Install the gamescope using your package manager.
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k
This is a living document. Everything in this document is made in good faith of being accurate, but like I just said; we don't yet know everything about what's going on.
Update: I've disabled comments as of 2025-01-26 to avoid everyone having notifications for something a year on if someone wants to suggest a correction. Folks are free to email to suggest corrections still, of course.
| /* This file was generated by the Hex-Rays decompiler. | |
| Copyright (c) 2007-2020 Hex-Rays <info@hex-rays.com> | |
| Detected compiler: GNU C++ | |
| */ | |
| #include <defs.h> | |
| //------------------------------------------------------------------------- |
Hello! It's been a while since I've done any write-ups, but I thought I'd do one to (hopefully) bring a little clarity to a situation that's been causing a lot of confusion and misinformation.
I'm thinking I'll go through what the problem is and why it happens. So, I guess, let's dive in:
Some people are finding that upon updating to 17.0.0, their consoles are getting a blackscreen and refusing to boot further.
| #include <string> | |
| #include <dlfcn.h> | |
| #include <stdio.h> | |
| #include <sys/mman.h> | |
| #include <unistd.h> | |
| #include <errno.h> | |
| #include <stdlib.h> | |
| using namespace std::literals; |
| #!/usr/bin/env bash | |
| # Created by Alan Bixby (10/29/2021) | |
| # Installs a portable version of Visual Studio code in "$/HOME/.bin", since students lack write access to /usr/bin or sudo access to use the get-apt installer. | |
| # TODO: Tested to be functional, but I still need to add functionality to prevent running on an invalid OS, or from attempting to run it multiple times (after it previously working). | |
| SAVE_DIR=".bin" | |
| mkdir $HOME/$SAVE_DIR | |
| wget -O "$HOME/$SAVE_DIR/VSCode-linux-x64.tar.gz" "https://code.visualstudio.com/sha/download?build=stable&os=linux-x64" |
| // | |
| // SEC Functionality | |
| // | |
| #define SEC_SYSTEM_POWER_ON 0x01 // CPU power on and switch to Protected mode | |
| #define SEC_BEFORE_MICROCODE_PATCH 0x02 // Patching CPU microcode | |
| #define SEC_AFTER_MICROCODE_PATCH 0x03 // Setup Cache as RAM | |
| #define SEC_ACCESS_CSR 0x04 // PCIE MMIO Base Address initial | |
| #define SEC_GENERIC_MSRINIT 0x05 // CPU Generic MSR initial | |
| #define SEC_CPU_SPEEDCFG 0x06 // Setup CPU speed | |
| #define SEC_SETUP_CAR_OK 0x07 // Cache as RAM test |
this is a rough draft and may be updated with more examples
GitHub was kind enough to grant me swift access to the Copilot test phase despite me @'ing them several hundred times about ICE. I would like to examine it not in terms of productivity, but security. How risky is it to allow an AI to write some or all of your code?
Ultimately, a human being must take responsibility for every line of code that is committed. AI should not be used for "responsibility washing." However, Copilot is a tool, and workers need their tools to be reliable. A carpenter doesn't have to
- Download from the following Mirrors: