I get 0.8mbps when using this as exit node compared to 100+mpbs when using an exit node on the same server installed as system package. Have you noticed any performance issues?
I joined Lemmy back in 2020 and have been using it as qaz@lemmy.ml until somewhere in 2023 when I switched to lemmy.world. I’m interested in Linux, FOSS, and Selfhosting.
I get 0.8mbps when using this as exit node compared to 100+mpbs when using an exit node on the same server installed as system package. Have you noticed any performance issues?
The internet is pointless, because you can transmit information by shouting. /s
I think that’s technically the kingdom of the Netherlands.
… Immigration minister Marjolein Faber …
Some time ago she announced that there would be checks at the borders
She was asked to elaborate further
She responded with “the checks will be at the borders”
When asked to elaborate further, she answered at the borders with Germany and Belgium (no shit, they’re literally the only countries bordering the Netherlands)
She also said they were going to place billboards in front of places were asylum seekers were staying that would say “we’re working on your return”, “just like I saw in Denmark”. Except she never saw that anywhere, and it would just be cruel and pointless.
So far, very little things have actually passed through parlement despite them having the majority in the “2e kamer”.
Did they mention abortion before the edit?
It will backfire in the short term, but it’s better to take the hit now than to wait until she causes more trouble.
@marcan@treehouse.systems (Hector Martin from Asahi Linux) said the following on Mastodon:
Ars headline: “Found in the wild: The world’s first unkillable UEFI bootkit for Linux”
Article then proceeds to describe a toy GRUB wrapper bootkit that has nothing to do with UEFI firmware (other than running on UEFI systems like any other UEFI bootloader), does not persist in UEFI firmware whatsoever (it just is installed in the ESP partition on disk), and can be killed by not just a drive swap, but any OS reinstall, and even simply a GRUB update/reinstall.
And which looks like a toy demo from every angle, that any experienced security researcher could have cooked up in a couple afternoons. Hardcoded kernel patch offsets for a single specific Ubuntu kernel build and all. No novel techniques in use. This could have even been a homework exercise as far as I’m concerned.
In fact, it has an obvious mistake, touched on by the original article: LD_PRELOAD is set to a string trailing with " /init", no doubt a copy+paste of the command line used to achieve the same execution during testing. The correct string would have omitted the " /init", and the mistake would have caused an error message like this to be printed for every executable launched until LD_PRELOAD is overridden:
ERROR: ld.so: object ‘/init’ from LD_PRELOAD cannot be preloaded (invalid ELF header): ignored.
Furthermore, this bootkit is incomplete, since it relies on chaining into components installed via another mechanism (e.g. /opt/injector.so in the initramfs). A true bootkit only relies on its own first stage to drop all subsequent stages. That’s the whole point of setting up a boot chain compromise like this. Otherwise you can defeat it by removing any of the stages, even if the bootkit stage is intact. As it stands, this bootkit isn’t really a bootkit, it’s just a module signing side-step that allows a traditional rootkit to be loaded on a system with Secure Boot enabled (and, since the Secure Boot is still working as intended, that results in a prompt on the first reboot asking the user to install the “bootkit”'s certificate into the UEFI trusted certificate store, since it is obviously not trusted by default). So it can’t even be installed without clear warning to the user that something is wrong.
Come on, @dangoodin. I expect better than this from Ars, and I expect a correction, because this is just inexcusable misinformation. The original article clearly mentions how to kill this “unkillable” bootkit, which tells me you didn’t even read the original article all the way.
A simple remedy tip to get rid of the bootkit is to move the legitimate /EFI/ubuntu/grubx64-real.efi file back to its original location, which is /EFI/ubuntu/grubx64.efi.
Update: article & headline have been updated.
It just filters for anything “Google CEO” anything “head explodes” anything1. However, this alone won’t help since you will also need another rule that doesn’t let anything pass that contains just “Google CEO” with a lower priority.
1 Except newlines
How did you figure out it had issues with broccoli?. Were you checking your vegetable gallery for CSAM?
And then what?
Is there a way to avoid having to write copy and move twice every time yet?
deleted by creator
They claim to show news articles from different perspectives
He didn’t move there, he went on vacation. However, the rest still applies.
deleted by creator
It seems like it, all of the prices are in dollars so it confused me for a second but that’s probably because nobody understands how much 0.0…0X of a Bitcoin actually is.
It consisted of tensors weights, datasets (which can reach several gigabytes), images, 3d models, and roughly 250+ programming projects with binaries, git without LFS and also a lot build files.
Nextcloud was able to sync it all, but syncing was getting so slow that I had to keep my new laptop running for almost an entire day to get all synced to it. It also wasn’t that great at excluding certain folders (like build cache folders or NPM package files), you would have to set up exclusions on each device separately. Another problem with Nextcloud sync was that it would sometimes duplicate projects after had been moved in a subfolder.
I used to be put everything in ~/Programming at the top level. I later started grouping projects by type (JVM, Web etc.) in subfolders because it was getting hard to find things. This was synced with Nextcloud. However, I then at some point passed 2 million files (200GB) in said folder and decided to search for a better solution.
I ended up using a selfhosted Forgejo instance. It allows for easy code searching across all projects, tagging projects by topic and language, LFS, and has useful project management tools built-in.
Most of those are related to RAID 5/6 afaik