Buddahriffic@lemmy.world 1 points 12 minutes ago

Unless he had a side side gig delivering crime scene tape.

[–] Buddahriffic@lemmy.world 2 points 13 minutes ago

I wonder what portion of her "support" is thinking "stfu already and gtf back to the kitchen and let the men handle this shit".

[–] Buddahriffic@lemmy.world 3 points 1 day ago (3 children)

Tbf, Canada has like 15% the population, mostly in a smaller amount of areas. The US has more states than Canada has major cities.

[–] Buddahriffic@lemmy.world 3 points 1 day ago

It's been a while and I can't remember which one it was that I saw, but I remember that ending coming out of nowhere. It's like oh, there's a ghost or something haunting the place, ok. Signs of evil or something, a person floating while sleeping, too iirc.

Then suddenly there's hundreds of witches or cultists surrounding them outside and it just ends!?

Maybe it would have been scary if I was the type to buy into moral panics?

It was just kinda creepy and then weird. Felt like "rocks fall, everyone dies" kinda energy.

[–] Buddahriffic@lemmy.world 1 points 1 day ago* (last edited 1 day ago)

Yeah, you're right, Russia isn't the only one with troll farms. At this point, I wouldn't be surprised if there's some based in every country in the world. Not all of them state sponsored, but it's an effective strategy to disrupt communities and keep people from working together. Edit: though I've come to see it as kinda like Kleenex, where the entire phenomenon is referred to as Russian trolling even though not all trolls are Russian brand trolls.

And you're also right about that last point. I don't know if there is an effective way to deal with them. Even if someone called out as a troll really is one, just calling them out can alienate others who resonated with what the troll said.

I'm not sure if there even is an effective counter strategy.

[–] Buddahriffic@lemmy.world 5 points 1 day ago (1 children)

How do you sell an indie game studio? Doesn't sound very independent even before the sale to me.

[–] Buddahriffic@lemmy.world 1 points 1 day ago

I think that, due to the nature of chaos and the butterfly effect, any time travel at all would change the future. Unless it was just closing a time loop that was already present in the current past (which would mean any attempt to alter history would fail because that attempt is already a part of history), or if it's possible to create new branches in time.

So these rules are either unnecessary because any time travel automatically causes changes that, it's not possible to change the past from the past, or it's not possible to go back to our past, thus nothing you do will affect our present.

[–] Buddahriffic@lemmy.world 3 points 1 day ago (2 children)

I'm not sure they are going so hard right now, since the election is done, but the Russian trolling strategy was to sow division by pushing every side of every conflict further to the extremes.

Like say for feminism, there would be some claiming feminists are just anti-man and want to replace the patriarchy with a matriarchy, others would be pushing the message that men are evil and shouldn't be trusted, while others would be saying women belong in the kitchen to serve their husbands and sons, and yet others would be complaining that men never listen. And they'd do all of this loudly with the hope of drowning out the more reasonable and moderate positions and make it an unsolvable issue because all sides don't think there's any compromise possible.

And once you know the pattern, it's visible all over the fucking place.

[–] Buddahriffic@lemmy.world 3 points 1 day ago

Oh. Well maybe instead it will be a glorious future like Starship Troopers where we spend our days and lives fighting off vicious alien bugs before they manage to develop the technology necessary to destroy us!

[–] Buddahriffic@lemmy.world 5 points 2 days ago (3 children)

Maybe it will be a cyberpunk future.

[–] Buddahriffic@lemmy.world 8 points 2 days ago

I suggest you buckle up.

[–] Buddahriffic@lemmy.world 2 points 3 days ago (1 children)

Yeah, I think there is a lot of potential for code analysis. There's a limited cross section of ways malware can do interesting things, but many permutations of ways to do that.

So look for the interesting things, like:

  • accessing other programs' address spaces
  • reading/writing files
  • deleting/moving files
  • sending/receiving network traffic
  • os system calls and console commands
  • interacting with hardware
  • spawning new processes
  • displaying things on the screen
  • accessing timing information

Obviously there's legitimate uses for each of these, so that's just the first step.

Next, analyze the data that is being used for that:

  • what's the source?
  • what's the destination?
  • what kind of transformations are being applied to the data?

Then you can watch out for things like:

  • is it systematically going through directories and doing some operation to all files? (Maybe ransomware, data scrubbing, or just maliciously deleting stuff?)
  • is it grabbing data from somewhere and sending it somewhere else on the internet? (Stealing data?)
  • is it using timing information to build data? (Timing attacks to figure out kernel data that should be hidden?)
  • is it changing OS settings/setup?

Then generate a report of everything it is doing and see if it aligns with what the code is supposed to do. Or you could even build some kind of permissions system around that with more sophistication than the basic "can this app access files? How about the internet?"

Computer programs can be complex, but are ultimately made up of a series of simple operations and it's possible to build an interpreter that can do those operations and then follow everything through to see exactly what is included in the massive amount of data it sends over the network so that you can tell your file sharing program is also for some reason sending /etc/passwords to a random address or listening for something to access a sequence of closed ports and then will do x, y, z, if that ever happens. Back doors could be obvious with the right analysis tools, especially if it's being built from source code (though I believe it's still possible with binaries, just maybe a bit harder).

view more: next ›