ditto
kiwifarms.net
- Joined
- Aug 17, 2019
They should rename it to "BIG DICK" in all caps.It's all so tiresome
https://github.com/coq/coq/wiki/Alternative-names
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
They should rename it to "BIG DICK" in all caps.It's all so tiresome
https://github.com/coq/coq/wiki/Alternative-names
How about LeCoqNoir?ah yes, calling it "LeCoq" surely will solve the problem here.
95 percent of FSF software is either outdated junk or stuff that works well enough. Most of it is clunky as fuck and ancient in design but it works for most people and is still used mostly due to momentum.For something like the FSF to have any chance of relevance, I think it needs both a ridiculous ideologue to evangelize, and a charismatic figurehead to get checks signed. Why they don't just make Stallman the High Techno Priest for conferences and talks, and get someone shiny to interface with the business world, is beyond me. Either that board truly loves and values RMS, which they may, or he has some dirt. Or lint.
Minnesota is known as the preferred destination for the original snow niggers so the Somalians must have gotten confused on their way to Sweden, they're not a very bright people.Plus its the land of ihan omar and that oddly large somali community. Whats going on in Minnesota!? thanks for the additional context on the school.
A bunch of refugees got sent to minnesota under the obama adminstration, I guess california was getting fullPlus its the land of ihan omar and that oddly large somali community. Whats going on in Minnesota!?
Alright, give me all of your puzzle pieces, because after reading the paper, I can only conclude that this article was either written by a fucking moron who failed to understand the paper, FAKE NEWS, or pure damage control. In all likelihood, it's all three.The Linux kernel is one of the largest software projects in the modern history; with a gigantic 28 millions lines of code.
Contributors from all over the world and from different fields submit a large number of patches each day to the Linux kernel maintainers, so that they get reviewed before being officially merged to the official Linux kernel tree.
These patches could help fix a bug or a minor issue in the kernel, or introduce a new feature.
However, some contributors have been caught today trying to submit patches stealthily containing security vulnerabilities to the Linux kernel, and they were caught by the Linux kernel maintainers.
Researchers from the US University of Minnesota were doing a research paper about the ability to submit patches to open source projects that contain hidden security vulnerabilities in order to scientifically measure the probability of such patches being accepted and merged. Which could make the open source projects vulnerable to various attacks.
They used the Linux kernel as one of their main experiments, due to its well-known reputation and adaptation around the world.
These researchers submitted patches which didn’t seem to completely fix the related issues in the kernel, but also didn’t right away seem to introduce a security vulnerability. A number of these patches they submitted to the kernel were indeed successfully merged to the Linux kernel tree.
However, today, they were caught by Linux kernel maintainers, and were publicly humiliated. In an email by Greg Kroah-Hartman, one of the major Linux kernel maintainers, their approach was disclosed and their so-called “newbie patches” were thrown under the bus:
Apparently, Greg and a number of other maintainers were not happy about this, as these experiments consume their time and efforts and make people engage by bad faith in the Linux kernel development:
Finally, Greg announced that the Linux kernel will ban all contributions from the University of Minnesota, and that all the patches they previously submitted are going to be removed from the kernel, and no new patches will be accepted from them in the future:
The research paper they worked on was published back in February, 2021; around two months ago. In the paper, they disclose their approach and methods that they used to get the vulnerabilities inserted to the Linux kernel and other open source projects.
They also claim that the majority of the vulnerabilities they secretly tried to introduce to various open source projects, were successful in being inserted by around an average of %60:
It is still unclear at this moment what other open source projects they tried to hijack, and what is the actual number of vulnerabilities they succeeded in inserting to various open source projects.
Greg has sent another email in which he reverts most patches from the University of Minnesota from the Linux kernel, and puts some of them on hold.
They also claim that the majority of the vulnerabilities they secretly tried to introduce to various open source projects, were successful in being inserted by around an average of %60:
First, removing every patch submitted from a University of Minnesota email address sounds like a PR stunt to try to control the damage, mainly because the three patches the authors submitted were submitted with gmail addresses.These researchers submitted patches which didn’t seem to completely fix the related issues in the kernel, but also didn’t right away seem to introduce a security vulnerability. A number of these patches they submitted to the kernel were indeed successfully merged to the Linux kernel tree.
However, today, they were caught by Linux kernel maintainers, and were publicly humiliated. In an email by Greg Kroah-Hartman, one of the major Linux kernel maintainers, their approach was disclosed and their so-called “newbie patches” were thrown under the bus:
You, and your group, have publicly admitted to sending known-buggy patches to see how the kernel community would react to them, and published a paper based on that work.
Now you submit a new series of obviously-incorrect patches again, so what am I supposed to think of such a thing?
Apparently, Greg and a number of other maintainers were not happy about this, as these experiments consume their time and efforts and make people engage by bad faith in the Linux kernel development:
Our community does not appreciate being experimented on, and being “tested” by submitting known patches that are either do nothing on purpose, or introduce bugs on purpose. If you wish to do work like this, I suggest you find a different community to run your experiments on, you are not welcome here.
Finally, Greg announced that the Linux kernel will ban all contributions from the University of Minnesota, and that all the patches they previously submitted are going to be removed from the kernel, and no new patches will be accepted from them in the future:
Because of this, I will now have to ban all future contributions from your University and rip out your previous contributions, as they were obviously submitted in bad-faith with the intent to cause problems.
Motherfuckers, half the fun of this retarded autistic language was making dick jokes with it.
Good catch. Others probably pointed out the lack of references to data to the lead author too, as he's since published a full disclosure for the case study at least (why he didn't just include everything as a supplementary from the start is baffling and bad practice).I do not know where the authors obtained this data, and that is the greatest fucking sin of this fucking paper. As an outsider, I don't know if Linux maintains a database of merged and blocked patches, but as an outsider I should be able to figure out where this fucking data came from.
For desktops, sure. For servers, mobile devices, embedded systems, and literally fucking everything else? There's Linux in them thar hills.... there is no fucking money in Linux exploits because it's only used by a subset of greasy neckbeards.
But do they get these kernel updates? I would imagine that the servers do, but the embedded systems?For desktops, sure. For servers, mobile devices, embedded systems, and literally fucking everything else? There's Linux in them thar hills.
This request provides the basic telemetry for Audacity.
To implement the network layer libcurl is used to avoid issues with the built-in networking of the wxWidgets.
Universal Google Analytics is used to track the following events:
To identify sessions we use a UUID, which is generated and stored on the client machine.
- Session start and end
- Errors, including errors from the sqlite3 engine, as we need to debug corruption issues reported on the Audacity forum
- Usage of effects, sound generators, analysis tools, so we can prioritize future improvements.
- Usage of file formats for import and export
- OS and Audacity versions
We use Yandex Metrica to be able to correctly estimate the daily active users correctly. We have to use the second service as Google Analytics is known to have some really tight quotas.
Both services also record the IP the request is coming from.
Telemetry collection is optional and configurable at any time. In case of data sharing is disabled - all calls to the telemetry Report* functions are no-op.
Additionally, this pull request comes with a set of libraries to help the future efforts on Audacity.
God damn it. Guess I'm going to have to find a different sound editing program then.Someone totally not affiliated with the Russian government wants to stick Yandex and Google analytics into Audacity
Basic telemetry for the Audacity
View attachment 2149970
That's a pull request, not an announcement that they're implementing it.God damn it. Guess I'm going to have to find a different sound editing program then.
Yeah. Audacity is a widely-enough used tool, and this is an unpopular-enough decision, that I'm willing to bet that if this PR got merged in, there'd be a widely-supported fork of Audacity without that merge within a day or two.That's a pull request, not an announcement that they're implementing it.
If these reaction stickers are any indication, I think you can safely stick with Audacity for the time being.
Yeah but there's a lot more money in exploits for personal computers than there is for servers and embedded systems.For desktops, sure. For servers, mobile devices, embedded systems, and literally fucking everything else? There's Linux in them thar hills.
No, there's LOADS of money in exploits for servers. Hacks someone's PC, and you potentially have one person's personal info to sell on the black market. Hack a server and you potentially have thousands. You just don't hear about it as much both because of the differences in OS, and because companies tend to do their best to keep everything locked down, but your average normie's approach to security is a lot less rigorous, if they think of it at all.Yeah but there's a lot more money in exploits for personal computers than there is for servers and embedded systems.
Yeah but there's a lot more money in exploits for personal computers than there is for servers and embedded systems.
You're both right/wrong. PCs are the low hanging fruti because every user has to be their own security guy, which means that security on most PCs is equivalent to a bunch of broken windows and an ajar front door with a hanging "please knock!" sign. And most people knock because they're fundamentally good and they've yet to learn that not knocking is a thing you can do and besides, the couch probably isn't worth the effort to steal anyway. Servers have actual security because they have real assets, liability, and above all enough concern to hire someone to do security. At the very least, even the smallest biz will pay the extra $5/mo to their host to keep nginx or whatever up to date for them. So it's a lot more difficult to compromise enterprise servers, but it's potentially a lot more lucrative. As the attacker, depending on your risk appetite and competence, either one could have the "more money".No, there's LOADS of money in exploits for servers. Hacks someone's PC, and you potentially have one person's personal info to sell on the black market. Hack a server and you potentially have thousands. You just don't hear about it as much both because of the differences in OS, and because companies tend to do their best to keep everything locked down, but your average normie's approach to security is a lot less rigorous, if they think of it at all.
So basically, it's roughly equivalent to the difference between a quick-and-dirty smash-and-grab, and a full-on organized bank robbery.You're both right/wrong. PCs are the low hanging fruti because every user has to be their own security guy, which means that security on most PCs is equivalent to a bunch of broken windows and an ajar front door with a hanging "please knock!" sign. And most people knock because they're fundamentally good and they've yet to learn that not knocking is a thing you can do and besides, the couch probably isn't worth the effort to steal anyway. Servers have actual security because they have real assets, liability, and above all enough concern to hire someone to do security. At the very least, even the smallest biz will pay the extra $5/mo to their host to keep nginx or whatever up to date for them. So it's a lot more difficult to compromise enterprise servers, but it's potentially a lot more lucrative. As the attacker, depending on your risk appetite and competence, either one could have the "more money".
Yes but I prefer to define it by target IE convenience store vs bank rather than by the method.So basically, it's roughly equivalent to the difference between a quick-and-dirty smash-and-grab, and a full-on organized bank robbery.
Audacity got bought out, the users don't have any say. Best/worst case they'll close the PR after too much pressure, and implement it anyway behind a closed-source license in a couple months.That's a pull request, not an announcement that they're implementing it.
If these reaction stickers are any indication, I think you can safely stick with Audacity for the time being.