• 0 Posts
  • 37 Comments
Joined 11 months ago
cake
Cake day: November 10th, 2023

help-circle

  • No. It’s not a magic invisibility field inside. It’s a magic object that works only on living “intelligent” creatures. It also doesn’t work the same on different races. Only humans (hobbits are a subtype of human in Tolkiens lore) turn invisible. And because it’s magic it also turns their clothing etc invisible. So either Frodo and his poop is invisible or nothing is.


  • I have set it up in a way where all the packets have to go through their VPN and if they don’t, they get dropped before they leave my PC.

    That is the function of a firewall and not of the VPN. As I understand portmaster it does both. But that is not normal VPN behavior.

    VPNs are not magic. They are a piece of software that encrypt traffic and send it to a special server. They do that by creating a virtual Internet connection (think like pluging in an additional Ethernet cable or connection to an addition WiFi at the same time). Everything that is sent through the virtual connection is encrypted. Your system now has (at least) two valid Internet connections (one real and one virtual). For every packet it sends it needs to decide which connection it should send it from. This is decided by something called the routing table. When you start the VPN it will put two routes into the table.

    • traffic going to the VPN server goes through the real connection (so the encrypted VPN traffic is routed correctly)
    • everything else goes through the virtual connection (the VPN tunnel where it gets encrypted)

    The attack described is a way how a network router can add a new route into your devices routing table to basically override the second route from the VPN. The route is still there, there just is another one that has a higher priority.

    A VPN is not the ultimate authority over your network traffic. It is just another program sending and recieving taffic.









  • Wait so without the option it checks against the system trust store and with the option it does exactly the same (but may also includes an additional CA if that was passed as the argument)?

    This should be a cve. There is a security feature. It does not work as documented. That’s a vulnerability. That should get a cve.

    Wtf apple


  • Can you verify the software running on an instance is the same as the one in the source code repository? You can’t. Can you verify the instance isn’t running code to read passwords from your login requests even if the code is the original open source code? You can’t.

    That’s why (and for other reasons) you should never use a password for more than one site/service/instance.

    Lemmy admins (admins in the Lemmy application) probably can’t read your password. But everyone with admin rights on the server operating system can.







  • groet@feddit.detoScience Memes@mander.xyzHatzegopteryx
    link
    fedilink
    English
    arrow-up
    12
    ·
    7 months ago

    The stomach isn’t like a big cave with a pool af acid in it. It is compacted by muscles around it so if you are swallowed whole, you would have to fight against those muscles to even be able to move at all. If your arms are above your head it’s likely you would die before you are able to move them to your hips to draw your knives. If they are at your hips, good look moving the knives to point outwards. Also the stomache is lined with thick mucous to protect it from sharp objects… Also it’s completely dark and disorienting.

    It’s almost certainly you’d drown, suffocate and get crushed VERY quickly after getting swallowed alive.


  • True but OPs question is a bit different: “Since I was a child, my leg hurts when I turn it to the side. It influences my daily life but I have learned to live around it and found remedies that somewhat help with it. I recently learned that other people’s legs dont hurt that way. Is there a point in getting a diagnosis of why my leg hurts when I already know how to live with it?”

    The response is the same: mental health is as important as physical health. But it’s a question about chronic issues.


  • groet@feddit.detoFirefox@lemmy.mlWhy I use Firefox
    link
    fedilink
    arrow-up
    4
    ·
    7 months ago

    Chrome doesn’t care about closing html tags. If they are mising the document is invalid but chrome will render it anyway and just add the closing tag where it thinks it should be.

    At the other end, Firefox goes beyond the standard and will block certain connections that should be allowed by the fetch standard (the setting to disable that is called enhanced tracking protection).

    So chrome allows things things it shouldn’t while Firefox blocks some it shouldn’t