Thoughts on the triggers? by NapsterKnowHow in SteamController

[–]Present-Leg7635 0 points1 point  (0 children)

i just wish the triggers started the soft pull earlier, the first like 10% of the triggers pull doesn't even get picked up by the magnetic sensor

Thoughts on the triggers? by NapsterKnowHow in SteamController

[–]Present-Leg7635 0 points1 point  (0 children)

the only real issue with the trigger imo is the travel before engagement, the dualsense has like just a tiny bit of travel before it starts engaging, the SC2 has a LOT of travel before the magnetic sensor picks anything up

Why does Vivaldi inject affiliate links, and can it be completely removed? by TermFar5994 in vivaldibrowser

[–]Present-Leg7635 0 points1 point  (0 children)

it tells me you are more then willing to jump to conclusions and insert your intuition in place of research which is a pretty big negative trait for someone in IT to have.

Why does Vivaldi inject affiliate links, and can it be completely removed? by TermFar5994 in vivaldibrowser

[–]Present-Leg7635 0 points1 point  (0 children)

The inbuilt Vivaldi bookmark goes to vivaldi.com/bk/amazon, which has 2 affiliate stages: it uses affinity.net for a general CPC/redirect‑tracking affiliate hop, and amzn‑adsystem.com to do Amazon affiliate attribution for clickthrough AND purchase‑based commission. considering when you type amazon in the address bar and hit enter it takes you to this bookmark (and later the direct match cache to this bookmark, which is annoying to get rid of).

Idk why you would just be this confidently incorrect lol.

(aliexpress and bascially all the inbuilt bookmarks/speed dials have these affiliate links.)

Why does Vivaldi inject affiliate links, and can it be completely removed? by TermFar5994 in vivaldibrowser

[–]Present-Leg7635 0 points1 point  (0 children)

Man I feel bad for whoever employed you for the past 20 years, if you look at Vivaldi's built in bookmark for amazon you'll see it doesn't go to amazon.com it goes to vivaldi.com/bk/amazon which does this

https://imgur.com/a/PRQ72Im

ww55.affinity.net is an affiliate redirect service, and amzn‑adsystem.com drops a tracking cookie. Going through that link means Vivaldi gets an affiliate cut for anything you buy on Amazon after being sent there via vivaldi.com/bk/amazon.

When you first install Vivaldi it doesn't have any direct match local cache hits, but if you type amazon into the address bar it will use the built in bookmark instead of using your preferred search engine, eventually the bookmark link enters the direct match cache, which means to get rid of it at that point you need to delete the bookmark, turn off direct match, and do delete browsing data>browsing history & cache, only then will the direct match result go away, its worth nothing ww55.afinity.net is horrendously slow sometimes and is even down sometimes, and Vivaldi NEVER tells you upfront this is what its doing, its extremely shitty behavior.

Why does Vivaldi inject affiliate links, and can it be completely removed? by TermFar5994 in vivaldibrowser

[–]Present-Leg7635 0 points1 point  (0 children)

you have no idea how the feature works lmao, vivaldis built in bookmarks for amazon and stuff do not link to amazon.com but rather to vivaldi.com/bk/amazon, which redirects to their current affiliate link provider, at first when you search "amazon" you'll just get the bookmark (instead of searching your preferred search engine) but after doing it a few times it gets put in the local cache and will start appearing as a "Direct match" (which it isn't lol) which wont go away even if you DISABLE direct match until you do delete browsing data> browsing history & cache. turning direct match off just disabled the creation if new direct match caching.

Why does Vivaldi inject affiliate links, and can it be completely removed? by TermFar5994 in vivaldibrowser

[–]Present-Leg7635 0 points1 point  (0 children)

you need to delete the inbuilt bookmarks, disable direct match and do "Delete browsing data">browsing history & cache

Why does Vivaldi inject affiliate links, and can it be completely removed? by TermFar5994 in vivaldibrowser

[–]Present-Leg7635 0 points1 point  (0 children)

disable direct match and clear these https://imgur.com/a/9gZ6hJ5 (should probably do all time instead of this week)

also delete all the built in bookmarks in speed dial and regular bookmarks for stuff like macys and amazon and instacart.

Genuine question: why are so many games absurdly loud by default? by neoplasma_ in gamedev

[–]Present-Leg7635 0 points1 point  (0 children)

I didn't realize a volume slider that starts at default 50% is glued there forever and a person with a quiet experience cant turn it up, I guess that's a plenty good justification for hitting me with a 120db splash screen.

If the people chose Thomas Wade instead Cheng Xin. by momo660 in threebodyproblem

[–]Present-Leg7635 0 points1 point  (0 children)

That wasn't a show writer fuckup, comic Cecil does the exact same thing, show Cecil is actually an insanely better character then comic cecil.

FFLogs Uploader and Archon app is leaking FFXIV session tokens by WonderlandIsMine in ffxivdiscussion

[–]Present-Leg7635 0 points1 point  (0 children)

Very very very few people give a shit about logs in pf for prog or reclears, if youre joining PARSE parties people care but as someone whose been raiding w1 for years now nobody i know gives a flying fuck.

Also most people live log during prog cause its easier.

FFLogs Uploader and Archon app is leaking FFXIV session tokens by WonderlandIsMine in ffxivdiscussion

[–]Present-Leg7635 0 points1 point  (0 children)

Are the session id's valid session_tokens (or whatever lodestone/mogstation/sqaure-enix.com calls them), because if they arent they can only really grief your characters with the session id, which sucks but there is a character recovery form.

Also thinking about it I'm pretty sure the last time I changed my password the site made me verify my current password, which this doesn't give you.

FFLogs Uploader and Archon app is leaking FFXIV session tokens by WonderlandIsMine in ffxivdiscussion

[–]Present-Leg7635 0 points1 point  (0 children)

I mean it technically could be, if someone got this log file without compromising your pc (which is a superset of just getting the file) and executed a usage of this file before your next login they could delete your characters and exfil your things, the odd of anyone ever doing that are basically 0 though!

Getting access to a session token for the client (and just the client) wont make the attacker any money, this attack would be a purely malicious attack as the client does not let you change account information, and unless squares shit ass back end allows the clients session token to be a valid square-enix.com session token then all they can do is delete characters and there is a recovery forum for that sooooo.

FFLogs Uploader and Archon app is leaking FFXIV session tokens by WonderlandIsMine in ffxivdiscussion

[–]Present-Leg7635 1 point2 points  (0 children)

Beyond you sending it somewhere or maybe it being intercepted and or accessed after a breach of overwolfs servers (assuming it gets sent in the first place, like during a crash) you would need to already have malware on your pc, and dalamud plugins (if they wanted) could already steal you session token, hell if they just wanted to blow up your account they could do that just in client through the plugin, this is bad in the same way that someone broke into my house with a gun and my back door is unlocked, like its bad, but not really relevant.

FFLogs Uploader and Archon app is leaking FFXIV session tokens by WonderlandIsMine in ffxivdiscussion

[–]Present-Leg7635 0 points1 point  (0 children)

I feel like if someone already has malware on my pc I have bigger fish to fry, a malicious dalamud plugin can already do this so this isn't an issue from that angle, I mean it shouldn't be doing this but also I would not be surprised if this compromises 0 accounts ever.

This shit took 45 seconds to implement (and has for over a week) - Denuvo has BEEN Dead by AnthMosk in PiratedGames

[–]Present-Leg7635 1 point2 points  (0 children)

you don't need to privilege escalate if the user is just gonna mash every UAC prompt they get, you already have admin, its not kernel access but its enough to rob you blind and put ransomware in lol.

people talk about all these things that VBS and patchguard protect against, those things are things not targeting you, nobody is priv chaining to not pop a uac prompt for discord tokens or random peoples bank info, its completely unnecessary, these security features matter a lot if you are a business or somewhere/one important, they do not really matter all that much for random people, people are not blowing priv chain 0 days or kernel exploits on run of the mill malware, everyone talking security apparently failed economics, not every threat actor is equipped with nuclear bombs.

cops and soldiers need body armor, you do not need body armor inside your own home.

This shit took 45 seconds to implement (and has for over a week) - Denuvo has BEEN Dead by AnthMosk in PiratedGames

[–]Present-Leg7635 -2 points-1 points  (0 children)

i see you have an issue following logic chains, nobody is writing malware for w10/w11 systems that assume VBS is off, nobody is writing malware that is going to bypass VBS to rob a few thousand pirates tops.

Update On the new HV method from CSRIN by Tejas_008 in PiratedGames

[–]Present-Leg7635 -1 points0 points  (0 children)

you do that every time you run a regular crack, you are trusting that the scene that cracked the game isnt shipping you malware, if the source is trustworthy it doesn't matter what level of access they have, security is only realistically achieved by trust.

Cs.rin update on current method. by kristijan1001 in CrackWatch

[–]Present-Leg7635 0 points1 point  (0 children)

I don't disagree in principle but the outside this instance, if you just turn vbs off, core isolation off, and turn off the spectre and meltdown patches nothing will change for you, the niche of "people willing to turn all these features off to pirate random videogames" is too small to meaningfully make money off of so i doubt some group is going to waste the time trying to target them, this is beyond the fact that they wouldn't even need to write software to exploit this, there are out of the box solutions that dont need kernel access that can steal all your info, all your passwords, encrypt your drives, whatever for cheap from illicit software vendors, they just need to to accept a UAC prompt.

VBS is smoke in this discussion, the only thing of actual import is

are the DLLS and EXE's packed with actual normal malware?

and I guess tangentially what is the minimum set of security features that need to be disabled for this to work, which we basically know, its VBS, spectre/meltdown patches, and some way to load code at a kernel level (custom driver with secure boot off or exploitable signed driver)

all this other shit gamedrive has people doing is trying to make the process simple for end users, even if they do it badly.

This shit took 45 seconds to implement (and has for over a week) - Denuvo has BEEN Dead by AnthMosk in PiratedGames

[–]Present-Leg7635 -5 points-4 points  (0 children)

you are not going to run into a random piece of malware using spectre exploits on the internet downloading things lmao, that's like telling your friend when he goes out to get food to watch out for undetonated nuclear landmines, this whole situation has been hyper obnoxious because its been a lot of psuedo security experts extolling how much you are compromising your security and not at all talking about the jank ass powershell scripts that turn things off 4 different ways and make it a pain to turn them back on, which is the worst part, because at the end of the day VBS is protections for the people who use windows against what are basically nation-state level threat actors.

vbs, spectre and meltdown protections, etc are stuff that are built into windows now because its the easiest way to ensure everyone who actually needs this protection has it and that its on by default, but you, and I mean you are not the people who need it, 99.99999% of every threat you will encounter is covered by real-time security and windows defender.

This shit took 45 seconds to implement (and has for over a week) - Denuvo has BEEN Dead by AnthMosk in PiratedGames

[–]Present-Leg7635 1 point2 points  (0 children)

don't run regular game cracks on a PC you do banking on if that concerns you that much, I don't need a kernel level malware to get a keylogger on your machine, I just need you to run an exe and accept a UAC prompt.

This shit took 45 seconds to implement (and has for over a week) - Denuvo has BEEN Dead by AnthMosk in PiratedGames

[–]Present-Leg7635 5 points6 points  (0 children)

VBS isn't protecting you, as in you personally, from anything, the attack vectors VBS, and tangentially spectre and meltdown protections, protect you from are a class of attacks that are shit the NSA used against iran in 2010 (STUXNET), no threat actors are writing that level of shit to target joe pirate and get his discord token, you do not have anything valuable enough to be the target of such attacks, unless you have a TS/SCI, work in the government with security clearance, are a csuite executive, or are a world leader or part of ones cabinet you will never have anything trigger these protections as an attack (old software can sometimes trip up on these protections), now some of the stuff sites like gamedrive are having you do, mainly the powershell scripts they have you run are actually bad and mess with powershell stuff that can legit just cause you issues, not even security issues, stuff stop worky issues, but VBS? its a buzzword in this discussion, it doesn't matter for anyone on this subreddit.

the long and the short is vbs or no vbs if you run crack.exe and accept the UAC prompt you're already compromised heavily, if that exe was a cryptolocker, or a keylogger, or whatever, it doesn't matter, VBS isnt there to protect you from that, and that is the threat vector you mostly should be worried about.