• 0 Posts
  • 951 Comments
Joined 9 months ago
cake
Cake day: February 10th, 2025

help-circle












  • You wouldn’t need to track them all, any distro’s installed package distribution (statistical, not Linux distro) should be strongly correlated with all of the others.

    Just like how you can poll a large crowd based on the opinions of a few thousand people. Arch is a good place to look since all packages are explicitly chosen by the user while in other distros the default software packages ensure that their repo stats will be skewed.

    When I’m looking into alternatives, I usually just search social media and note the things people recommend. The software ecosystem is small enough that this method isn’t (yet) polluted by bots promoting software.





  • I vaguely remember getting into a WPA network (that I owned!) using kismet about 15 years ago with relative ease, but I’m struggling to remember details about that process.

    The 4-way handshake crack was the only key recovery attack until 2018 when the PMKID-based attack was discovered (here: https://hashcat.net/forum/thread-7717.html). The PMKID crack attack still required brute-forcing the key, but it didn’t require the 4-way handshake so you didn’t have to depend on a de-authentication attack to get started.

    At that time there was another WPA vulnerability, if you were using WPA-TKIP, but it only allowed sending a few small packets every 10-12 minutes so it wouldn’t allow you to gain access to the network.

    Later there were a few WPS-based attacks but they were slow (4 hours to recover the WPS PIN) and/or limited to specific manufacturers (weak hardware random number generation).


  • That’s certainly a way of looking at it.

    The talent was upset at a conflict between kernel maintainers and posted a personal attack on Mastodon. The comment is now deleted ( https://web.archive.org/web/20250204004048/https://social.treehouse.systems/@marcan/113941358237899362 ).

    The Code of Conduct explicitly lists public harassment as an example of unacceptable behavior.

    Examples of unacceptable behavior by participants include:

    -The use of sexualized language or imagery and unwelcome sexual attention or advances

    -Trolling, insulting/derogatory comments, and personal or political attacks

    -Public or private harassment

    -Publishing others’ private information, such as a physical or electronic address, without explicit permission.

    -Other conduct which could reasonably be considered inappropriate in a professional setting

    Even if he is correct about about it being a code of conduct violation (it wasn’t), there is way to take action and it isn’t posting an attack on social media.

    Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the Code of Conduct Committee at conduct@kernel.org. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The Code of Conduct Committee is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.

    There has certainly been drama around Rust, but as was said in the thread: “Being toxic on the right side of an argument is still toxic, […]”