I am but a cog in a machine. A lazy one though.

If you are new on Lemmy, check out: https://lemmyverse.net/communities for communities to join!

  • 1 Post
  • 115 Comments
Joined 2 years ago
cake
Cake day: July 31st, 2023

help-circle
  • That’s very possible! I mean as a user I also do like stability (had to instance hop quite a few times when I joined fediverse due to them shutting down) but also see resiliency and strenght in being able to spin up an instance of a platform we are all familiar with. When people leave reddit they don’t have similar alternatives with many users, but on lemmy/piefed we can always migrate and stay on the same platform with different rules and administrators.

    Of course that’s simplifying the whole topic, but I’m not that worried about fediverse. But you are right of course that for new users who are on the edge already this might be a big dealbreaker. That’s why I always suggest bigger instances first. Once you are comfortable with fedi/threadiverse you can migrate to a smaller instance (I did exactly that once I figured out how this all works). I know lemm.ee shutting down probably made a noticable chunk of people give up on fediverse because we didn’t see any instance completely fill the void that lemm.ee’s weekly activity left.






  • Ah must remember wrong or maybe it was proposed!

    Yeah the software would need to know, but in a way “lemmy” knows because it knows which instances your instance is federating with. If your instance isn’t federating with the link target it cant find it anyway.

    Same as the ! Exclamation mark for communities or @ for users it can do a look up (you can put my link to your search input in lemmy and it will find it), but there would be otherways to achieve this too.

    But yeah it would be really nice to have some universal way like the ! And @ signs to point to another fedi post/comment.


  • No problem, I feel like fedistuff is so scattered and hidden that it’s always worth mentioning your favourite tools :)

    The frontends and apps do redirect embedded links in comments no? E.g. if you click this it should automatically use your instance to find the comment (even though its a link to my instance): https://sopuli.xyz/comment/17606535

    Or maybe you mean when you paste an url to the browser that it should automatically redirect to your instance? If so thats tad bit difficult. There was once a post that proposed something like a activityPub/lemmy URI scheme where links would look like this:

    activitypub://<postorcommentidentifier>
    

    But I don’t remember where that conversation led and also I have no idea how feasible that would be.

    Edit: added words



  • Lazycog@sopuli.xyztoMemes@sopuli.xyzDaily
    link
    fedilink
    arrow-up
    5
    ·
    9 days ago

    I hope my words can lift someone’s mood up! :)

    I’ve never bumped into the term before lemmy, but that’s probably because English is not my first language. In my native language it also sounds like that and I wouldn’t use it.


  • Lazycog@sopuli.xyztoMemes@sopuli.xyzDaily
    link
    fedilink
    arrow-up
    19
    ·
    9 days ago

    It’s gonna be ok, you got this. We are all still just the little humans we were when we were children, in an adult body, with just more experience and knowledge than back then.

    It’s ok to feel overwhelmed, stressed, like an impostor, etc. You and everyone else have gotten through struggles before. This too shall pass.

    All you can do is your best, you can’t do more and that’s ok.










  • What the hell

    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.

    “At first glance, it’s hard to believe that this is actually valid JavaScript,” the Veracode Threat Research team said. “It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work.”

    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server (“firewall[.]tel”).

    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain (“cdn.audiowave[.]org”) and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB (“i.ibb[.]co”).

    “[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it,” Veracode said. “It ultimately builds up in memory YET ANOTHER .NET DLL.”

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user.

    The newly-downloaded DLL is Pulsar RAT, a “free, open-source Remote Administration Tool for Windows” and a variant of the Quasar RAT malware.

    Honestly, at this point the hacker deserves to empty my bank account.