harrysintonen

joined 2 years ago
 

As expected #Apple has nuked Advanced Data Protection (ADP) for UK users. What does this mean in practice? UK govt will be able to decrypt all UK user's #iCloud data at will.

Existing users' access will be disabled at a later date - this will likely mean that unless if you accept the new policy Apple will delete your existing iCloud data. Which I would recommend you do right now anyway - never trust someone else's computer with sensitive data.

https://www.bbc.com/news/articles/cgj54eq4vejo

#cybersecurity #privacy #enshittification

 

#OpenSSH client is vulnerable to MitM attacks if VerifyHostKeyDNS is enabled - https://www.openwall.com/lists/oss-security/2025/02/18/1

#CVE_2025_26465 #coordinateddisclosure #infosec #cybersecurity

 

#Nordnet - nordic digital platform for savings and investments - had an issue where people could see each others information. The website has been taken down for now.

https://www.nordnet.fi/

#infosec #infosecurity #cybersecurity #privacy

 

Another reminder to keep your critical content out of the cloud - Do no trust someone else's computer.

https://www.msn.com/en-us/news/technology/uk-orders-apple-to-let-it-spy-on-users-encrypted-accounts/ar-AA1yzETB

#apple #icloud #privacy

 

In my youth I wrote m68k assembly programs with tens of thousands of lines and speed optimized every section of the code, even initialization/cleanup executed exactly once. It was very very silly. It was a lot of fun.

#development #assembly #coding #programming

 

#cURL doesn't validate SSH host identity if known_hosts file is missing. I think this is a #vulnerability, but the project disagrees. Advisory is here: https://sintonen.fi/advisories/curl-ssh-insufficient-host-identity-verification.txt

#infosec #cybersecurity #nocve

 

Easy prediction: Lesser #NVIDIA 5000 series graphics cards will suck since multi frame generation won't really help due to increased latency (not to mention the added artifacting). Unfortunately it's likely that many non-experts will drink the NVIDIA "RTX4070 better than RTX4090" kool-aid.

https://youtu.be/B_fGlVqKs1k "Hardware Unboxed - Is DLSS 4 Multi Frame Generation Worth It?"

#gaming #dlss #framegeneration

 

Warning: Do not trust *.g.co urls! #GoogleWorkspace domain verification seems to be quite lax and allow arbitrary .g.co to be created. This allows for extremely convincing #phishing to be performed where all communication appears to be coming from "google".

ref. https://gist.github.com/zachlatta/f86317493654b550c689dc6509973aa4

#infosec #cybersecurity

 

Apparently there's a major #vulnerability in #AMD CPUs: "AMD Microcode Signature Verification Vulnerability."

The vulnerability was leaked by #ASUS in their beta BIOS changelog:

https://web.archive.org/web/20250106151231/https://rog.asus.com/motherboards/rog-strix/rog-strix-x870-i-gaming-wifi/helpdesk_bios/

ASUS has since removed this entry from the changelog since it likely broke the embargo. Either way, this is not great as the new firmware is largely not yet available and likely won't be for a long while.

#infosec #cybersecurity

 

If you're using #Adobe #Acrobat you might want to check if your organization allows use of the by default enabled generative AI features: Acrobat sends the documents to cloud for processing, which likely goes against the data #privacypolicy of many orgs.

If unsure, go to Preferences > Generative AI and deselect "Enable generative AI features in Acrobat".

https://helpx.adobe.com/acrobat/using/disable-generative-ai.html

#privacy #defaults #enshittification

[–] [email protected] 4 points 5 months ago (1 children)

@[email protected] Oof, that's not good at all.

 

Apparently #macOS now considers #Docker malware.

#infosec #cybersecurity

 

The #Volkswagen #geolocation leak is a great example of why I am such a Luddite when it comes to sharing data with companies. I use as few cloud services as possible (for example, with Apple, I only use the "Find My" service from iCloud).

Even if you make an informed decision to share your data with a company, the data can still leak by accident or through a system compromise. The unfortunate fact is that these days, many services are made difficult or even impossible to use without accepting excessive data sharing.

https://www.carscoops.com/2024/12/vw-group-data-breach-exposed-location-info-for-800000-evs/

#privacy #GDPR #infoleaks #volksdaten

[–] [email protected] 1 points 7 months ago (1 children)

@[email protected] it's restricted for other than macOS, it seems. In macOS it worked fine with location in Finland.

[–] [email protected] 1 points 7 months ago

So far all my Apple Intelligence tests have been using a local model. The privacy report from Setting > Privacy & Security > Apple Intelligence Report > Export Activity generates JSON with:

{
"modelRequests": [],
"privateCloudComputeRequests": []
}

#appleintelligence #privacy

[–] [email protected] 1 points 7 months ago (3 children)

@[email protected] Really? It works for me and I'm in Finland, part of European Union. My account is indicates this as well.

[–] [email protected] 1 points 7 months ago

@[email protected] Nah, but there's another booze bottle in the game that is exact same alcvol as Koskenkorva. They are of course actively avoiding trademark issues by creating their own labels and trademarks for items.

[–] [email protected] 1 points 7 months ago

Here's a way to check if the #Spotlight searches are being shared with #Apple from the command line:

defaults read com.apple.assistant.support "Search Queries Data Sharing Status"

The values are:

1 - Enabled (data is being shared)
2 - Disabled (data is not shared)

NOTE: I do not know if there are other possible values, or what happens if the key is missing.

[–] [email protected] 1 points 7 months ago (1 children)

From "About Search & Privacy...":

"Search and Privacy

Search is designed to protect your information and enable you to choose what you share.

To Make Search Results More Relevant, Some Information Is Sent to Apple and Not Associated with You

When you use Look Up or Visual Look Up, when you type in Search, Safari search, #images search in Messages, or when you invoke Spotlight, limited information will be sent to Apple to provide up-to-date suggestions. Any information sent to Apple does not identify you, and is associated with a 15-minute random, rotating device-generated identifier. This information may include location, topics of interest (for example, cooking or basketball), your search queries, including visual search queries, contextual information related to your search queries, suggestions you have selected, apps you use, and related device usage data. This information does not include search results that show files or content on your device. If you subscribe to music or video subscription services, the names of these services and the type of subscription may be sent to Apple. Your account name, number, and password will not be sent to Apple.

You can also search using Siri, such as by asking Siri to look up general knowledge or do things like get directions. When you use Siri, the transcript of your request and other data may be sent to Apple to process your request and may be stored. You can learn more about how Siri handles your data by going to Settings > Apple Intelligence & Siri.

Information sent to Apple related to your searches is used to process your request and to develop and improve search results, such as by using your search queries to fine-tune Search models. It is not linked to your Apple Account or email address.

Aggregated information may be used to improve other Apple products and services. Apple may also send a limited, randomly sampled set of search queries to search tools for the purpose of evaluating and improving the performance and quality of Search.

Search Engine Suggestions in Safari

Safari has a single field for searches and web addresses so you can browse the web from one convenient place. When Search Engine Suggestions are enabled, Safari will ask your selected search engine for suggestions based on what you’ve typed.

Preload Top Hit in Safari

With Preload Top Hit enabled, as soon as Safari determines a Top Hit based on your bookmarks and browsing history, Safari will begin loading the webpage in the background. If you disable this option, the page will load normally.

You Have Choice and Control

If you do not want your search queries to be stored by Apple and used to improve Search, you can disable Improve Search by going to Settings > Search and tapping to turn off Improve Search. Searches you make through Siri will still be stored and used to improve Siri if you have enabled Improve Siri & Dictation. You can disable Improve Siri & Dictation by going to Settings > Privacy & Security > Analytics & Improvements and tapping to turn off Improve Siri & Dictation.

If you do not want web-based content and search results, you can disable “Show in Look Up” and “Show in Spotlight” by going to System Settings > Search and tapping to turn off those features.

You can disable Safari Suggestions in Safari by going to Safari > Settings > Search and deselecting Include Safari Suggestions.

You can disable Location Services for Search by going to System Settings > Privacy & Security > Privacy > Location Services, then clicking Details next to System Services and turning off Suggestions & Search. If you turn off Location Services on your device, your location will not be sent to Apple.

Apple may process and store the information that is sent to Apple with trusted third-party service providers.

By using Siri Suggestions in Search, you agree and consent to Apple’s and its subsidiaries’ and agents’ transmission, collection, maintenance, processing, and use of this information. At all times, information collected by Apple will be treated in accordance with Apple’s Privacy Policy, which can be found at www.apple.com/privacy."

#apple #privacy

[–] [email protected] 1 points 7 months ago

I just noticed that the game location (Mankila) is actually a real place in Finland: https://maps.app.goo.gl/D3dFdmt7ACokCf7d8

The shape of the lake, the buildings around it are different and there are extra islands etc, but it is clearly modelled after the real deal. That's quite cool, heh.

#FinnishCottageSimulator

[–] [email protected] 1 points 7 months ago

@[email protected] Currently there is no driving with or working on cars, but I've managed to hitch a ride from one of the NPCs. Driving the moped is quite fun until you drive into a ditch. Pulling the moped out of there is as painful as in real life... 😆

Other difference to my summer car: Currently there is no hunger, thirst, stress or similar "pressure". As it is early access I don't know if any if this will change later.

The multiplayer is ton of fun with bunch of friends.

[–] [email protected] 1 points 7 months ago
[–] [email protected] 1 points 7 months ago (1 children)

@jgrg Oops, it's u-z. Corrected the post now, thanks for pointing that out.

[–] [email protected] 2 points 7 months ago* (last edited 7 months ago) (3 children)

Some random notes after glancing over the G15D programmer’s reference manual:

- Bendix G-15 doesn't use hex, but sex: The notation is 0-9 u-z (sexadecimal).

- Section 3.2.3 goes into details on how to optimize performance: You need to carefully plan the order of instructions and data on the drums for optimal speed. The most optimal code will overlay computation and memory accesses. This reminds me of "the story of Mel". The optimization tricks done don't differ much from handcrafting optimal assembly code on more modern systems where external memory accesses are very expensive vs computation within registers.

- The addressing notation directly addresses line on the drum and offset of the word on that line. There are 20 lines with 108 29-bit words on each. Arithmetic operations operate on a separate short "register" lines that circulate much faster than the actual memory (27x speed vs memory drum).

- Considering how slow it's to process individual memory loads / stores, it makes perfect sense that the system has block copy instructions.

- Each instruction has offset within the line to the next instructions to execute. That is, there's always an explicit jump encoded in each instruction. Conditional code execution occurs by suppressing the jump when condition is met, in which case the jump is not taken and next instruction is executed instead. In modern architectures you generally execute next instructions address and there are dedicated branch instructions.

- Code execution can happen from 7 long lines (0, 1, 2, 3, 4, 5, 19) and one short line (23). Some lines have reserved roles and offsets, at least when using the libraries provided by Bendix.

- As there is no built-in stack register or stack a return address for subroutine calls must be handled manually. This is reminiscent to link register on some later platforms (such as PowerPC). It of course is entirely possible to manually maintain a stack on some line, dedicating some fixed address as stack pointer. All code must then agree on this decided calling convention.

- Punched (paper) tape and magnetic tape is available for input, as well as typewriter (console). Output can be (IBM) punch cards, magnetic tape or typewriter (console). The typewriter also has some switches for control.

#retrocomputing #programming #bendixg15

view more: ‹ prev next ›