🚀 Seen my posts and want more? Dive deep into the issues with Big Tech at Escape Big Tech!

💡 Need FOSS-focused software solutions? Reach out on Matrix at @dannym:balooga.xyz!

  • 5 Posts
  • 124 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle

  • I believe that the following IP ranges

    • 103.231.144.0/24
    • 192.31.196.0/24
    • 216.176.216.0/21
    • 199.248.239.0/24
    • 192.198.30.0/24
    • 69.12.98.42

    are engaged in highly suspicious activities

    furthermore I can definitely say that I found some dirty pirates hiding at the following ip ranges:

    • 175.45.176.0/24
    • 175.45.177.0/24
    • 175.45.178.0/24
    • 175.45.179.0/24

    my research clearly shows proof that those people are not just pirates but also engaged in highly illegal activities such as stealing BILLIONS of dollars and hacking who knows how many servers, and that’s only the crimes one can talk about online.


    if you don't get the joke

    no, I didn’t share IPs that anyone here would ever have, I guarantee it, if you don’t get the joke look up “bogon routes” and then look up which ASN owns the other set.

    It looks more legit than people who use 192.168.0.0/16, 8.8.8.8, 127.0.0.1, or any other things like that because most people don’t know about those.

    Also bonus info:

    here’s a tip for you, if you’re a sysadmin just go ahead and ban those IP ranges on your machines, if you ever get packets from them it’s an attack 99.999999% of the time (I guess unless you have customers in north korea? in which case only block the first ones and all other bogon routes)







  • In general I agree with you. I find that most FOSS software is more polished than proprietary software, and it is generally more powerful.

    However, I think that one problem that people somehow overlook in my opinion is that the financial side of the issue is also extremely important. I want more people to work on quality FOSS software, and I want it to become socially acceptable to work on FOSS as your main job. For that one thing is needed in my opinion: we as users of FOSS software need to give developers the financial incentives to work on what they love the whole time. In fact I want it to reach the point where immoral, non FOSS companies struggle to find developers because they’re all working on FOSS.



  • in this case the instruction set is extremely small (and includes open source verilog, so you could even fab it yourself)

    quote from the website:

    The CPU of the TKey is a modified version of PicoRV32, 32-bit RISC-V running at 18 MHz. Modifications includes a fast 32x32 multiplier implemented using the multiplier blocks in the iCE40 DSPs as well as a HW trap function.

    The supported instruction set supported by the CPU is a subset of RV32I. Specifically it includes compressed instructions, but excludes instructions for:

    • Counters
    • System
    • Synch
    • CSR access
    • Change level
    • Trap redirect
    • Interrupt
    • MMU

    The instruction set implemented by the CPU also includes multiplication instructions from the RV32IC_Zmmul (-march=rv32iczmmul) extension. Division is not supported.

    Any illegal, unsupported instruction will halt the CPU. The halted CPU is detected by the hardware, which will blink the RGB LED with red to indicate the error state. There is no way for the CPU to exit the trap state besides a power cycle of the device.

    Note that the CPU has no support for interrupts. No instructions, ports or logic.










  • The kid was an idiot and a dickhead. He extorted companies and sim swapped people for his private gain, and was stupid enough to continue his hacking spree while he was on bail for another hack.

    Yeah I don’t think anyone here disagrees with that; his actions are objectively wrong and as I said, he definitely needs to learn morals and ethics.

    Samsung Dex over Miracast (which the news liked to present as some kind of amazing hacking feat)

    I mean, duh, the media can’t tell the difference between a computer and a toaster, but that’s besides the point

    He’s violent, damaging property and injuring staff.

    I didn’t know about this, thanks for sharing. Can I get a source?

    I don’t get what this “he deserves a stellar salary” mentality comes from

    I’m a firm believer in meritocracy and the importance of rewarding skills. He should still pay a hefty price for his crimes, including jail time, where he will hopefully learn to change his ways, but once he gets out, if he’s truly remorseful for his actions and he’s willing to have others monitor his device usage activities, I don’t see why he shouldn’t be hired by a red team