ticoombs

joined 2 years ago
MODERATOR OF
[–] [email protected] 4 points 2 months ago

πŸ˜†πŸ˜†

[–] [email protected] 3 points 2 months ago

πŸŽ‰πŸŽ‰πŸŽ‰ Every little bit counts!

[–] [email protected] 10 points 2 months ago (2 children)

You can block instances yourself. Check your Settings then click the Block tab, then enter in the domain under Block Instance.

Defederating has wider ramifications and just because there are a few bad users or opinions people don't like doesn't mean that everyone should be blocking them.

We have a few of those users too who regularly get into fights or who might be classed as mean, so if that's the case then we would be blocked too.

Standards that one server has cannot be enforced by another server.

Also no dog-piling onto this thread which I'll be locking if it happens.

[–] [email protected] 6 points 2 months ago

Federation between Onion and Standard Domains that way tor users would not be isolated

This is the hardest part as you would need to be both have an onion and have a standard domain, or be a tor-only Federation.

You can easily create a server and allow tor users to use it, which unless a Lemmy server actively blocks tor, you'd be welcome to join via it. But federation from a clearnet to onion cannot happen. It's the same reason behind why email hasn't taken off in onionland. The only way email happens is when the providers actively re-map a cleanet domain to an onion domain.

This is what Lemmy would need to do. But then you would have people who could signup continuously over tor and reek havok on the fediverse with no real stopping them. You would then have onion users creating content that would be federated out to other instances. & User generated content from tor users also is ... Not portrayed in the best light.
I'm sure someone will eventually create an onion Lemmy instance, but it has it's own problems to deal with.
This is especially true for lack of moderation tools, automated processes, and spammers who already are getting through the cracks.

[–] [email protected] 6 points 2 months ago

I can confirm the sections around downvotes as Reddthat has the stance exact what you are talking about (re your child comments)

A downvote disabled instance creates it's own algorithm/feed/ranking based purely on all other metrics, because as far as the data is concerned, it sees every post having 0 downvotes. It does not take into account external instances.

[–] [email protected] 6 points 2 months ago (1 children)

I can answer the first point.
We've already tackled part of that problem with the Parallel Sending feature that can be enabled on instances with a tremendous amount of traffic. Currently the only instance that makes sense to enable that is LemmyWorld and the only reason is so servers in geographical far away can get more than 3-4 activities/second.

With that feature, servers that eventually house and generate the biggest amounts of traffic will be able to successfully communicate all of those activities to everyone else who needs them.

I predict a 10x increase is well in our grasp of easily accessible by all of our current systems. 1000x? That's a different story which I don't have the answers too.

[–] [email protected] 3 points 2 months ago

Reddthat admin here, it's mainly upto the moderators discretion to what happens with offtopic posts. But as we (I?) prioritise discussion over just a post, even comments like these are welcome. If a personal were to constantly post off topic comments or posts then we'd probably just delete them all and be on our day. There is nothing stopping people from posting to every community, but with enough eyes they get reported to us, then acted upon.

[–] [email protected] 2 points 2 months ago

Looks like the savings I've made on the server has been eaten up with our increased S3 storage. Not surprising considering we have just over 2TB stored now. We saved about $20/m! (I've gone and updated the list of items and their costs in our Funding post -> https://reddthat.com/post/25633)

[–] [email protected] 5 points 2 months ago* (last edited 2 months ago) (1 children)

HI from the other side? Was it really that quick?

[–] [email protected] 4 points 3 months ago

Thanks! I gave the server some extra coffee this month. β˜•

[–] [email protected] 5 points 3 months ago

It seems that way, I'll have to do some extra math on our flows to double check but with the new server it should be completely in the black! Until our S3 costs go up of course.

Also I managed to get it so I get billed in AUD this time so we won't be at the behest of the exchange rate.

Once the dust has settled after the migration I'll write up a big announcement on the last year. We're just shy of 2TB of storage now (I'm so glad we went with S3 compatible storage, otherwise we'd have been in trouble!). & Hopefully LW will turn on their parallel sending. I think they are super hesitant because it hasn't really been tested at any serious level, so if there is a way to have it only for reddthat I think they would work with us. That'll shave an extra 4€ off our bill each month too.

[–] [email protected] 2 points 3 months ago

πŸ˜πŸ‘ Happy to be a sacrifice for the greater good

43
submitted 3 months ago* (last edited 3 months ago) by [email protected] to c/[email protected]
 

Hello Reddthat! We are back for another update on how we are tracking. It's been a while eh? Probably because it was such smooth sailing!

In the middle of February we updated Lemmy to v0.19.9 which contained some fixes for federating between Mastodon and Lemmy so hopefully we will see less spam and more interaction from the larger mastodon community. While that in of itself is a nice fix, the best fix is the recent thumbnail fix! Thumbnails now have extra logic around generating them and now have a higher chance of actually being created! Let us know if you think there has been a change over the past month-ish.

Budget & Upcoming Migration

Reddthat has been lucky to have such a great community that has helped us stay online for over a year and if you can believe it, in just a few more months it will be 2 years, if we can make it.

Our costs have slowly increased over the years as you can all see by our transactions on OpenCollective (https://opencollective.com/reddthat). We've managed to reduce some costs in our S3 hosting after it balooned out and bring it down to a more manageable level. Unfortunately as well, the current economic issues have resulted in the Australian dollar slipping further and as we pay everything in USD or EUR it has resulted in slightly higher costs on a month-to-month basis..

Our best opportunity to keep online for the foreseeable future is to downsize our big server from a 32GB ram instance to a 16GB ram instance which will still provide enough memory that we will be able to function as we currently do while not affecting us in a meaningful way.

This means we'll need to reassess if running all our different front ends are useful, or do we only choose a few? Currently I am looking to turn off next and alexandrite. If you are a regular user of these frontends and prefer them please let me know as from our logs these are the least used while also take up the most resources. (Next still has bugs regarding caching every single image).

We can get a vps for about ~A$60-70 per month which will allow us to still be as fast as we are now while saving 40% off our monthly costs. This will bring us to nearly 90% funded by the community. We'll still be slowly "losing" money from our open collective backlog but we'll have at least another 6 months under our belt, if not 12 months! (S3 costs and other currency conversion not withstanding).

All of this will happen in late March early April as we will need to make sure we do it before the current contract is up so we don't get billed for the next month. Probably the 29th/30th of I don't fall asleep too early on those days.
It'll probably take around 45mins to 60mins but if I get unlucky maybe 2 hours.

Age Restriction

Effective immediately everyone on Reddthat needs to be 18 years old and futher interaction on the platform confirms you are over the age of 18 and agree with these terms.

If you are under the age of 18 you will need to delete your account under Settings

This has also been outlined in our signup form that has been updated around the start of February.

Australian & UK Policy Changes

It seems the UK has also created their own Online Safety Act that makes it nearly impossible for any non-corporation to host a website with user generated content (USG). This is slightly different to the Australian version where it specifically targets Social Media websites.

Help?

I would also like your help!
To keep Reddthat online, and to help comply with these laws, if you see content or user accounts which are under the age of 18 please report the account/post/content citing that the user might be under the age of 18.
We will then investigate and take action if required.

Thanks everyone

As always keep being awesome and having constructive conversations!

Cheers,

Tiff!

PS. Like what we are doing? Keep us online for another year by donating via our OpenCollective or other methods (crypto, etc) via here

 

A nice in-depth article on game hacking

 

My talk explores the trajectory of iOS spyware from the initial discovery of Pegasus in 2016 to the latest cases in 2024.

The talk will start with an analysis how exploits, infection vectors and methods of commercial spyware on iOS have changed over time.

The second section of the talk is all about advances in detection methods and the forensic sources which are available to discover commercial spyware. This talk will also include a Case Study about the discovery and analysis of BlastPass (one of the latest NSO Exploits).

The third part will discuss technical challenges and limitations of the detections methods and data sources.

Finally, I will conclude the talk with open research topics and suggestions what Apple or we could technically do to make the detection of commercial spyware better.

The commercial spyware landscape on iOS has evolved significantly since the discovery of Pegasus in 2016. In this talk, we’ll explore that evolution through four main areas:

  1. Spyware Evolution (2016-2024): By analyzing key exploits, tactics, techniques, and procedures (TTPs), infection vectors, and indicators of compromise (IOCs), we’ll trace how spyware has advanced in sophistication, highlighting changes that have led to today’s complex threats.
  2. Advancements in Detection: As spyware has grown more sophisticated, so too have detection capabilities. We’ll review the main actors, public organizations and tools that have shaped spyware detection. This part will also include a case study on my discovery and analysis of a sample NSOβ€˜s BlastPass Exploit chain.
  3. Current and Future Challenges: Looking forward, we’ll examine the pressing challenges in spyware detection and speculate on how commercial spyware might evolve in response to new security measures and technologies.
  4. Recommendations for Research and Detections: Finally, I’ll offer recommendations for advancing research and detection methods and capabilities to combat commercial spyware.

Attendees will gain a comprehensive view of the past, present, and future of spyware on iOS, along with actionable strategies for future research and collaboration.

Licensed to the public under http://creativecommons.org/licenses/by/4.0

1
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]
 

We present fatal security flaws in the HALFLOOP-24 encryption algorithm, which is used by the US military and NATO. HALFLOOP-24 was meant to safeguard the automatic link establishment protocol in high frequency radio, but our research demonstrates that merely two hours of intercepted radio traffic are sufficient to recover the secret key. In the talk, we start with the fundamentals of symmetric key cryptography before going into the details of high frequency radio, HALFLOOP-24, and the foundation of our attack.

High frequency (HF) radio, also known as shortwave radio, is commonly used by the military, other government agencies and industries that need highly robust long-distance communication without any external infrastructures. HF radio uses frequencies between 3 and 30 MHz. These frequencies enable skywave propagation, where the radio signals are reflected by electrically charged particles in the upper atmosphere. While this effect enables communication across very large distances, historically, it required trained and experienced operators to establish a radio link.

This dependence on operators was reduced by the introduction of the automatic link establishment (ALE) protocol. In a nutshell, an ALE-enabled radio establishes a link to another radio by selecting a suitable frequency according to a propagation model and then transmitting a call frame. If the frequency is good, the other radio receives the frame and the two radios perform a handshake to set up a link. The encryption of these ALE frames is known as linking protection. It is primarily meant to protect unauthorized users from establishing links with radios in a network or interfering with established links. Additionally, encryption of ALE frames also protects the network from certain types of traffic analysis, which is the analysis of operating data such as network structure, frequencies, callsigns and schedules. The first ALE standard did not specify a cipher, but specified how to integrate a stream cipher with ALE. Later standards introduced the 56-bit key Lattice/SoDark cipher, which is now recommended to be replaced with HALFLOOP whenever possible.

HALFLOOP, which is standardized in US standard MIL-STD-188-14D since 2017, is essentially a downscaled version of the Advanced Encryption Standard (AES), which effectively is the most used encryption algorithm today. While this downscaling led to many strong components in HALFLOOP, a fatal flaw in the handling of the so-called tweak enables devastating attacks. In a nutshell, by applying a technique known as differential cryptanalysis, an attacker can skip large parts of the encryption process. In turn, this makes it possible to extract the used secret key and hence enables an attacker to break the confidentiality of the ALE handshake messages and also makes an efficient denial-of-service attack possible.

These attacks are described in the two research papers, Breaking HALFLOOP-24 and Destroying HALFLOOP-24. They were initiated by the presentation of the Cryptanalysis of the SoDark Cipher, the predecessor of HALFLOOP.

Licensed to the public under http://creativecommons.org/licenses/by/4.0

24
submitted 5 months ago* (last edited 5 months ago) by [email protected] to c/[email protected]
 

Let's bring in the new year with some maintenance.

We are going to update Lemmy to the latest version 0.19.8

To perform this there will be a downtime of 30 to 45 minutes while our database updates.

Unless everything goes wrong we'll be up within the hour.

See you on the other side.

Tiff


Edit 1:
We are all done!

Edit 2:
Frontends didn't start correctly and should be sorted now

 

What's your plans for today, tomorrow, and the next year?

1
submitted 6 months ago* (last edited 6 months ago) by [email protected] to c/[email protected]
 

Read the whole thread, great look at the original Pentium and some pretty pictures to match!

view more: β€Ή prev next β€Ί