Desktop-sized Fully Automatic Loom is an Electromechanical Marvel
https://hackaday.com/2022/11/28/desktop-sized-fully-automatic-loom-is-an-electromechanical-marvel/ #weaving #electromechanical #hackaday
A recent scoop by Reuters revealed that mobile apps for the U.S. Army and the Centers for Disease Control and Prevention (CDC) were integrating software that sends visitor data to a Russian company called Pushwoosh, which claims to be based in the United States.
But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan, malware designed to surreptitiously intercept and forward text messages from Android mobile devices. https://krebsonsecurity.com/2022/11/u-s-govt-apps-bundled-russian-code-with-ties-to-mobile-malware-developer/
@artcollisions Dibs!
Apple has limited Airdrop in China to prevent it from being used by protestors. https://qz.com/apple-airdrop-china-protest-tool-1849824435/amp
Hey friends! https://ottawa.place is now open for signups 🎉🇨🇦❤️
@andrew and I built it as a hosted-in-Canada, capital-region-focused (but open to all Canadians) instance.
Please boost so folks can find us! 👀
#fediverse #twittermigration #canada #ontario #ottawa #canpoli
You should be mindful of the degree to which vendors can remotely control the hardware and software you buy.
Even if you are privileged enough to live in a country where the government doesn't force vendors to push features that squash public dissent and protests, or aid government surveillance, there is no guarantee it will always be that way. If the capability is there, some will be tempted to (ab)use it. #privacy #surveillance
@kashhill Hashtags actually do mean something on this platform and after following interesting people (and possibly people they boost), searching for and following hashtags (and using them yourself) is the next way to find interesting conversations. Many people also put hashtags in their profile to advertise the types of topics they discuss. For instance searching #privacy would likely turn up quite a few conversations.
@IPXFong Compared to the Stahly razors, the Fat Boy handle seems positively tiny! At least the way I hold my razors, the size of the handle hasn't even been something I've noticed. There *is* a subtle difference shaving with it compared to my Slim on the same setting, but that also could just be slight differences in technique when holding the two razors.
@mayread3 Thank you!
Project use-up-the-rest-of-this-warp is well under way. I decided to weave enough fabric for another tote so the warp doesn't go to waste and this time I'm going with a color scheme inspired by leaves (brown, green, orange and red). I don't have any plans for this tote so I'm actually just going to weave the fabric and then set it aside so I can get to the other weaving projects in my queue. #weaving
@hacks4pancakes [Context of these questions is around attackers who gain access to exploit later vs those who take advantage immediately.]
What are the average incubation times between an attacker getting a foothold in a system and discovery? Are there particular things they do that blow their cover?
@Kymberly The closest to a solution I know of is to tie temporary heddles using loops of thread (many floor loom weaving books have examples of how to tie one-off heddles). Then you can move the mis-threaded warp to those temporary heddles and remove them once you are done weaving.
@jeremiahlee @purism It's something we are looking into, but because we created our own "smilodon" fork that customizes it (disabling local/federated timelines and DMs are the main changes) we need some time to port over the changes.
@JoanESheldon Thank you!
My tote is done! This one went quite a bit faster than the previous ones (16 hrs start to finish), and the basic leather punch kit I bought was well worth it. I'm really pleased with how the color combination worked out, it made the tote a cool-toned version of the original warm-toned tote (also pictured).
Technical author, FOSS advocate, public speaker, Linux security & infrastructure geek, author of The Best of Hack and /: Linux Admin Crash Course, Linux Hardening in Hostile Networks and many other books, ex-Linux Journal columnist.