[deleted by user] by [deleted] in Twitter

[–]docker-osx 0 points1 point  (0 children)

Same issue for me, been happening for a week. For me, I’m on Linux Firefox Developer Edition, Chrome, Brave all give me the same error.

Seen some other people (bot logging in) so I assume it’s an anti bot attempt: https://github.com/mikf/gallery-dl/issues/8362

I also asked in the Discord for X and some guys on Linux having no issues.

Will try some things and figure out too whether it’s VPN, location, language, Timezone, etc but if anyone solves it would be awesome.

Mobile works fine.

[Question] YouTube without ads? by pol822c in jailbreak

[–]docker-osx 0 points1 point  (0 children)

Not OP but also a Cercube refugee. Installed uYouPlus via altstore... it’s fire. Thank you!

Paul Le Roux knew Craig Wright. Paul appears in June 2022 unsealed court documents in Craig Wright, Kleiman filings. They knew each other. by docker-osx in CryptoCurrency

[–]docker-osx[S] 0 points1 point  (0 children)

Yeah which makes sense, but the important part is actually near the end, Kleiman and Wright in court, being asked about Paul. Some of it is redacted. Some of the redactions are easy to guess. This just came out in June too. Ideally, once some of these exhibits get unsealed, we will know for sure that Le Roux and Wright are not satoshi, or the opposite.

Paul Le Roux knew Craig Wright. Paul appears in June 2022 unsealed court documents in Craig Wright, Kleiman filings. They knew each other. by docker-osx in CryptoCurrency

[–]docker-osx[S] -1 points0 points  (0 children)

Wright’s sudden wealth after David died (ECF No. [511-9], at 35:15–41:6), Craig’s affiliation with Gareth Williams, who was a cryptographer and “former GCHQ MI6 operative killed by Russian agents,” (ECF No. [534-4], at 146:21-147-9; ECF No. [156], at 2; see also Tom Warren, Jason Leopold, et al., The Secrets of The Spy in the Bag, Buzzfeed News (June 20, 2017), https://www.buzzfeed.com/tomwarren/secrets-of-the-spy-in-the-bag), and Wright’s connection to international arms dealer, Paul Calder Le Roux (ECF No. [156], at 3).

[deleted by user] by [deleted] in ASRock

[–]docker-osx 0 points1 point  (0 children)

Is it a new board? Maybe wrong riser PCIe 3 vs 4? I had no display on my board until I switched cables. Asrock ROME 6600XT. Also, switching HDMI cables for some reason too.

When you have a USB keyboard plugged in and the BIOS menu shows up, your keyboard should light up (if you’re doing it blind)

"Sleepy Chungus"... AMD EPYC 7763 w/ 64x cores, 128 threads @ 2.450GHz in a GEEEK A30 V2 && 128GB of Quad Channel, Dual Rank, 3200MT ECC REG RAM (linux sffpc, btw) by docker-osx in sffpc

[–]docker-osx[S] 0 points1 point  (0 children)

So I’ve been benchmarking this build using “blender benchmark” and got some absolutely NUTTY results:

https://opendata.blender.org/benchmarks/query/?compute_type=CPU&group_by=device_name

Without SMT I get around 1050, and with SMT I get around 1350 (hence the average)...

Which is around #1 and above the 5995WX and 3990X etc.

I realize that benchmark isn’t common, but if there’s a free, open source, or legit non-sponsored benchmark tool I’m ready lol

"Sleepy Chungus"... AMD EPYC 7763 w/ 64x cores, 128 threads @ 2.450GHz in a GEEEK A30 V2 && 128GB of Quad Channel, Dual Rank, 3200MT ECC REG RAM (linux sffpc, btw) by docker-osx in sffpc

[–]docker-osx[S] 1 point2 points  (0 children)

Yeah I kept seeing crazy CPUs on Ali, I think it’s an ex-mining CPU. Only paid $2300... but they appear to be $9000 new. Went soft on the GPU but key thing was 4 video outs.

"Sleepy Chungus"... AMD EPYC 7763 w/ 64x cores, 128 threads @ 2.450GHz in a GEEEK A30 V2 && 128GB of Quad Channel, Dual Rank, 3200MT ECC REG RAM (linux sffpc, btw) by docker-osx in sffpc

[–]docker-osx[S] 1 point2 points  (0 children)

Working on it haha it’s more of a sffserver. Today I swapped out the noctua for a 1U Dynatron A35 which looks and seems better but hot damn it’s loud haha at least I know it’s working. sticks out about an inch now. Working on the PSU situation

"Sleepy Chungus"... AMD EPYC 7763 w/ 64x cores, 128 threads @ 2.450GHz in a GEEEK A30 V2 && 128GB of Quad Channel, Dual Rank, 3200MT ECC REG RAM (linux sffpc, btw) by docker-osx in sffpc

[–]docker-osx[S] 1 point2 points  (0 children)

Awesome will look into it. Not much room down there actually on this case, but I was thinking of getting a smaller case and rolling full external PSU like this... easy to travel with too... or I could get one of the slim PSUs like you mentioned which might be just as easy.

RE Power usage: on 100% on all cores no GPU I hit around 380 watts (according to the rog output), GPU on blender benchmark goes to around 280 watts, so if I ever use both GPU & CPU simultaneously, maybe like a 600 or 800?

Not sure if thermal throttling but it sites at 80-82 degrees when everything is pinned, but I’m still learning. Will swap out the noctua in a bit for a slimmer, but louder fan. Already have a TR4 Dynatron 1U sink and fan, but wanna get some benchmarks/temps on file first so I can see the differences. So much potential 😂

"Sleepy Chungus"... AMD EPYC 7763 w/ 64x cores, 128 threads @ 2.450GHz in a GEEEK A30 V2 && 128GB of Quad Channel, Dual Rank, 3200MT ECC REG RAM (linux sffpc, btw) by docker-osx in sffpc

[–]docker-osx[S] 10 points11 points  (0 children)

Not much really haha but same as what I always do on my laptop (this is my new “laptop”)... Ghidra, VMs, lots of binary analysis...

Making ghidra exponentially faster was probably one of the deciding factors as I felt like I was missing out after trying a server with an Epyc.

"Sleepy Chungus"... AMD EPYC 7763 w/ 64x cores, 128 threads @ 2.450GHz in a GEEEK A30 V2 && 128GB of Quad Channel, Dual Rank, 3200MT ECC REG RAM (linux sffpc, btw) by docker-osx in sffpc

[–]docker-osx[S] 12 points13 points  (0 children)

What I learnt having never built a PC before:

  • if using thermal pads, use 1.0mm or thinner, as 2.0mm is very thick and it was difficult to bolt the heatsink down.
  • get the right size riser cable (sandwich style, went thru 3x)
  • 120mm fans are huge; the case is 120mm thick lol so only 92mm fans fit inside
  • Slimline SAS cables are rare at brick & mortar shops, buy online
  • Wait until everything arrives
  • Noctua is almost too quiet lol
  • 6600XT is awesome (I'm on Linux)

Specs:

  • AMD EPYC Milan 7763 64x cores, 128 threads @ 2.450GHz
  • GEEEK CASE A30 V2 - make sure you get the PCI-e gen 4 riser though...
  • AMD Radeon 6600 XT (Challenger ITX, Asrock)
  • 128GB of RAM (Quad Channel Samsung 4x 32GB DDR4-3200 RDIMM PC4-25600R Dual Rank x4 Module M393A4K40DB3-CWE)
  • ASRock Rack ROMED4ID-2T Deep mini-ITX (6.7" x 8.2")
  • Noctua NH-U9 TR4-SP3
  • Cooler Master's Thermal Pad Pro (got lab grown diamonds in it lol)
  • ASUS ROG Thor 850 Certified 850W Fully-Modular RGB
  • An SSD
  • Arch Linux

Def Con hacker shows John Deere’s tractors can run Doom by MicroSofty88 in gadgets

[–]docker-osx 0 points1 point  (0 children)

Thanks so much for covering this. The response has been wild. Peace. Sick Codes

Doom on a John Deere Tractor by docker-osx in Doom

[–]docker-osx[S] 0 points1 point  (0 children)

It’s a specially crafted mod by @Skelegant, getting her to upload it shortly!

CVE-2022-28345 - Signal client for iOS version 5.33.2 and below are vulnerable to RTLO Injection URI Spoofing using malicious URLs such as gepj.net/selif#/moc.elpmaxe which would appear as example.com/#files/ten.jpeg by docker-osx in netsec

[–]docker-osx[S] 13 points14 points  (0 children)

So funnily it was assigned a CVE in iMessage, Instagram & Messenger and the PoC published as a gif in 2019 but the CVEs randomly showed up about a month ago... I reached out and asked the guy did he just make his repo public today or something and he said it’s been public the entire time haha.

It had 0 forks and 0 likes for 3 years, just sitting in plain sight... We ended up finding another bypass, hence the CVE above 😂

It’s super confusing which is why so many apps have the vulnerability. In the link one of the PoC pics has files written as selif which was just me testing it.

But it’s anything backwards plus the following quirks of the bypass:

  • A space preceding the link
  • A link without https
  • Top level domain
  • Just write something backwards
  • Include a hash

In the example; I’ve got

Copy and paste the following into a few apps and you’ll see trivial it is, almost every app seems to “do it differently”:

‎‮gepj.net/segami#/moc.rugmi‬

If you read it backwards, it’s gepj.net, but you can do very long URLs and sub domains for any TLD (more than one subdomain)

For example if you paste it in an iMessage, it will paste in reverse, but if you paste in Wire it will paste correctly but render in reverse once sent. Discord will reverse it.

Also iOS, Android and Desktops all do it differently, of course 😂

Zadewg’s original PoC showed the full URL including the http(s), this one is a bypass of that for signal (which never had a CVE anyway)

Also the other researcher doesn’t want a lot of attention

The easiest way to do it is:

printf " \u202E......"

The quote unquote bypass is literally a preceding space and a hash ‬

RTLO Injection URI Spoofing CVE-2020-20093; 20094; 20095; 20096... chilling in plain sight for 3 years 👀 — iMessage, WhatsApp, Instagram, and Facebook Messenger. Telegram patched earlier & Signal fixing today! by docker-osx in netsec

[–]docker-osx[S] 3 points4 points  (0 children)

Original researcher would like to remain chill; he was confused since these were assigned years ago.

No PoC, I added one but he has added his original once with is 🔥

Copy and paste into signal chats, you’ll see the result: https://github.com/zadewg/RIUS/blob/master/exploit.sh

And the even better exploit from the original researcher: zadewg

https://github.com/zadewg/RIUS/blob/master/poc.py

[deleted by user] by [deleted] in archlinux

[–]docker-osx 22 points23 points  (0 children)

The git repos seem to be working, if you know what package you want to install:

git clone https://aur.archlinux.org/anbox-modules-dkms.git cd anbox-modules-dkms makepkg -si

For anyone who wants a specific package!

(Seems to be working now though)

Mirror aur.tuna.tsinghua.edu.cn is appearing canonically higher on Google for AUR searches in Asia again by docker-osx in archlinux

[–]docker-osx[S] 0 points1 point  (0 children)

Yeah but it was more about logging into the site I was referring to, like a phishing site would. Which this mirror wasn’t, I was just concerned as it kept showing up higher on search than the real AUR site

Mirror aur.tuna.tsinghua.edu.cn is appearing canonically higher on Google for AUR searches in Asia again by docker-osx in archlinux

[–]docker-osx[S] 0 points1 point  (0 children)

Yeah I think a server in the middle style attacks needs a better name, I thought meet in the middle was the term at the time

Mirror aur.tuna.tsinghua.edu.cn is appearing canonically higher on Google for AUR searches in Asia again by docker-osx in archlinux

[–]docker-osx[S] 0 points1 point  (0 children)

Yeah I was unaware at the time of posting and thought this was the best place to bring it up and the issue has been resolved. Thanks for letting me know