lemann

joined 11 months ago
[–] lemann@lemmy.dbzer0.com 1 points 10 months ago (2 children)

That makes sense! In my case I actually needed to turn down my iron temps for the lead-free solder, previously had it ridiculously high from when I was trying to work with the cheap no-name solder.

This new lead free stuff is great, it comes with a price tag but it's eons better than the no-name stuff IMO.

I have flux (syringe type) but I have no idea if I'm using it correctly, or if it's just not that great. Haven't noticed too much of a difference when soldering with it, apart from needing to brush off the circuit board with some contact cleaner to remove the residue

[–] lemann@lemmy.dbzer0.com 113 points 10 months ago (17 children)

Hands up if you/someone you know purchased a Steam Deck or other computer handheld, instead of upgrading their GPU πŸ™‹β€β™‚οΈ

To be honest I stopped following PC hardware altogether because things were so stagnant outside of Intel's alder lake and the new x86 P/E cores. GPUs that would give me a noticeable performance uplift from my 1060 aren't really at appealing prices outside the US either IMO

[–] lemann@lemmy.dbzer0.com 19 points 10 months ago

Personally I use Stevenblack's default one, in combination with a personal one that i've curated since 2019. Previously I used to use MVPS, however that list's included in the SB default.

Stuff that tends to slip through the cracks with a lot of the common lists includes things like admiral 🀬, user session recorders, and app monitoring platforms like sentryio (useful for development, but I didn't consent my activity being recorded). There's also Bauer Media Group garbage that I've resorted to creating firewall packet inspection rules for, because they're using a subdomain technique that's even worse than Admiral's autogenerated domains - at least with those you can use DNS analysis tools like dnsdumpster to uncover the rest of autogenerated domains in that batch

[–] lemann@lemmy.dbzer0.com 13 points 10 months ago

They've got some pretty interesting stuff in the pipeline, like container tabs optionally being hooked up to their own independent Mozilla VPN connection.

IMO I think they're going to go all in eventually offering a kind of "privacy ecosystem" similar to Proton

[–] lemann@lemmy.dbzer0.com 6 points 10 months ago

That machine looks slick af πŸ‘Œ I find linux distros are so much nicer to use when the hardware itself feels great. Enjoy!

[–] lemann@lemmy.dbzer0.com 40 points 10 months ago (9 children)

That’s when Lamego went on to start his own company, True Wearables, which Masimo claimed used its technology when developing the Oxxiom, a wireless and disposable pulse oximeter.

Excuse me, a wireless and disposable pulse oximeter?

I wouldn't be surprised if this Marcelo person is a millionaire with that kind of twisted thinking. Disposable vapes are bad enough - those devices literally contain rechargeable Lipo batteries, and now this individual starts his own company and one-ups that with disposable, wireless medical equipment?

Just wow

[–] lemann@lemmy.dbzer0.com 29 points 10 months ago (5 children)

Indeed, even worse consideeing just last week they recalled a ton of vehicles because of faulty airbags, and a month ago issued another recall for 12V batteries catching fire

[–] lemann@lemmy.dbzer0.com 6 points 10 months ago

To summarize the explanations i've come across: It's tailored to Google's internal teams maintaining tons of legacy C++ code, doesn't cover exception handling, and generally has outdated advice best suited for the code they developed in that time period. While their style guide is ideal for maintaining consistency with Google's existing codebase, someone working on a modern C++ project should consider using the language's more modern features and STL components

Something I'd want to note though, someone developing in C++ for an embedded platform or even working on hardware drivers would probably have very lean and mean code which doesn't conform to a particular style guide, especially ones advising against use of "unsafe" operations.

[–] lemann@lemmy.dbzer0.com 10 points 10 months ago (3 children)

Edit: Except google's style guide

This legit made me laugh lol, Google's style guides for their longer standing languages are always dismissed, especially their one for C++

[–] lemann@lemmy.dbzer0.com 7 points 10 months ago (1 children)

Would recommend using an external camera to be honest.

There is a ton of software needed to get the most out of a camera, and from the little I understand about embedded image processing a lot of it happens inside proprietary blobs. You can get the image directly as an alternative, but it will look like garbage without reprocessing the input (preferably inside an open source component, with the downside of sometimes being unable to use the hardware to accelerate this)

Right now if you wanted a high quality, mostly open source Linux device with a camera, IMO you'd be looking at the Raspberry Pi, and there is still a ton of work to do. The work being done there, as well as Libcamera, the V4L2 replacement for MIPI/CSI cameras, should eventually make its way into Linux phones - but no idea when that will happen

[–] lemann@lemmy.dbzer0.com 151 points 10 months ago (15 children)

Wow, this is a very complex exploit, involving bits of iMessage and an undocumented CPU feature that allowed the attacker to evade hardware memory protection. From what I can see, Lockdown mode would have prevented this. The attacker is ridiculously skilled regardless

Exerpts from the article missing from the bot summary:

The mass backdooring campaign, which according to Russian officials also infected the iPhones of thousands of people working inside diplomatic missions and embassies in Russia, according to Russian government officials, came to light in June. Over a span of at least four years, Kaspersky said, the infections were delivered in iMessage texts that installed malware through a complex exploit chain without requiring the receiver to take any action.

With that, the devices were infected with full-featured spyware that, among other things, transmitted microphone recordings, photos, geolocation, and other sensitive data to attacker-controlled servers. Although infections didn’t survive a reboot, the unknown attackers kept their campaign alive simply by sending devices a new malicious iMessage text shortly after devices were restarted.

The most intriguing new detail is the targeting of the [...] hardware feature [...]. A zero-day in the feature allowed the attackers to bypass advanced hardware-based memory protections designed to safeguard device system integrity even after an attacker gained the ability to tamper with memory of the underlying kernel.

[–] lemann@lemmy.dbzer0.com 12 points 10 months ago (1 children)

I've used getintopc several years ago without noticing any obvious malware in the downloads, however the domain you shared starts with the letter "i" so that's probably not the original site?

view more: β€Ή prev next β€Ί