rowdyrockets

joined 1 year ago
[–] rowdyrockets@lemm.ee 5 points 7 months ago* (last edited 7 months ago) (4 children)

Yes, because my OLED’s speakers sound terrible. Especially when compared the LED I had previously.

I use a Bose QC45.

See this if your interested in knowing more: https://github.com/ValveSoftware/SteamOS/issues/1329

[–] rowdyrockets@lemm.ee 5 points 7 months ago (1 children)

Proton mail and wallet are working for me.

[–] rowdyrockets@lemm.ee 6 points 8 months ago* (last edited 8 months ago)

50? I’m going on 30 and I realized that 3 years ago. Hopefully more and more younger folk realize sooner and sooner.

[–] rowdyrockets@lemm.ee 42 points 8 months ago (8 children)

I’ll add 2 more that resonate with me:

  1. Discussions of distributing copyright material is banned. (Not actually sharing, obviously that is illegal, but they’ve banned the mere discussion of it.)
  2. They have not defederated from Meta’s Threads
[–] rowdyrockets@lemm.ee 5 points 8 months ago (1 children)

You can on any iOS device without jailbreaking. Look into AltStore or Sidestore. The caveat is that you can only sign 3 apps at a time, and must resign these apps every week - which is done over your WiFi to a PC running AltStore server.

If you have a $99/year Apple developer account, you can use AltStore to sign as many apps as you like, and you only need to resign once per year.

[–] rowdyrockets@lemm.ee 4 points 9 months ago (1 children)

Hey! There are dozens of us!

[–] rowdyrockets@lemm.ee 4 points 9 months ago* (last edited 9 months ago)

Was CVE-2024-44133 Already Exploited?

After concocting their exploit, Microsoft started scanning customer environments for activity that aligned with what they'd found. On one device, lo and behold, they spotted something quite closely resembling what they were looking for.

It was a program digging into the victim's Chrome configuration settings, adding approval for microphone and camera access to a specific URL. It also did more: gathering user and device information, laying the groundwork for a second-stage payload.

I’m not sure if this article is disingenuous or if I’m just confused… but it states when MS scanned their customers’ environments, they discovered malware making changes to the Chrome config. And the Safari CVE was patched in September. So we don’t have proof of this happening in the wild then?

What’s more, the Safari exploit requires making changes to a protected directory. But no indication of how that is done by just the browser exploit. Did the attackers already have access to the machine? If so, this article is a nothing burger.

[–] rowdyrockets@lemm.ee 5 points 9 months ago (1 children)

That wasn't condescending. They are telling you that you are wrong, which you are. It's okay to be wrong - it's how you handle it that matters...

[–] rowdyrockets@lemm.ee 5 points 9 months ago (1 children)

Yeah that's what they said. You're the one who said lifetime, which was never true.

[–] rowdyrockets@lemm.ee 7 points 9 months ago* (last edited 9 months ago) (1 children)

AppleCare still exists. So this is misinformation.

And just as an anecdote, I have not felt like Apple has ever “pulled the rug out” on me and I’m an Apple product consumer. Are you?

[–] rowdyrockets@lemm.ee 104 points 9 months ago (4 children)

This article boils down to “man enables feature, is slightly surprised when feature functions.”

view more: ‹ prev next ›