@kippykip1@Glas109@choehau_ara This proves you don't know what you are talking about and I don't have time to explain basics of cybersecurity to you. But there are plenty of materials online.
@likewise7581561@Glas109@choehau_ara It is that simple, have closed network ports (default) and don't run dodgy .exes and .scr files
Suddenly an non updated windows becomes almost impenetrable.
The last big exception was Wannacry 2017, which still required someone to run it on your lan network first for its spread.
@FarmingWithYHWH@kippykip1@choehau_ara Sandboxing prevents the spread, but nothing is perfect. Android's core parts are written in C and it is the most popular OS widly used by normies around the globe, so Android being the primary target for hackers makes sense.
@likewise7581561@kippykip1@choehau_ara Sandboxing does nothing to fix this, it's a EFFing band-aid like Rust's memory safety claims.
Android is fully sandboxed, yet still is the most exploited OS on the market.
So clearly, sandboxing wasn't the solution.
@Glas109@choehau_ara Windows has been fine with the same thing for nearly 35 years, just don't load malware then.
And the old method great! I can use autohotkey on any program, paste the old clipboard if I copied it from a program I closed, and screen share anything I desire.
X11 was great, but NoOo
@kippykip1@choehau_ara Linux desktop tries to appeal to masses lately. You can't put every choice on users, especially in security. Users mostly don't even want to choose, they want working product. Powerusers will always find their way, especially in Linux, so I don't think it's big of a deal
This is the mempool right now FYI
So I guess we should all run some vibe coded slop node because the babies are dying with the blocks full of spam!1!11!!
@GuidoVranken After analyzing this a bit more, it's debatable to classify it as a bug at all. The stdlib #Curve" target="_blank" rel="nofollow noopener">pkg.go.dev/crypto/ellipti… explicitly states "The behavior of Add, Double, and ScalarMult when the input is not a point on the curve is undefined." This is a clear misuse of its API.
Geth's pure-go secp256k1, btcec and dcrec all have the same bug in the addition function, it doesn't dispatch to doubling when equal points have different unreduced (bigint) coordinates.
Unreported and unfixed. Old bugs and nobody noticed before.
Co-Authored-By: libFuzzer.a
This epidemic of no-kyc cards is going to upend the industry soon.
Blatantly advertising support for Iran, using the enterprise card provision loopholes…
@Pledditor I don’t run BIP 110, but it’s dishonest to characterize a principled action as “caving to government pressure.”
Strong men stand on their principles. Weak men make excuses and rationalize their behavior.
What’s it called when a man acts on his beliefs despite being ridiculed?