GenitalHurricane

joined 1 year ago
[–] GenitalHurricane@lemmy.world 11 points 1 week ago

This comment makes me sad because you are probably right. Mashinky it is!

[–] GenitalHurricane@lemmy.world 54 points 1 week ago* (last edited 1 week ago) (4 children)

Worth mentioning to anyone who is excited for a possible new version of this title but hates AAA ethics, OpenTTD is FOSS and pretty good.

Alternatively if you'd like a modern take on this, Mashinky is super good and was made by a 1-man studio. It's also beautiful. (And multiplayer!)

[–] GenitalHurricane@lemmy.world 8 points 4 months ago (1 children)
[–] GenitalHurricane@lemmy.world 5 points 4 months ago (3 children)

So nothing ... Ok

[–] GenitalHurricane@lemmy.world 14 points 4 months ago (8 children)

This loser works cashier at a gas station in a racist town until evidence is provided to counter my obvious facts

[–] GenitalHurricane@lemmy.world 11 points 4 months ago

Ah yes, delete your original incorrect comment instead of continuing the discussion about how wrong and lazy it was to make, nice.

[–] GenitalHurricane@lemmy.world 100 points 4 months ago* (last edited 4 months ago) (2 children)

Libmanwe-lib.so is a library file in machine language (compiled). A Google search reveals that it is exclusively mentioned in the context of PDD software—all five search results refer to PDD’s apps. According to this discussion on GitHub, “the malicious code of PDD is protected by two sets of VMPs (manwe, nvwa)”. Libmanwe is the library to use manwe.

An anonymous user uploaded a decompiled version of libmanwe-lib to GitHub. It reads like it is a list of methods to encrypt, decrypt or shift integer signals, which fits the above description as a VMP for the sake of hiding a program’s purpose.

In plain words, TEMU’s app employed a PDD proprietary measure to hide malicious code in an opaque bubble within the application’s executables

[–] GenitalHurricane@lemmy.world 18 points 4 months ago (1 children)
  1. Dynamic compilation using runtime.exec(). A cryptically named function in the source code calls for “package compile”, using runtime.exec(). This means a new program is created by the app itself.—Compiling is the process of creating a computer executable from a human-readable code. The executable created by this function is not visible to security scans before or during installation of the app, or even with elaborate penetration testing. Therefore, TEMU’s app could have passed all the tests for approval into Google’s Play Store, despite having an open door built in for an unbounded use of exploitative methods. The local compilation even allows the software to make use of other data on the device that itself could have been created dynamically and with information from TEMU’s servers.
[–] GenitalHurricane@lemmy.world 10 points 6 months ago

Great timing on this article and a new episode about Tyson from one of my favorite podcasts

https://pca.st/episode/f7d0725d-dcf7-4d63-8db3-269401469e4b

[–] GenitalHurricane@lemmy.world 32 points 11 months ago (1 children)

Came to the comments for the 'blame USA' and was not disappointed.

Own your own policy flaws. Own your own nutters.

100% recommend a professional test and not just disposable things. They'll set up a few machines on tripods for a few days and you'll get to see highs/lows in different rooms instead of just a yes/no or a peak value. Can really help make a good decision about mitigation

view more: next ›