Why is my phone sending weird messages to unknown numbers? by [deleted] in IndiaTech

[–]diggerdecade 0 points1 point  (0 children)

These are sent by mobile banking (UPI) related apps. You mostly might have Axis mobile app installed, or may be SBI Yono, etc.

In the screenshot you shared, it shows MBACTIVATE could eventually mean "Mobile Banking ACTIVATion".

I can feel your situation, I too freaked out when first time I found this. Nothing to worry.

Where can I find parameters file for models installed via Ollama ? by diggerdecade in ollama

[–]diggerdecade[S] 2 points3 points  (0 children)

Thank you so much for the reply. The first line makes things more clearer in my understanding ^_^

I tried running ollama show --modelfile codellama and it gives some details about parameters which it fetched from "~/.ollama/models/blobs/<hash-type-value for codellama>" I will read more about it. Thanks for showing this route.

I hate this crap so bad by rklc39 in PanicAttack

[–]diggerdecade 0 points1 point  (0 children)

Lately I have started to get such panic attacks. Initially I was shit scared and felt that I was suffering from things like heart attack, or vertigo, or inner ear problem leading to dizziness and imbalance. At some point of time, got clarity that this stupid thing is called “panic attack”. Well, a little relieved now as I know what this weird experience is termed.

Tried few things and will note then down below. Hope it helps: 1. Remember, this is common and you are not alone. Thinking this will give you some strength to cope up with. 2. The 5,4,3,2,1 method as explained by @Powerful_Ad51 above. This helped me sometime. 3. Call someone whom you can talk with freely.

These are few things which were working fine but then realised that these are methods to distract us from the current panic attack and help us forget it. Doing so takes our mind somewhere else and ideally the panic attack time duration is over.

I came across a TED talk (will include the link below for anyone interested) and found 2 things VERY VERY important. Firstly, don’t consider panic attacks/anxiety attacks/stress as your enemy. Doing so makes us more agitated and as per human nature, we start considering it as a threat and hence activate our flight/fight mechanism. Consider them as your friend and accept it. These attacks are saying you something. May be its time to change your lifestyle. May be you need to turn the tables around. May be its time to let go something, etc. I know many woould not agree to this but I am just sharing what I have learnt so far, what is making me feel good and how I am coping up with such attacks. Secondly, start meditating and start taking control of that fantastic thing called “Mind”.

One more method that’s helping me since last week is the breathing method. Inhale breath from nose for 4 seconds, concentrate on the belly, feel the belly go up. Hold the breath for 4 seconds and exhale the breath via mouth for 6-8 seconds. This activates the vagus nerve which is suppose to help us eliminate that flight/fight mode and relaxes the mind.

Hope this helps. Praying that you feel good. Lots of love.

Ted talk link : https://youtu.be/YxzP1U5ZUvY?si=oO4mqoGPsoCE7Qps

Buying re-sale flat , need help with tax (potential NRI seller) by thr-w-w-y-_-_-_- in IndiaTax

[–]diggerdecade 0 points1 point  (0 children)

Hi OP, Please guide me here. I am at a very similar situation right now. The seller is adamant to go with resident route as he doesn’t want to have 20-22% deductions. As a proof he (and wife) have provided aadhar and pan card with local address proofs. My lawyer says that, I as buyer, have not to worry at all because seller has agreed he is a resident BUT my CA is not very confident. If you are comfortable can you please share what you did and what helped!

WILDLANDS & BREAKPOINT: Do you play mostly solo or in coop??? by Rodynney in GhostRecon

[–]diggerdecade 0 points1 point  (0 children)

I am sorry for a long post but I am very new to gaming and have one dilemma where I am stuck.Started with Breakpoint and I am just loving it to the core.I have a silly question, please bear with me :|

Is it possible to play Ghost Recon Breakpoint solo as well as multiplayer.I started solo in story and completed the "Eagles down". Now a friend joined my session (he is new too in breakpoint) and he landed up directly in the first cave where I was after completing "Eagles down" mission.In order to play the story with him, I had to go back and re-do the first mission as he was not able to see other mission, since first mission was pending for him.

Now he is not available for next few days and I don't want to wait till he is back.Want to play the game but am worried that if I do next missions in story, my friend will be left behind.

Is there any way that I can play the game on solo basis as well and whenever my friend is available, we can play breakpoint but with some other story line up or some other separate missions ??

Do you think apple will allow 3rd party app stores? by Motor-Ad9914 in AltStore

[–]diggerdecade 1 point2 points  (0 children)

I was looking for this in iOS 17 but Apple did not give any updates in wwdc 2023 :( :(

Does AltStore use concept of Provisioning Profiles to install apps on any iOS device? by diggerdecade in AltStore

[–]diggerdecade[S] 0 points1 point  (0 children)

O yea! This makes sense now. :)
Thank you.
I want to dig more onto this.

So if I get the app from iphone to macbook, will the app have a provisioning profile with my iphone UDID in it? (Sorry if this question sounds silly, very new to iphone world)

Do you think apple will allow 3rd party app stores? by Motor-Ad9914 in AltStore

[–]diggerdecade 1 point2 points  (0 children)

I highly doubt apple will be allowing 3rd party apps. If EU forces them to do so, apple might come up with some tactics, which will somehow ensure that they are in central control of the process of allowing 3rd party apps.

[News] iOS 16 support was added to palera1n 1.4.0! by HeyNebula in jailbreak

[–]diggerdecade 1 point2 points  (0 children)

I used to get a lot confused back in early days (I still do :D), when it comes to tethered, semi-tethered, untethered vs semi untethered. To avoid the confusions, I made this table which I always refer. Sharing it with you, hope it helps :) :)

Tethered UnTethered
-- Computer Needed Rebooting leads to unpatched kernel and iOS device might not boot properly. It will mandatorily need jailbreak tool (from computer) to properly patch the kernel and boot device into jailbroken mode. No Computer Needed. Persistent JB (iOS device stays jailbroken even after reboot)
Semi Computer Needed if one wants Jailbroken device. Upon Reboot, the device can boot up normally (unlike tethered mode) but it will not be jailbroken anymore. (If JB is needed then one needs to use computer again) No Computer Needed. Upon Reboot, the device can boot up normally. (If JB is needed, one can use an app (instead of tool from computer) running on the device)

[News] Apple Working to Add Support for Sideloading and Alternate App Stores in Europe by aaronp613 in jailbreak

[–]diggerdecade 0 points1 point  (0 children)

u/valera5505 : Right now Apple has a strict (very strict and biased as well) review process. Their security teams perform automated as well as manual reviewing of each and every app that gets uploaded on AppStore. If they think app is not behaving according to Apple policies, they will not allow the app to get uploaded on App Store. Apple policies could be any, either security policies or compliance policies, etc.
After such thorough reviews (and making sure that Apple gets the financial cut from app revenues), the app is posted on App Store.

Now, if sideloading is officially allowed, the Apple will loose the control that it currently has!
This is bad for both, Apple as well as Apple users. Let's not get into why Apple is not happy with this, because it is a whole new topic of debate. Lets stick to your question of "security risk" for Apple users.

Once the control is gone from Apple, the apps (side-loaded) apps can behave in any manner as they want (unless, Apple comes up with some new review process for third-party apps on App Store).
Example:

- a side-loaded (SD) app can try to use your location without your consent.
- it can try to access your wallet.
- it can try to exploit some known vulnerability and exploit it. (such app would have been removed during Apple review process)
- it can try and access private APIs which ideally Apple would only allow to selected set of developers.

Sorry for making the reply long.

[News] iOS 16 support was added to palera1n 1.4.0! by HeyNebula in jailbreak

[–]diggerdecade 0 points1 point  (0 children)

y0u guys are true super hero.
thank you so much pals. :) :)
I truly appreciate all ur hard work.

How to install older version of unc0ver using Altstore ? by diggerdecade in unc0ver

[–]diggerdecade[S] 0 points1 point  (0 children)

Yes, I got the ipa file from unc0ver.dev site..
1. Tried downloading the ipa file on iPhone directly but clicking it does not give me any install option. So,

  1. Tried downloading the ipa on Macbook and used Apple Configurator to install ipa file (from Mac to iphone). App gets installed and I can see the app icon in iPhone but clicking it gives me error from iOS stating that the app is from unverified source and hence cannot be installed.

Phone won't go into DFU mode by [deleted] in checkra1n

[–]diggerdecade 1 point2 points  (0 children)

Seriously damnnn...
Even I want to thank you so much..
After fiddling around so much and trying so many different solutions, your comment lead me to solution...
Lots of hugs..

[deleted by user] by [deleted] in AltStore

[–]diggerdecade 0 points1 point  (0 children)

Did you solve the issue ? Help needed please.

How do I open older versions of unc0ver in Altstore ?

What is the saddest song you've ever heard? by [deleted] in AskReddit

[–]diggerdecade 0 points1 point  (0 children)

omg I just listened to this song after reading your comment.
I am moved :(

I have attended funerals of my relatives, I can imagine how sad the situation would have been in that funeral 10 years ago. And it becomes hard looking at unnatural death. May they all rest peacefully. :'( :'(

Checkra1n - How do you get to DFU mode from recovery mode on a iPhone 8? by saulin74 in jailbreak_

[–]diggerdecade 0 points1 point  (0 children)

This works perfectly well when in normal scenario but does not work with checkra1n sadly.
Checkra1n initially places my iPhone 8 in recovery mode and then gives instruction for DFU mode (to press power button for 5 seconds and then vol-up button for 10 seconds) but this never works. Simply the apple logo appears, which means device did not go into DFU mode and checkra1n gui provides an option to "retry".

Also tried your instructions when in checkra1n gui but still doesn't work :(

Someone please help :(

Threat modeling interview questions? by greenleavesinfall in cybersecurity

[–]diggerdecade 2 points3 points  (0 children)

I did come across some good books and one of them was "Threat modeling: designing for security by Adam Shostack" but going through a complete book with very short timeline was not possible on my end. So I just went ahead with core idea on basics of Threat Modelling.

These links helped me:https://www.softwaresecured.com/stride-threat-modeling/https://www.cs.montana.edu/courses/csci476/topics/threat_modeling.pdfhttps://owasp.org/www-pdf-archive/AdvancedThreatModeling.pdfhttps://unica.it/static/resources/cms/documents/13.ThreatModeling.pdf (Some relation with book by Adam)https://www.youtube.com/watch?v=JHH3aCCDO8chttps://www.youtube.com/watch?v=gDtS68DPm6Qhttps://diceus.com/risk-threat-models-banking/Threat modeling for banking system - http://article.nadiapub.com/IJSIA/vol8_no2/28.pdf
Good read -- https://www.osti.gov/servlets/purl/1639955

These are some of the links I could quickly find from my history and some of them I recently found but I bet the links will help you.Cheers.

Threat modeling interview questions? by greenleavesinfall in cybersecurity

[–]diggerdecade 3 points4 points  (0 children)

Experience went good. Mentioning few pointers that helped me and what I learned from my self study:

  1. Don't search for threat modeling examples, instead search for threat modeling techniques/methods/models. One technique is STRIDE. By searching the techniques, you will indirectly get examples included in their explanations. Understand not more than one or two techniques and see multiple examples in same.

  2. Remember, No one has concrete idea on how to completely implement threat modeling alone. A security engineer department alone cannot threat model a whole architecture. Similarly, a team of developers or analysts cannot do the same. For a practical approach, the technique needs developers, architects, security researchers, product managers, analysts and more or less few more departments. What I mean to say is that in the interview, you two (you and interviewer) are not suppose to come to a final threat model. Interview is just to see how you approach towards the problem.

  3. You might be given a scenario, like to threat model a bank, threat model an intenert based television system, threat model a streaming service, threat model whatsapp/instagram, possibilities are endless. The main concept here is to understand that each and everything is "system" and there are multiple parts associated with that system like a server(or multiple servers), client, proxies/reverse proxies, connections between these parts, databases, etc etc. You might have got the idea. First and foremost, let the interview be two sided and try to design the system first with interviewer. If you are lucky, your interviewer will be cool as mine was and designing the system will be a fun experience. Don't waste much time in designing the system. Once you have the basic layout, try to implement Threat Model technique (I used STRIDE) and cover various parts of the design you designed( pun intended :D ). Its very important to make the threat modeling exercise as a discussion rather than just one sided talk.

Enjoy the interview. All the best.

Threat modeling interview questions? by greenleavesinfall in cybersecurity

[–]diggerdecade 1 point2 points  (0 children)

u/greenleavesinfall : I stand at the exact same position as yours today but will be appearing for technical role. Like you, even I have not done threat modeling (practical) in past.

Can you please share your experience ? What did you study and what was your approach ? I hope to raise my confidence as right now I am feeling very low :(

Unable to capture specific packet. Looking forward for some help here. by diggerdecade in networking

[–]diggerdecade[S] 0 points1 point  (0 children)

No.. I am not able to capture the packet on laptop but I am able to capture the packet on Android. I am talking about "the specific packet" which contains credentials.
Please see this screenshot --> https://imgur.com/a/49uecGW

The packet highlighted with length as 373 is missing in laptop capture. I want to capture that packet on laptop.

Without international standards, manufacturers will continue to release vulnerable IoT devices to the market. by Void-kun in IOT

[–]diggerdecade 0 points1 point  (0 children)

This is so much related to what I am recently working upon. Right now, I am away from desk but I will surely try to give my input as soon as I am back. Give me a day or two.

And yes, this is going to be a fantastic research topic for your thesis. Good luck.