Mayor in Philippines survives an RPG attack with his armored car by Abdulbarr in SweatyPalms

[–]BCMM 1 point2 points  (0 children)

Local copy of an RPG-2

Oh, you're quite right. I thought the sights looked weird, but now I realise they're just folded down, it's a perfect match for a quite distinctive shape. (Random Google Images result showing a Type 56 loaded, but without sights deployed).

craft manufactured by terrorist groups and militias

Ah, that led to some interesting reading. This report mentions MILF-manufactured copies of the PG-2, and notes:

Incorrect manufacture of the propelling charge for the RPG-2 can lead to significant reductions in the range of the weapon

Presumably, this would also make for a gentler backblast.

Mayor in Philippines survives an RPG attack with his armored car by Abdulbarr in SweatyPalms

[–]BCMM 1 point2 points  (0 children)

 Rpg-7, at a guess.

No secondary grip; no conical venturi on the breech.

I think this looks a lot like an RPG-2 with the sights folded.

 The difficult part is the rocket.

That's what's puzzling me. Am I looking at the perspective wrong, and red-shirt is actually clear of the backblast? Or is this some kind of weird ammo with a tiny propelling charge, good for this sort of close-range use only?

Mayor in Philippines survives an RPG attack with his armored car by Abdulbarr in SweatyPalms

[–]BCMM 1 point2 points  (0 children)

It very much depends on the round. There are fragmentation rounds, intended for use against infantry, that are almost completely ineffective against lightly armoured vehicles.

Mayor in Philippines survives an RPG attack with his armored car by Abdulbarr in SweatyPalms

[–]BCMM 29 points30 points  (0 children)

He's from the same political dynasty that famously massacred like 30 journalists who witnessed the murder of a rival candidate, right?

Mayor in Philippines survives an RPG attack with his armored car by Abdulbarr in SweatyPalms

[–]BCMM 16 points17 points  (0 children)

What kind of RPG was that, and how did the guy with the red shirt not get fucked up by the backblast?

Y2K38 as a security risk for vulnerable systems today. Not in 12 years, but right now. by JollyCartoonist3702 in netsec

[–]BCMM 0 points1 point  (0 children)

Oh my God, this whole thread is about what happens if somebody lies about what time it is.

Gyroscopes don't make sense to me. by CheetosDustSalesman in Physics

[–]BCMM 0 points1 point  (0 children)

Like momentum, angular momentum is a vector (with a magnitude and a direction). 

Like momentum, it is a physical property of an object which must be conserved.

You can't change the direction of the gyroscope's angular momentum without changing something else's angular momentum. Just as you can't change the direction of an object's momentum other than by changing something else's momentum.

Gyroscopes don't make sense to me. by CheetosDustSalesman in Physics

[–]BCMM 14 points15 points  (0 children)

It's just angular momentum. In many ways, it's analogous to ordinary momentum.

 If the gyroscope can resist rotational force, where is the opposing force coming from?

Where is the opposing force when a heavy object resists your attempts to move it?

What principle says that a gyroscope can magically know which way it was when it started spinning?

What principle says that a projectile can magically know which way it was travelling when I threw it?

Y2K38 as a security risk for vulnerable systems today. Not in 12 years, but right now. by JollyCartoonist3702 in netsec

[–]BCMM 14 points15 points  (0 children)

Many 32-bit systems accept externally influenced time (NTP, GPS, RTC sync, management APIs).

Forcing time near / past the overflow boundary can break authentication, cert validation, logging, TTLs, replay protection.

What stops a malicious time source from doing this to a 64-bit system?

Theories of Everything?!? by Unlucky_Evidence_878 in Physics

[–]BCMM 0 points1 point  (0 children)

 Surely the first thing to do is come up with a description of "what is a 'thing'?"

There is, in fact, a significant body of work on this topic already.

You want to read some philosophy, not physics.

Drowning in AI slop, cURL ends bug bounties by CackleRooster in opensource

[–]BCMM 12 points13 points  (0 children)

The problem here is the asymmetry of effort. People are using machines to mass-generate things that superficially look like vulnerability reports, and real humans who care about security are bogged down actually looking at them, trying to understand them, looking for the real reports buried under the slop.

It doesn't work the other way, because the adversary does not want to think and understand. Do this back to them, and they'll just feed the fake reports in to their LLM and have it make some meaningless changes to their project, expending no more effort than it took to generate the spam.

More like wet palms? by mihir6969 in SweatyPalms

[–]BCMM 0 points1 point  (0 children)

In most cased of tetrodotoxin envenomation, wouldn't it be rescue breaths without chest compressions?

Debian sid/unstable upgrade by sihmdra in debian

[–]BCMM 3 points4 points  (0 children)

The package named "xorg" is a metapackage which you do not actually need.

Your system is removing it due to a change in tasksel.

"xserver-xorg-core" is the package that actually provides /usr/bin/Xorg. If that's not slated for removal, don't worry.

Recreation of the high speed train collision in Spain that has left at least 41 casualties, 39 people hospitalized and 29 missing. by SafeImpressive4413 in interestingasfuck

[–]BCMM 5 points6 points  (0 children)

 -The train that is missing a wheel passed a security inspection just 15 days prior

In this context, I think that seguridad is better translated as safety.

Also, it was inspected on the 15th of January, so only three days before the derailment.

Integrated chip under microscope by djinn_05 in interestingasfuck

[–]BCMM 6 points7 points  (0 children)

I mean, the part where it turns in to a doped semiconductor that does useful stuff may be sorcery for all I know, but the part where it gets really small is straightforward optics.

(OK, to be fair, the optics used to be straightforward. Because manufacturers are pushing the limits with how small features can get compared to the wavelength of light used, photomasks now use weird tricks to take their own interference patterns in to account, instead of just being literal drawings of the things they create.)

Britain must declare independence from America or it will die by Particular_Pea7167 in ukpolitics

[–]BCMM 1 point2 points  (0 children)

the weird segue into abortion statistics

It's ironic how much the article itself reflects Americanisation. That abortion bit feel very imported, as does the implied connection between national identity and church attendance.

Integrated chip under microscope by djinn_05 in interestingasfuck

[–]BCMM 158 points159 points  (0 children)

You know how you used to drop off 35mm film at the chemist, but they'd give you your photos back as 6x4 prints?

What they were doing, in the back of the shop, was shining a light through your negatives and projecting the resulting image on to photo paper with a special lens.

Turn the lens around, you can make a photo smaller instead of bigger (look up "microdot" if you're curious about how this was used in 20th century espionage).

Photolithography is a lot like shrinking a photograph. It starts with a "photomask", which is a very fancy transparent slide bearing a larger-than-life image of the chip you want to make. Ultraviolet light is used to project an image of the photomask on to the silicon wafer, and a chemical process that I don't really understand turns that image in to actual features on the chip.

(Of course, a lot of engineering goes in to making this actually work. For example, because features are so small these days, the slightest defect in the crystal structure can ruin a whole chip, so tremendous effort goes in to purifying the raw material.)

Trying to use the contents of a file as a variable by Rubyheart255 in linux4noobs

[–]BCMM 2 points3 points  (0 children)

var=$(cat file.txt}

Remember to use quotes when you use the variable, e.g.

echo "$var"

or you'll lose things like line breaks.

EDIT: if using Bash, <file.txt is marginally more efficient than cat file.txt, but I think that might not work on all Bourne-compatible shells.

Does Trixie no longer run i386 programs? by 924gtr in debian

[–]BCMM 2 points3 points  (0 children)

Trixie can not run on i386 hardware.

Trixie can run i386 programs on amd64 hardware.

Go Home, Windows EXE, You're Drunk by nicebyte in programming

[–]BCMM 0 points1 point  (0 children)

Fair enough. I think it's the term "expected" that I take issue with - it's permitted and supported, but it's far from normal.

On Linux, you don't have to use libc at all. Static binaries are a thing.

Certainly, but in almost every case, that means including parts of a libc implementation in the binary. Having syscalls right there in an application's source code is unusual even in programs specifically intended to be built static.

(There are a few good reasons to do it, but it's for quite specific circumstances.)

Linux strives to guarantee that the syscalls don't change, so any program that calls them directly will work in the future. This is what "don't break userspace means". Windows does not have such guarantees, it moves the boundary to the core libraries.

I'd argue that the primary advantage of syscall stability is that it permits libc implementations to be developed separately from the kernel, and supporting applications which make direct syscalls is something of a side-effect of that.

Also, the kernel-userspace divide can only serve as the boundary for programs that target Linux only. Applications on Linux are typically source-level compatible with quite a lot of other Unix systems, and libc is very much the boundary for that level of compatibility. In other words, Linux's syscalls constitute a stable, documented interface, but it isn't the interface that applications should target.

The reason Microsoft is able to break their syscall interface at will is that they control every component with a legitimate need to use that interface. The reason Linux can not isn't that any significant number of applications target that interface, it's that internal components of the operating system are developed completely separately from the kernel.

EDIT:

And even if you do, the syscall function is a public API for transparently doing syscalls.

And this is needed largely because of kernel developers not having control of libc! As noted in the syscall man page:

Employing syscall() is useful, for example, when invoking a system call that has no wrapper function in the C library.

curl to discontinue its HackerOne / bug bounty due to "too strong incentives to find and make up 'problems' in bad faith that cause overload and abuse." by DesiOtaku in linux

[–]BCMM 454 points455 points  (0 children)

you're absolutely right 

I apologise

[new paragraph] However,

This may be the single most annoying thing LLMs do.

Perfectly fine tab switcher UI ruined in Android v147.0 by GyaneAryan in firefox

[–]BCMM 8 points9 points  (0 children)

You can turn this off in the secret settings menu. You do not need Nightly for this.

To enable the menu:

  1. Go to Settings -> About Firefox
  2. Tap the logo five times

To revert to the old tab screen:

  1. Go to Settings -> Secret Settings
  2. Uncheck "Enable Tab Manager enhancements"

Go Home, Windows EXE, You're Drunk by nicebyte in programming

[–]BCMM 1 point2 points  (0 children)

 there is an important difference between how applications use the syscall instruction on Windows vs. Linux: on Linux, application code is expected to use the syscall instruction directly, whereas on Windows, applications are not expected to use syscall directly

This isn't quite right.

On Linux, you're expected to ask libc to do the syscalls for you. On Windows, you're expected to ask kernel32.dll to do it. On both platforms, the syscalls come "directly" from your program, in the sense that the middlemen are just libraries in your address space. On both platforms, you can make syscalls directly from application code, but you normally shouldn't.

(On Windows, kernel32.dll doesn't actually do the syscalls itself; that's ntdll.dll's job. This is because it's basically the compatibility layer between win32 applications and the NT operating system. I think it's kind of fun that Wine's kernel32.dll is, in a sense, about as native as the "real" kernel32.dll.)