I’m the administrator of kbin.life, a general purpose/tech orientated kbin instance.

  • 0 Posts
  • 41 Comments
Joined 2 years ago
cake
Cake day: June 29th, 2023

help-circle



  • Doesn’t the motorola phone have a settings screen for defining what the button does? For Samsung they like to re-purpose the power button.

    First of all, it brought up bixby. I turned it back to powering off the phone and disabled bixby.

    Then, with the new update they re-assigned the power button to gemini. So, I turned it back to powering off the phone and disabled gemini too.

    However, the problem these days is that I’m never completely sure I’ve turned off all of the AI nonsense on my phone.




  • Linux secure boot was a little weird last I checked. The kernel and modules don’t need to be secure boot signed. Most distros can use shim to pass secure boot and then take over the secure boot process.

    There are dkms kernel modules that are user compiled. These are signed using a machine owner key. So the machine owner could for sure compile their own malicious version and still be in a secure boot context.



  • They send fake (non-existing) actor ids for votes to obfuscate the identity of the real user. It is “compliant”, but completely against the spirit of a public social network.

    There have been discussions about how to implement this before. But it has to be done in a way that is agreed by other threadiverse software. Unless they actually provide profiles for these fake actors there will be problems since some software will look up the profile info to cache it, even for likes…

    Personally I’m of the opinion of a standard header to mark a favourite message as a private one and use a random ID that the originating instance can use to validate the message as genuine. But, this needs to be adopted properly by all.




  • Actually how is your ISP giving out IPs to you? Mine uses IPv6 PD to give me a /48. And I then use SLAAC locally on the first /64 prefix on my LAN. Plus another /64 for VPN connections.

    If you mean receiving RA/ND packets from your ISP (which are used to announce IPv6 prefixes) then you need to allow icmpv6 packets (if you don’t want to be able to be pinged, just block echo requests, ICMP in v4 and v6 carry important messages otherwise).

    If your ISP uses DHCPv6 Prefix delegation you will need to allow packets to UDP port 546 and run a DHCPv6 client capable of handling PD messages.

    If you have a fixed prefix, then you probably don’t need to use your ISPs SLAAC at all. You could just put your router on a fixed IP as <yourprefix>::1 and then have your router create RA/ND packets (radvd package in linux, not sure what it would be on pfsense) and assign IPs within your network that way.

    If you have a dynamic prefix… It’s a problem I guess. But probably someone has done it and a google search will turn up how they handled it.

    EDIT: Just clarified that the RA/ND packets advertise prefixes, not assign addresses.


  • I believe the privacy concerns are made moot if all consumer level routers by default blocked incoming untracked connections and you need to poke holes in the firewall for the ports you need.

    Having said that, even knowing the prefix it’s a huge address space to port scan through. So it’s pretty secure too with privacy extensions enabled.

    But for sure the onus is on the router makers for now.








  • The big websites are operating on ipv6. If you want to run your own website it’s actually trivial to host it on both ipv4/ipv6 now and most good hosting providers will give you a /64 allocation.

    In the UK broadband providers also are quite commonly providing IPv6 as standard (albeit the scummy ones dynamically assign a prefix, for absolutely zero reason aside from annoyance). My provider uses PD to assign a /48 even.

    So, really not sure why it’s so slow going elsewhere. There’s really no reason for it now in 2025.