ExperimentalGuy

joined 2 years ago

Im saving this comment for sure

[–] ExperimentalGuy@programming.dev 2 points 1 week ago (1 children)

Make sure you report this to ffmpeg directly at this link: https://ffmpeg.org/bugreports.html

It's Richard of course.

I feel like this is the way. It ensures you get exposed to multiple paradigms and can help you easily switch to a language that's more invested in one paradigm.

[–] ExperimentalGuy@programming.dev 4 points 1 month ago (1 children)

You can check goodfirstissue for anything that might pique your interest. That's where I started, and it helped a lot to get used to issue tracking systems.

[–] ExperimentalGuy@programming.dev 8 points 1 month ago (1 children)

I feel like you hear fuckery like that more in JavaScript.

[–] ExperimentalGuy@programming.dev 2 points 1 month ago (1 children)

I'm mostly seeing if I can obfuscate my card details - the card limit is more of a nice feature but not needed

[–] ExperimentalGuy@programming.dev 3 points 1 month ago (1 children)

Know your customer

Any guides you can point to on how to do this?

 

Are there any FOSS alternatives to privacy.com? I want to conceal my actual card information when registering with a new account on different platforms so I can create limits, but I can't shake the feeling that privacy.com probably just sells my transaction history. If there's any alternatives to privacy.com that are more transparent, I'd love to know!

Honestly I never thought about the latency issue, but I probably won't do it because of that now that you mention it. Much appreciated.

Ooh wireguard sounds like a great option

[–] ExperimentalGuy@programming.dev 2 points 2 months ago (5 children)

I wanted to run a pi hole to use as a DNS so that I can be ad free on any device. The problem is that with my computer or with my phone, I need to put in a specific IP address when I want to change DNS on that device.

 

So I've had this idea for an API for a while but the problem I keep coming back to is authentication. I'm using rocket to actually code it. I looked through the rocket docs and it looks like the closest thing to API key authentication it has are cookies.

I then went and looked at some other APIs to see if I can copy their layouts and it looks like a lot of them use an API key and then a secret API key for authentication. Did some more googling and stackoverflow said that it's more secure to use a pair like that.

So that leaves me with the actual question: how do you actually implement this feature? Do you just generate API keys and throw them a database to be looked up later? Should they be written/read to a file to be used later(probably not a good option I'd guess).

Just for reference I'm using rocket, sqlx and postgres.

 

I've been coming back to the same project a few times. It's essentially just a program that interacts with an API. Only problem is whenever I get back to it, I realize how annoying it is to debug through all the "too many requests" responses I get back from the API because it has a max of 200 requests per second.

On solution would be to filter out those responses but that just feels like the wrong move, so I'm guessing the better solution would be to put some sort of rate limiter on my program. My two questions are: does that seem like a good solution and if it is, do I embed the rate limiter in my program, i.e. using the ratelimit crate or would a better solution be to run my program in a container and connect it to a reverse proxy(I think) container and control rate limiting from there?

 

I've been trying to learn the fuzzing library LibAFL for a while now, but I never seem to be able to fully grasp the essential parts. I've read tutorials, followed along tutorials, read the whole LibAFL book (that's still under construction), and have read a few of the examples in the repo. You could say I'm still in tutorial hell, honestly.

I'm trying to write a simple fuzzer for a malware code sample (MooBot) and I've been trying to figure out two things: how to find the input that has the maximum run time for a function, and how to not run malware directly on my computer. One of them should be more important than the other, but given my lack of expertise in LibAFL right now, I'm focused on the former. For my example, I noticed that there's a custom trim function in MooBot that helps sanitize input:

void trim(char *str)
{
        int i, begin = 0, end = strlen(str) - 1;

    while (isspace(str[begin]))
        begin++;

    while ((end >= begin) && isspace(str[end]))
        end--;

    for (i = begin; i <= end; i++)
        str[i - begin] = str[i];

    str[i - begin] = '\0';
}

This is what I test in my harness. I know I could probably logic my way into finding the input that has the max run time, but I'm using this as an exercise for LibAFL and using the rust FFI. The problem is how to deal with feedbacks and observers. I currently have this with no observers:

let mut feedback = CrashFeedback::new();
let mut objective = CrashFeedback::new();

Which simply reports an input if it crashes the program. It works for inital fuzzing, but now that I'm trying to find an input that maximizes run time this won't work. I tried to figure if there was a maximization feedback that would work with the time observer, but the only feedback that maximizes anything is the MaxMapFeedback which doesn't seem compatible with the time observer.

What I'm envisioning is something like this:

let mut observer = TimeObserver::new();
let mut feedback = MaximizeFeedback::new(&observer);

I think the solution has something to do with MapFeedbacks, but I'm not exactly sure how they work.

 

This is going to sound fishy.

Recently getting into cybersecurity things and have been pretty interested in looking at malware and maybe making some myself to get the hang of it. Do you guys know any good repositories with malware to learn from? For example, if I wanted to make a credential stealing program, there's a lot of different programs that may have credentials that are valuable. Or, maybe writing a keylogger? I took a look at a rust crate that can record keystrokes but has kind of a weird (or at least not as easy) type system because of different OS implementations, but how do different types of malware consolidate those differences?

I guess the broader question I'm getting at specifically is looking at how already made programs get around different technical obstacles like detailed above.

Thanks

 

I went to my local library today and noticed there's a lot of networking, cybersecurity, tcp/ip books from the early 2000s. Now, I want more modern versions of these types of handbooks. Does anyone know any good modern handbooks that deal with networking or network security standards?

Thanks :)

 

I wanted to get others' takes but it seems like the only real way to get a non-spying car is to get an older car without any sort of telemetrics. I saw a video about different car companies' security policies, well specifically the new Mental Outlaw video, and it just blew me away how even our cars aren't safe. Anyone got tips for how to anonymize their car?

 

I've seen a lot of different enterprise and personal use distros for servers, but what do you guys use?

I'm planning on using Debian but was wondering if there are any other good free options to consider.

 

I've been looking around to find a good, privacy respecting way to sync my messages between phones. I decided I'm going to use SyncThing so I don't have to mess around with a server. The only problem with this is that I haven't been able to find any apps that work on modern Android that routinely backup and import messages from a file/folder into the messages database. Does anyone know any app that might do this?

 

I've been trying to find something that allows me to see performance visualizations in my rust programs, but I haven't found any so far. I'm looking for something that's like SnakeViz in Python, but for Rust. If there's a better way to get about doing this, I'm all ears.

view more: next ›