Arthur Besse
cultural reviewer and dabbler in stylistic premonitions
- 43 Posts
- 215 Comments
encryption would prevent the modem from seeing it when someone sends it, but such a short string will inevitably appear once in a while in ciphertext too. so, it would actually make it disconnect at random times instead :)
(edit: actually at seven bytes i guess it would only occur once in every 72PB on average…)
Arthur Besse@lemmy.mlMto Linux@lemmy.ml•Tuxedo OS (Ubuntu-based) with KDE/Wayland - waking from Sleep freezes the computer. Help?English3·1 month agoyou could edit your post title
Have you tried https://mike-fabian.github.io/ibus-typing-booster/ ?
I have not, but I think it does what you’re looking for.
The demo video emphasizes its use as an emoji picker but it was originally created for typing Indic languages.
Arthur Besse@lemmy.mlMto Memes@lemmy.ml•"Violence is never the answer" unless it is white people doing itEnglish2·1 month agoif that is the case I choose upper-left of the political compass for you (:
i’m curious, where do you place yourself on that compass? if you’ve got 20 minutes I highly recommend this video about it.
At first i thought, wow, cool they’re still developing that? Doing a release or two a year, i see.
I used to use it long ago, and was pretty happy with it.
But looking closer now, what is going on with security there?! Sorry to be the bearer of probably bad news, but... 😬
The only three CVEs in their changelog are from 2007, 2010, and 2014, and none are specific to claws.
Does that mean they haven’t had any exploitable bugs? That seems extremely unlikely for a program written in C with the complexity that being an email client requires.
All of the recent changelog entries which sound like possibly-security-relevant bugs have seven-digit numbers prefixed with “CID”, whereas the other bugs have four-digit bug numbers corresponding to entries in their bugzilla.
After a few minutes of searching, I have failed to figure out what “CID” means, or indeed to find any reference to these numbers outside of claws commit messages and release announcements. In any case, from the types of bugs which have these numbers instead of bugzilla entries, it seems to be the designation they are using for security bugs.
The effect of failing to register CVEs and issue security advisories is that downstream distributors of claws (such as the Linux distributions which the project’s website recommends installing it from) do not patch these issues.
For instance, claws is included in Debian stable and three currently-supported LTS releases of Ubuntu - which are places where users could be receiving security updates if the project registered CVEs, but are not since they don’t.
Even if you get claws from a rolling release distro, or build the latest release yourself, it looks like you’d still be lagging substantially on likely-security-relevant updates: there have actually been numerous commits containing CID numbers in the month since the last release.
If the claws developers happen to read this: thanks for writing free software, but: please update your FAQ to explain these CID numbers, and start issuing security advisories and/or registering CVEs when appropriate so that your distributors will ship security updates to your users!
Arthur Besse@lemmy.mlOPto News@lemmy.world•Houthis say 17 air strikes hit Yemen as rebels attack US, Israeli targetsEnglish2·2 months agoI’m pretty sure you’re replying to a joke.
I assumed it was a joke, but (correct me if i’ve misunderstood) I understood it as a joke rooted in the misconception that the US bombing of Yemen was a thing that happened 12 days ago rather than something that has continued every day since then.
If there is some way that this joke works in light of the fact that this article is from yesterday, I failed to grasp it.
Arthur Besse@lemmy.mlOPto News@lemmy.world•Houthis say 17 air strikes hit Yemen as rebels attack US, Israeli targetsEnglish4·2 months agoWe know. There was a group chat.
Did you? This story is about the 17 air strikes that happened yesterday. The attacks described in the group chat were the ones that happened 12 days ago.
The US has continued to bomb Yemen every day since then: https://en.wikipedia.org/wiki/March_2025_United_States_attacks_in_Yemen
Arthur Besse@lemmy.mlMto Linux@lemmy.ml•What's with the move to MIT over AGPL for utilities?English12·2 months agofyi: GNU coreutils are licensed GPL, not AGPL.
there is so much other confusion in this thread, i can’t even 🤦
Arthur Besse@lemmy.mlto Lemmy Shitpost@lemmy.world•The consequences (of my actions) have been extremeEnglish122·2 months agoimo the pejorative connotation of that word, and homophobia generally, is ultimately rooted in misogyny
Arthur Besse@lemmy.mlMto Linux@lemmy.ml•What's with the move to MIT over AGPL for utilities?English32·2 months agoApple makes the source code to all their core utilities available
Apple makes the source code for many open source things they distribute available, but often only long after they have shipped binaries. And many parts of their OS which they developed in-house which could also be called “core utilities” are not open source at all.
Every Linux distro uses CUPS for printing. Apple wrote that and gave it away as free software.
Apple did not write cups.
It was was created by Michael R. Sweet in 1997, and was GPL-licensed and used on Linux distros before Mac OS X existed. Apple didn’t want to be bound by the GPL so they purchased a different license for it in 2002.
Later, in 2007 they bought the source code and hired msweet to continue its development, and at some point the license of the FOSS version was changed to “GNU General Public License (“GPL”) and GNU Library General Public License (“LGPL”), Version 2, with an exception for Apple operating systems.”
for example, on a linux distro, we could modify the desktop environment and make it waaaaay lighter by getting rid of jpg or png icons and just using pure svg on it.
this has largely happened; if you’re on a dpkg-based distro try running this command:
dpkg -S svg | grep svg$ | sort
…and you’ll see that your distro includes thousands of SVG files :)
explanation of that pipeline:
dpkg -S svg
- this searches for files installed by the package manager which contain “svg” in their pathgrep svg$
- this filters the output to only show paths which end with svg; that is, the actual svg files. the argument to grep is a regular expression, wheremeans “end of line”. you can invert the match (to see the paths
dpkg -S svg
found which only contain “svg” in the middle of the path) by writinggrep -v svg$
instead.- the
sort
command does what it says on the tin, and makes the output easier to read
you can run
man dpkg
,man grep
, andman sort
to read more about each of these commands.
No, SVG files are not HTML.
Please change this post title (currently “today i learned: svg files are literally just html code”), to avoid spreading this incorrect factoid!I suggest you change it to “today i learned: svg files are just text in an html-like language” or something like that.edit: thanks OPXML and HTML have many similarities, because they both are descendants of SGML. But, as others have noted in this thread, HTML is also not XML. (Except for when it’s XHTML…)
Like HTML, SVG also can use CSS, and, in some environments (eg, in browsers, but not in Inkscape) also JavaScript. But, the styles you can specify with CSS in SVG are quite different than those you can specify with CSS in HTML.
Lastly, you can embed SVG in HTML and it will work in (modern) browsers. You cannot embed HTML in SVG, however.
The project has been associated with an increase in the number and aggressiveness of black bears in town, including entering homes, mauling people, and eating pets. A single, definitive cause for the abnormal behavior of the bears has not been proven, but it may be due to libertarian residents who refuse to buy and use bear-resistant containers, who do not dispose of waste materials (such as feces) safely, or who deliberately put out food to attract the bears to their own yards, but do not feel any responsibility for how their behavior affects their neighbors. [29]
Arthur Besse@lemmy.mlMto Linux@lemmy.ml•Linux Terminal: CTRL+D is like pressing ENTEREnglish2·2 months agoA ctrl-d does nothing on a non-empty line.
ctrl-d actually is flushing the buffer regardless of if the line is empty or not.
See my other comment for how you can observe it.
Arthur Besse@lemmy.mlMto Linux@lemmy.ml•Linux Terminal: CTRL+D is like pressing ENTEREnglish9·2 months agoNote: for readers who aren’t aware, the notation
^X
means hold down the ctrl key and type x (without shift).ctrl-a though ctrl-z will send ASCII characters 1 through 26, which are called control characters (because they’re for controling things, and also because you can type them by holding down the control key).
^D is the EOF character.
$ stty -a | grep eof intr = ^C; quit = ^\; erase = ^?; kill = ^U; eof = ^D; eol = <undef>; $ man stty |grep -A1 eof |head -n2 eof CHAR CHAR will send an end of file (terminate the input)
Nope, Chuck Testa: there is no EOF character. Or, one could also say there is an EOF character, but which character it is can be configured on a per-tty basis, and by default it is configured to be
^D
- which (since “D” is the fourth letter of the alphabet) is ASCII character 4, which (as you can see inman ascii
) is called EOT or “end of transmission”.What that
stty
output means is that^D
is the character specified to triggereof
. That means this character is intercepted (by the kernel’s tty driver) and, instead of sending the character to the process reading standard input, the tty “will send an end of file (terminate the input)”.By default
eof
is^D
(EOT), a control character, but it can be set to any character.For instance: run
stty eof x
and now, in that terminal, “x” (by itself, without the control key) will be the EOF character and will behave exactly as^D
did before. (The rest of this comment assumes you are still in a normal default terminal where you have not done that.)But “send an end of file” does not mean sending EOT or any other character to the reading process: as the blog post explains, it actually (counterintuitively) means flushing the buffer - meaning, causing the
read
syscall to return with whatever is in the buffer currently.It is confusing that this functionality is called
eof
, and thestty
man page description of it is even more so, given that it (really!) does actually flush the contents of the buffer toread
- even if the line buffer is not empty, in which case it is not actually indicating end-of-file!You can confirm this is happening by running
cat
and typing a few characters and then hitting^D
, and then typing more, and hitting^D
again. (Each time you flush the buffer,cat
will immediately echo the latest characters that had been buffered, even though you have not hit enter yet.)Or, you can pipe
cat
intopv
and see that^D
also causespv
to receive the buffer contents prior to hitting enter.I guess unix calls this
eof
because this function is most often used to flush an empty buffer, which is how you “send an end of file” to the reader.The empty-
read
-means-EOF semantics are documented, among other places, in the man page for theread()
syscall (man read
):RETURN VALUE On success, the number of bytes read is returned (zero indicates end of file), and the file position is advanced by this number.
If you want to send an actual
^D
(EOT) character through to the process reading standard input, you can escape it using the confusingly-namedlnext
function, which by default is bound to the^V
control character (aka SYN, “synchronous idle”, ASCII character 22):$ man stty|grep lnext -A1 * lnext CHAR CHAR will enter the next character quoted $ stty -a|grep lnext werase = ^W; lnext = ^V; discard = ^O; min = 1; time = 0;
Try it: you can type
echo "
and then ctrl-V and ctrl-D and then"|xxd
(and then enter) and you will see that this is sending ascii character 4.You can also send it with
echo -e '\x04'
. Note that the EOT character does not terminate bash:$ echo -e '\x04\necho see?'|xxd 00000000: 040a 6563 686f 2073 6565 3f0a ..echo see?. $ echo -e '\x04\necho see?'|bash bash: line 1: $'\004': command not found see?
As you can see, it instead interprets it as a command.
(Control characters are perfectly cromulent filenames btw...)
$ echo -e '#!/bin/bash\necho lmao' > ~/.local/bin/$(echo -en '\x04') $ chmod +x ~/.local/bin/$(echo -en '\x04') $ echo -e '\x04\necho see?'|bash lmao see?
Arthur Besse@lemmy.mlMto Linux@lemmy.ml•root (or sudo) access delay instead of passwordEnglish251·2 months agosure. first, configure sudo to be passwordless, or perhaps just to stay unlocked for longer (it’s easy to find instructions for how to do that).
then, put this in your
~/.bashrc
:alias sudo='echo -n "are you sure? "; for i in $(seq 5); do echo -n "$((6 - $i)) "; sleep 1; done && echo && /usr/bin/sudo '
Now “sudo” will give you a 5 second countdown (during which you can hit ctrl-c if you change your mind) before running whatever command you ask it to.
Arthur Besse@lemmy.mlMto Linux@lemmy.ml•Mysterious installation of ClamAv on my popos systemEnglish4·2 months agoto answer this question: if you’re on a dpkg-based system, check
/var/log/dpkg.log
(or/var/log/dpkg.log.2.gz
to get logs from January, if your system rotates them once a month).
Arthur Besse@lemmy.mlMto Linux@lemmy.ml•Supply Chain Vulnerabilities found and fixed in Fedora's Pagure and openSUSE's Open Build ServiceEnglish111·2 months agoNice post,
but your title is misleading: the blog post is actually titled “Supply Chain Attacks on Linux distributions - Overview” - the word “attacks” as used here is a synonym for “vulnerabilities”. It is not completely clear from their title if this is going to be a post about vulnerabilities being discovered, or about them actually being exploited maliciously, but the latter is at least not strongly implied.This lemmy post however is titled (currently, hopefully OP will retitle it after this comment) “Supply Chain Attack found in Fedora’s Pagure and openSUSE’s Open Build Service”.edit: @OP thanks for changing the title!Adding the word “found” (and making “Attack” singular) changes the meaning: this title strongly implies that a malicious party has actually been detected performing a supply chain attack for real - which is not what this post is saying at all. (It does actually discuss some previous real-world attacks first, but it is not about finding those; the new findings in this post are vulnerabilities which were never attacked for real.)
I recommend using the original post title (minus its “Overview” suffix) or keeping your more verbose title but changing the word “Attack” to “Vulnerabilities” to make it clearer.TLDR: These security researchers went looking for supply chain vulnerabilities, and found several bugs in two different systems. After responsibly disclosing them, they did these (very nice and accessible, btw - i recommend reading them) writeups about two of the bugs. The two they wrote up are similar in that they both involve going from being able to inject command line arguments, to being able to write to a file, to being able to execute arbitrary code (in a context which would allow attackers to perform supply chain attacks on any software distributed via the targeted infrastructure).
These articles were stolen, by the paywall operators. Elbakyan rescued them from the thieves. 🎉