If you happen not to be an infosec person, and would just like some advice on how to not get phished, here's one simple non-technical rule that will help:
👉 If you got a message that demands immediate action of you and is making you feel stressed – take a short break.
Deep breaths, make some tea, take a short walk.
Whatever it is, it almost certainly can wait a few minutes. And a few minutes might just be what it takes for you to figure out it's a scam, or ask someone's opinion.
In 2023 #Poland exports ($469b) for the first time surpassed #Russia ($466b). The structure of these exports is also interesting because Poland now mainly exports highly processed manufacturing products (e.g. machines) and advanced services (e.g. business process outsourcing), while Russia as previously exports mostly natural resources. The largest Poland’s export partner is #Germany and, more generally, EU, but US is 8th exports destinations too.
#Mozilla reports that #Firefox #security CVE-2024-9680 is being exploited in the wild
A vulnerability has been discovered in Mozilla Firefox which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Successful exploitation could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Interesting-looking software engineer position open on the Internet Archive's Archive-It team. https://app.trinethire.com/companies/32967-internet-archive/jobs/99996-software-engineer-archiving-data-services-remote
Fact: web browsers have become so ungodly complex that no individual programmer can hope to make a compliant engine from scratch.
Idiotic bullshit: Thinking the solution to the above is to surrender and abandon hope.
The wikipedia article on electrostatics has the best cat picture 😽
Gemtext has most of what you'd need to publish any kind of hypertext document, but done in a much simpler way.
There are three levels of headers:
# Header 1
## Header 2
### Header 3
A link is always on its own line, beginning with =>
=> gemini://example.com A link to another gemini page
=> image.png This should be rendered as alt text if the image is displayed on the page!
It has unordered lists:
* Item one
* Item two
* Item three
Block quotes:
> Hello there!
And surrounding a block of lines with three ` characters on top and bottom, you can do preformatted text like the HTML pre tag.
Since it's up to the Gemini client to decide how to display stuff, there's no reason a client can't display images in the document if that's how the programmer wants to make it work. But there's virtually no "design" to Gemini -- it's all content, all the time, by design. Any given Gemini capsule should work about as well on a text terminal as it does on a GUI client.
Want to set bold or italic or underline? Use ANSI escape sequences. Any client that doesn't understand them will ignore them.
Want to set colours? Same deal.
Technically, there's no reason Gemini capsules couldn't do things like Sixel graphics or the like, but that would be a bit much to ask.
There's a lot here that I like; my concerns are more to do with things like accessibility for retro systems (there's no technical reason you couldn't do Gemini from a Kaypro 2 running CP/M, if not for the lack of secure protocol support in the wifi modem firmwares!).
60TB Hard Drives Arriving in 2028, According To Industry Roadmap https://hardware.slashdot.org/story/24/10/04/1929235/60tb-hard-drives-arriving-in-2028-according-to-industry-roadmap?utm_source=rss1.0mainlinkanon
Mozilla bought the excellent Android email app K-9 (which didn’t include any trackers) and integrated trackers as part of #Mozilla‘s rebranding under the #Thunderbird name.
They even made it opt-out instead of opt-in. Their defense for breaking the law: ”we wouldn’t have enough data if we obeyed the law.“
It doesn’t matter whether you ”anonymized“ the data or not: If you want to extract data from someone’s device to yours, you may do so only if they knowingly consented.
https://social.tchncs.de/@kuketzblog/113244035577912640
None
Just in case: DMs/PMs simply don't exist on this instance as concept — don't use them, use the other instance if you absolutely have to, or send an email to any address at m0xEE.Net or .Com or .Org, but I prefer keep most communication public.