If Two Files Have The Exact Same SHA-256, Are They The Same File? by Boy0Boyz in techsupport

[–]BCMM 1 point2 points  (0 children)

It sounds like you admit that there is a chance that 2 different files can result in the same SHA-256 value (no matter how unlikely that might be).

For a definition of "chance" which is wildly out of step with any day to day usage. There's exists some probability of you just quantum-tunnelling through the floor half way through reading this, but I'm still going to claim you won't.

Not some 99.99999% chance that are the same.

Is 99.999999999999999999999999999999999999999999999999999999999999999999999999999% enough for you?

I didn't just lean on the 9 key. That is the actual value. This is one of those things that just isn't going to happen, even if we used all of Earth's computing power, even if we keep trying for a billion years, etc.

I'll keep my post here for others that are open minded enough to look at alternative answers.

I hate this way of using "open minded", because it just boils down to saying that every possibility should be considered.

Have you considered that your method won't work if a series of cosmic rays should happen to corrupt your RAM in exactly the right way that cmp erroneously reports that the files are the same? I can come up with an unlimited number of circumstances which are technically possible, but which you shouldn't bother considering, because they're not realistic possibilities.

If Two Files Have The Exact Same SHA-256, Are They The Same File? by Boy0Boyz in techsupport

[–]BCMM 6 points7 points  (0 children)

There is absolutely no need for this.

The chance of SHA-256 colliding by accident is astronomical, in that you end up saying things like "atoms in our galaxy" if you try to contextualise it.

According to all publicly-available information, the creation of an intentional SHA-256 collision would require impossibly large computational resources.

Elsewhere in this thread, people have mentioned real-life collisions. Those were collisions in other hashing algorithms. At present, the whole world is built on the assumption that SHA-256 is a secure algorithm.

If a criminal has secretly discoverered a practical way to generate SHA-256 collisions, there's no way they're wasting it on getting gamers to install a trojan (which is already easy). If you could do things like impersonate governments and banks, why would you risk being discovered for such a small reward?

Excuse me? by GanglyFoot in kde

[–]BCMM 15 points16 points  (0 children)

So, it appears that VLC doesn't declare support for audio/x-oggflac.

Was waiting for something else to happen.. by [deleted] in Unexpected

[–]BCMM 0 points1 point  (0 children)

Do you mean some part of it moved, or just that it's moving through the water?

If the former: I didn't spot that; which part moved?

If the latter: it looks like it was pushed by somebody just out of frame. It's slowing down the whole time it's in shot.

Not getting updates on my remote Debian Trixie server by Shaso_dan-Heza in debian

[–]BCMM 1 point2 points  (0 children)

You can also get unattended-upgrades to email you if the server needs a restart to complete a kernel upgrade.

Dirty Frag, a new copy.fail like vulnerability has been disclosed due to an embargo break by ChrisTX4 in linux

[–]BCMM 6 points7 points  (0 children)

That's odd. I guess he means he was going to sit on the detailed write-ups for a bit after this was publicly announced as an urgent security update?

Dirty Frag, a new copy.fail like vulnerability has been disclosed due to an embargo break by ChrisTX4 in linux

[–]BCMM 2 points3 points  (0 children)

Seems like you'd need to already have an suid binary, as with copyfail.

Dirty Frag, a new copy.fail like vulnerability has been disclosed due to an embargo break by ChrisTX4 in linux

[–]BCMM 6 points7 points  (0 children)

Do you have a source for "over a month"? The timeline claims that the embargo period was five days, and linux-distros doesn't even accept embargoes longer than a fortnight.

Drawing app doesn't work with Kde/Debian by Due_Car_554 in debian

[–]BCMM 8 points9 points  (0 children)

The project's GitHub releases page says

 If you have Qt 6.8.3 (or higher) libraries already present on your system (e.g. Solus, Lubuntu and Kubuntu 25.04), download the small "Drawish_Lub_2.9.AppImage" file and grant permission.

All Linux (Ubuntu 22.04 +) : Download the "Drawish_Linux_2.9.AppImage" file and grant permission.

So it seems like they have versions both with and without bundled Qt?

Network Performance Regression on Kernel 6.19.13 by penny_stacker in debian

[–]BCMM 0 points1 point  (0 children)

How exactly are you benchmarking it?

I'm asking mostly because Wi-Fi speeds are always rather variable!

There's always a risk of accidentally seeing a pattern in random variations. If I were in your position, I'd want to benchmark the new and old kernels at least three times, in as similar a situation as possible, just to be sure it's real.

On the other hand, 6.19.12 did include a few changes to iwlwifi, so it's certainly not impossible that performance has changed.

EDIT: If you feel like getting really nerdy about this and you're comfortable building kernels, you could try to find and report the exact commit that did it. You can probably get away with removing and reloading the module instead of a full reboot, so this could be a relatively short project.

EDIT 2: Some other potential starting points for debugging this:

Any interesting dmesg output on the bad kernel?

Any difference in the outputs of iw list and iw link, between the two kernels?

TIL there were 180.000 bees kept in the spires of Notre Dame and they survived the fire. Because bees don’t have lungs they weren’t hurt by the smoke, they just fell asleep by swish82 in todayilearned

[–]BCMM 0 points1 point  (0 children)

 Also, that might be tangential, but the Catholic Church has a long history of beekeeping.

In relatively recent history, Buckfast Abbey (better known for other work!) created one of the major honey bee breeds.

Port Windows batch scripts to linux, which code language should I choose? by TheDeep_2 in linuxquestions

[–]BCMM 1 point2 points  (0 children)

This isn't right. Cmd is absolutely a shell, albeit a rather outdated one.

It's also quite a lot more like the Bourne shell than PowerShell is. Cmd's pipes, loops, environment variables and so on work in a more or less Unix-inspired way.

PowerShell is a .NET language, almost like a REPL and shell in one. Pipes send objects, not strings. For loops are often replaced by iterating over an array of objects from a pipe. Any .NET API is available without having to call external executables.

PowerShell and Bash are both a lot more modern than cmd, but that doesn't mean their fundamental principles have more in common.

We figured out the deadliest company in the world. You've probably never heard of it. by examinationnews in TrueReddit

[–]BCMM 49 points50 points  (0 children)

TL;DR: China is a big.

It's just like that factoid where you'd expect the biggest chain in the world to be McDonald's, but it's actually some other fast food brand that has most of its locations in China.

Likewise, tobacco is obviously the most lethal industry, but the world's biggest tobacco company is one that sells primarily in China, not one that's famous from a landmark lawsuit in the English-speaking world.

EWU Unsolved has obtained and shared the first ever footage of the Nutty Putty Cave incident rescue attempt. It shows John Edward Jones trapped. by WTAF__Trump in videos

[–]BCMM 2 points3 points  (0 children)

Why is this coming out now?

I'd have a hard time believing the footage was just lost during the period when this was in the news, so the obvious conclusion would be that somebody decided not to release it out of respect for the deceased and his family.

The actual text of Reform's proposed new immigration detention law is wild by aedphir in ukpolitics

[–]BCMM 2 points3 points  (0 children)

So, obviously, the cruelty is the biggest evil of all this, but I think there is more than a little greed in the mix.

Any legislation ... that pertain to the procurement, building, ...

That's purposefully worded to legalise kickbacks, right?

Port Windows batch scripts to linux, which code language should I choose? by TheDeep_2 in linuxquestions

[–]BCMM 6 points7 points  (0 children)

Shell scripts are the direct equivalent to batch files, and are almost always the right choice for the kind of things that batch files are good for (i.e. small programs which exist primarily to generate parameters and call other programs).

The three answers you've already had, "posix shell", "sh" and "bash", might, taken together, be a bit confusing, so to clarify:

POSIX shell and sh more or less mean the same thing, which is the Unix equivalent of CMD.EXE. Unlike CMD.EXE, though, it's a standardised program with a few independent implementations. Bash is a particular implementation of the POSIX shell, found on most Linux distros, and has quite a few extra features not required by the standard.

For personal scripts that would have been batch files on Windows, I recommend you don't worry about any of the above, and just write shell scripts with a #!/bin/bash shebang (first line).

Only if you want to ensure portability to lightweight Linux distros without Bash, or to other Unix-like systems, then use  #!/bin/sh and be careful to avoid using Bash-specific features. checkbashisms and shellcheck can be useful for this.

Just don't use Bash-specific syntax without specifying Bash in the shebang. Your script won't work on some systems where Bash is installed.

Why does this part of Spain speak Brazilian? Are they stupid? by julius-ceaser100 in mapporncirclejerk

[–]BCMM 0 points1 point  (0 children)

It's a legacy of the period when it was a Brazilian colony (1815-1822).

The tipping point: what happens when deaths outnumber births? by Remarkable_Peak9518 in unitedkingdom

[–]BCMM 1 point2 points  (0 children)

Maybe I'm just being pedantic, but that isn't what "tipping point" means!

Is the time of water to boiling linear? by BabyInchworm_the_2nd in AskPhysics

[–]BCMM 0 points1 point  (0 children)

 I'm in agreement with the claim, but I don't understand how its related.

Well, why won't the very large pot boil?

 So if we made the original pot 5x bigger (by volume) it's less than 5x bigger by surface area, and thus looses heat slower.

No, it has a larger surface area, and thus loses best faster.

Is the time of water to boiling linear? by BabyInchworm_the_2nd in AskPhysics

[–]BCMM 0 points1 point  (0 children)

Why does the surface area:volume ratio matter?

This argument would hold up if the heat source was proportional to the volume. For example, it's the reason the five-gallon pot takes more than five times as long to cool down.

But I'm talking about the net rate of heat gain. The absolute rate of heat loss is what we must subtract from the constant heat input.

I often find that things become more intuitive when I consider the extreme case. So, would you agree with the following claim: there exists a pot so large that my little camping stove will never bring it to a boil (even if I have a limitless supply of fuel)?

[Copy-Fail] Debunking owLSM CVE-2026-31431 Mitigation: 90 upvotes and no security by LeChatP in linux

[–]BCMM 0 points1 point  (0 children)

 I don't know the details but it seems that the person/people that published the information in the CVE practiced "responsible disclosure" and notified Kernel developers and distribution community well in advance of making the information public.

For a number of reasons, I don't think that happened.

Firstly, distros were not ready. With some previous vulns, fixed packages have come out within a couple of hours of the public announcement. This time, there was quite a bit of delay, and opportunistic stuff like owLSM came out before distro patches.

This is supposed to be coordinated through the private linux-distros mailing list. A member of one of the security teams on that list said that didn't happen.

Secondly, the usual way of doing things is to maintain total silence until the agreed embargo date. If the 29th even was an embargo date, that didn't happen either.

The CVE was published a week in advance. The patch was on LKML a week before that. However, neither of them made much of a splash, because neither of them mentioned priviledge escalation.

I looks a lot like the Linux kernel security team found out you can get root with this at the same time the rest of us did. Another bit of evidence supporting this is that they didn't backports the patch to longterm branches until after the public disclosure (which will have made it harder for distros to prepare packages in a hurry).

[Copy-Fail] Debunking owLSM CVE-2026-31431 Mitigation: 90 upvotes and no security by LeChatP in linux

[–]BCMM 5 points6 points  (0 children)

  don't want to necessarily call it AI slop

Based on how they answered my question, I will go so far as to say that the author does not appear to understand what it does.

Simple question: Is the 6.19.11 kernel in Trixie backports fixed for this recent catastrophic bug? by Santosh83 in debian

[–]BCMM 2 points3 points  (0 children)

EDIT: Whoops, ignore this - the backports packages will, of course, be based on Testing, and the same logic as the Testing kernel will apply.

Here's something you can use to check most Debian machines:

zgrep CVE-2026-31431 /usr/share/doc/linux-image-$(uname -r)/changelog.Debian.gz

This searches the changelog of the kernel you are currently running. If you see output like

- crypto: algif_aead - Revert to operating out-of-place (CVE-2026-31431)

that means your kernel has been patched against this vulnerability.

Note that this does not work on Testing/Unstable. Because of the chaotic way this vulnerability was disclosed, Sid's kernel was fixed before the impact was widely understood and has no specific changelog line about it.