●● IRC: #techbytes @ Techrights IRC Network: Saturday, October 01, 2022 ●● ● Oct 01 [01:58] *Noisytoot has quit (Ping timeout: 2m30s) ● Oct 01 [02:00] *Noisytoot (~noisytoot@tkbibjhmbkvb8.irc) has joined #techbytes [02:06] *Noisytoot has quit (Ping timeout: 2m30s) [02:08] *Noisytoot (~noisytoot@tkbibjhmbkvb8.irc) has joined #techbytes ● Oct 01 [05:06] *GNUmoon2 has quit (Ping timeout: 2m30s) [05:20] *GNUmoon2 (~GNUmoon@h7d662wwz5dp4.irc) has joined #techbytes ● Oct 01 [07:12] schestowitz
[07:12] schestowitz[07:12] schestowitzRecently, the Fedora Project removed all patented codecs from their Mesa builds, without the rest of the communitys input. This decision was heavily criticized from the community. For that decision, some even asked the Fedora Project to remove community driven from its official description. Id like to spend some time to explain why, in my opinion, this decision was completely justified, and how [07:12] schestowitz the Fedora Project remains community driven.
[07:12] schestowitz
[07:13] schestowitz[07:13] schestowitzAs great as 35mm slides were, they dont have much of a place in our modern world. Not many people have working slide projectors these days and most would prefer digital photos that they can share on social media, store on their computer, or display on a TV. There are 35mm slide digitizing services, but those can cost more than 50 cents (USD) per slide. That becomes very expensive if your slide collection [07:13] schestowitz is large. If you have a slide projector, even if its projection bulb is burnt out, this tutorial will help you digitize the slides by snapping photos with a modern DSLR camera.
[07:13] schestowitz
[08:06] schestowitz[08:06] schestowitzA blog post issued by the Microsoft Security Response Centre on Thursday said the first, identified as CVE-2022-41040, was a Server-Side Request Forgery vulnerability
[08:06] schestowitzThe second, identified as CVE-2022-41082, allowed remote code execution when PowerShell was accessible to the attacker.
[08:06] schestowitz
[08:16] schestowitz[08:16] schestowitzBack in 2018, we learned that covert system of websites that the CIA used for communications was compromised byat leastChina and Iran, and that the blunder caused a bunch of arrests, imprisonments, and executions. Were now learning that the CIA is still using an irresponsibly secured system for asset communication.
[08:16] schestowitz
[08:17] schestowitz[08:17] schestowitzIn 2022, we learned from Reuters journalist Joel Schectman that a CIA asset who was captured in Iran, and subsequently served seven years in prison, communicated with his agency handlers via a hidden communications app on a website iraniangoals[.]com. Reuters reports that Irans compromise of the network may have led to the assets capture. We investigated the website in an effort to understand the [08:17] schestowitz vulnerabilities leveraged by Iran and China, and to learn whether the United States had been using an irresponsibly secured system for asset communication. Our investigation, led by Citizen Lab senior researcher Bill Marczak, confirmed the reports of a fatally insecure network.
[08:17] schestowitzWe shared our findings with Schectman, whose Reuters story can be found here: Americas Throwaway Spies: How the CIA failed Iranian informants in its secret war with Tehran.
[08:17] schestowitz