An embedded GNU/Linux distribution
POPULARITY
With NixOS 25.05 around the corner, we sit down with a release manager to unpack what's new, what's changing, and what's finally getting easier. Spoiler: it's not just the tooling.Sponsored By:Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Support LINUX UnpluggedLinks:
Подивитись відео на YouTube Чатик розумного будинку в matrixhttps://matrix.to/#/#ukrainian-self-hosted-smart-home:matrix.org0:00:00 - Вступ: Представлення гостей та теми подкасту (IoT)0:00:41 - Обговорення безпеки IoT пристроїв та розумного будинку0:02:10 - Приклади неочікуваної поведінки розумних пристроїв (робот-пилосос)0:05:09 - Дискусія про Wi-Fi: роутери, прошивки (TP-Link vs OpenWrt), налаштування мереж0:11:40 - Проблеми безпеки з пристроями EcoFlow0:19:16 - Використання Synology NAS: моделі, RAID, зберігання даних (фото, відео, документи)0:25:54 - Торенти та закриті трекери (Utopia)0:34:56 - Огляд Home Assistant Green: переваги над Raspberry Pi0:38:32 - Голосовий асистент Home Assistant: локальне керування, інтеграція з LLM0:52:00 - Порівняння Raspberry Pi 5 та міні-ПК для домашніх серверів1:03:15 - Розповідь про Київський Хакспейс (Hacklab): спільнота, майстерні, проєкти1:09:45 - Дискусія: Системи Ajax проти відкритих рішень (Home Assistant, Zigbee)1:25:20 - Заключні думки та завершення подкасту
Follow Proof of Coverage Media:https://x.com/Proof_CoverageConnor welcomed back Jeffrey Manner, co-founder of Roam, to discuss their latest advancements in Wi-Fi and decentralized identity. Jeffrey detailed Roam's live pilot program, where users earn points by contributing to the network, validating Wi-Fi connections, and adding public hotspots. They explored the concept of Open Roaming, an initiative under the Wireless Broadband Alliance that aims to create seamless Wi-Fi experiences akin to mobile network roaming, with Roam positioned as a Web3 identity provider enabling secure connections across millions of hotspots. The conversation delved into Roam's hardware strategy, including their Wi-Fi routers and onboarding existing Open Roaming nodes, as well as their unique approach to decentralized identity and verifiable credentials. Jeffrey also shared plans for monetization, potential telco partnerships, and expanding services within their distributed network.Timestamps:00:00 - Introduction00:34 - Pilot Burning Pool and Token Mechanics02:32 - Earning Points in the Roam Network04:28 - Understanding Open Roaming07:34 - Roam's Hardware Strategy10:44 - OpenWRT and Community Upgrades11:48 - Building on Solana13:25 - Decentralized Identity and Verifiable Credentials15:42 - Monetization Strategies and Demand Side18:28 - Future of Telcos and Roam's Role20:24 - Coordination and Incentivization in Open Roaming25:24 - Looking Ahead to 202526:15 - Where to Find Roam OnlineDisclaimer: The hosts and the firms they represent may hold stakes in the companies mentioned in this podcast. None of this is financial advice.
Adding AI to Firefox with Orbit, installing OpenWrt on the Banana Pi R4, Mecha Comet modular Linux handheld at CES, and self-hosted music streaming with ease.
This show has been flagged as Clean by the host. Hello, this is Jon The Nice Guy, and after 10 years of knowing about Hacker Public Radio, here is my first podcast for the network. Firstly, I want to give a shout out to my Admin Admin Podcast co-host Al, who I heard just a week-or-so ago talking about Proxmox! Glad to hear you're over here too! I wanted to record an episode on my ridiculously complicated DHCP setup at home. I'm not saying this is the right or even a good idea for anyone else, but it's something you might want to do. Firstly, a little about why I have a complicated DHCP setup, and it starts with the router my previous ISP gave me. My router could just about cope with serving DHCP, but at the time when I was experimenting with running services on my home lab, the DNS server on the router wouldn't return addresses for hosts on my network, just those on the public internet. This wasn't a great experience! So, I installed PiHole [1] - initially because I'd heard good things about it's ad blocking capabilities, but later because it was just a pretty and sensible DHCP and DNS server that I could do things with. Under the covers, PiHole is running DNSMasq [2], which means that all the configuration is plain text files that I can overwrite with Ansible [3]. My PiHole was running on a Raspberry Pi 2 [4], in a lego-style case [5] plugged into the back of my router. And this was fine for a few months. And then it ran out of storage space, I changed jobs, my wife complained one too many times, and I reverted back to using the router's DHCPd and DNS. I also picked up either Nebula [6] or Tailscale [7] at around that time too, so I didn't need internal DNS to resolve to home services any more, and anything public I setup external DNS records pointing to the internal addresses. Job done. Scrub forward a couple of years, and when I changed jobs, I got a joining bonus which paid for me to get wired network around my house. I also setup my own Proxmox [8] cluster, which I documented on a post [9] on my blog [10]. Again, everything was peachy. I setup home assistant [11], which I expose on to the internet via a proxy on my VPS, and everything was still good... but things are a little more complicated now - I've got more stuff to keep track of and the router's DHCP server was struggling a little... but it was all OK. And then I changed ISP. My new ISP shipped a router running a customized version of OpenWRT [12], and I thought, finally, a good router! And then I realised I couldn't do *anything* sensible with it. It was so locked down, I couldn't even change the admin password without factory resetting it! Ugh. Within a couple of weeks my wife was complaining about random intermittent DNS requests failing, and I was seeing it too. So, I found on the Proxmox Helper Scripts [13] website that someone had put a script to setup a PiHole instance... So naturally, as I had two Proxmox Servers by this point, I ran two PiHole servers. This lasted a few months until I performed a system upgrade to the proxmox cluster and it took down both Proxmox cluster members at the same time and DNS fell off the network! I revived the Raspberry Pi 2 which now sits attached to the router again! Yes! Meanwhile, I was now getting more into IoT and I had several Tuya IoT devices connected over Wifi, and the 254 network addresses available in the /24 sized network [14] to me at home didn't seem enough, so I decided to expand my network to a /22, giving me enough address space for 1022 devices. Plus, I have kids, who each have computers and phones and games devices, my wife and I both work from home, so we both have computers from work and our own devices too... so I decided, now is the time to plan out my network. I decided to use PHPIPAM [15] having been asked to look at it at work, and found it was a good fit for what I wanted to do with it. PHPIPAM is really designed for owners of large-scale networks, people who allocate chunks of public IP scopes and IPv6 address ranges, but it will subdivide smaller network blocks, and so I could carve up my network. I decided to split my /22 into four /24 networks. One was dedicated to DHCP addressed items, with one smaller subnet in there allocated to the Proxmox hosted PiHole and another to the Raspberry Pi hosted PiHole, and both are basically a catch-all for anything I've not yet allocated. One was for end-user devices, like phones, computers, TVs and Games Consoles separated into smaller subnets per-person and one additional subnet for room-shared devices like TVs and Games Consoles. One subnet was separated into smaller subnets for IoT devices and core network things, like mains and network switches, light bulbs, cameras and printers. The last /24 subnet was undivided, but was for servers, both physical and virtual. Great, I've now got a lovely network map [IMAGE1], but *ugh* I've got to transfer all those DHCP and static IP allocations to the PiHoles. And, while I'd been using Gravity Sync [15] to synchronize between the two PiHole devices, sometimes it took a while for Gravity Sync to sync. And over time, I wanted to expose some of those services I was running at home, to my family, at home. So, I turned to Ansible. A few years ago, I'd helped write some Ansible modules which were used to interact with a cloud service my employer at the time was running, so I had a kind of idea on how Ansible works under the surface, the documentation for writing a new set of lookups was OK, and ChatGPT helped where I lost my way. I knew that there was a Terraform [17] Provider [18] for PHPIPAM, so there was a working API... and so I knew I could look up data in PHPIPAM. I wrote some Ansible lookups [19] to confirm the data was accessible from PHPIPAM, and it was! Great, now all I needed to do was to drop files into PiHole. I'd heard Alex [20] from the Self Hosting Podcast [21] talking about how he wrote some Ansible to automate his PiHole management [22], but it assumed a lot about how your network was setup and integrated a lot with other things he did - no complaints there! It's his network after all! But so I knew I needed to do 5 things. 1. Create a list of static DHCP allocations on both PiHole devices. 2. Create a list of DNS names to resolve in the internal network to addresses via A records 3. Create a list of DNS names to resolve to other DNS names via CNAME records 4. Create a list of DNS wildcards, so anything ending in that name would appear in my network. 5. If anything changed, restart DNSMasq. I wrote this code and ran it. Well, ran it and it didn't work, so I fixed it and ran it again... and again and again until it did work. I've just added that to my Github today, so feel free to take a look [23]. You've spent a while listening to this, so what is my "too long, didn't listen"? I have two pihole devices, I run a phpipam service under docker on a LXC container on my proxmox server. On the same LXC container I have a cron job which triggers the ansible playbook every 5 minutes to push any updates to PHPIPAM to the pihole hosts. Every few days I check to see what hosts have turned up in the DHCP pools on the PiHole hosts, map those to hosts I want to track in the future, and allocate them addresses in PHPIPAM so that those hosts will get managed IP addresses after 5 minutes, the next time they renew their DHCP addresses... Tada! For more over engineered solutions like this, feel free to take a look at the content on my blog, or maybe I'll appear again, on Hacker... Public... Radio. Take care, 73. [1] PiHole: https://pi-hole.net/ [2] DNSMasq: https://thekelleys.org.uk/dnsmasq/doc.html [3] Ansible: https://ansible.com [4] Raspberry Pi: https://www.raspberrypi.com/products/ [5] Lego style case: https://www.amazon.co.uk/gp/product/B015WVR5BS [6] Nebula: https://www.defined.net/ [7] Tailscale: https://tailscale.com/ [8] Proxmox: https://www.proxmox.com [9] Proxmox post: https://jon.sprig.gs/blog/post/2885 [10] My blog: https://jon.sprig.gs [11] Home Assistant: https://www.home-assistant.io/ [12] OpenWRT: https://openwrt.org/ [13] Helper Scripts: https://community-scripts.github.io/ProxmoxVE/ [14] Network address spreadsheet: https://gist.github.com/JonTheNiceGuy/a847aa4faf878d7d6cee5c069e1d66d6 [15] PHPIPAM: https://phpipam.net/ [16] Gravity Sync: https://github.com/vmstan/gravity-sync [17] Terraform: https://www.terraform.io/ [18] PHPIPAM Terraform Provider: https://registry.terraform.io/providers/lord-kyron/phpipam/latest [19] Ansible Lookup: https://gist.github.com/JonTheNiceGuy/289a8a2e0233e730f0fbc8f958ec4bc6 [20] Alex Kretzschmar: https://alex.ktz.me/ [21] Self Hosted Podcast: https://selfhosted.show/ [22] Fully Automated DNS and DHCP with PiHole and DNSMasq: https://blog.ktz.me/fully-automated-dns-and-dhcp-with-pihole-and-dnsmasq/ [23] ansible-pihole: https://github.com/JonTheNiceGuy/ansible-pihole [IMAGE1] https://jon.sprig.gs/blog/wp-content/uploads/2024/12/Screenshot-from-2024-12-20-19-29-22.png Provide feedback on this episode.
We tested out the OpenWRT One and tried it in a unique use case. Then, Wes goes back to 1999 to solve a problem.Sponsored By:Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Support LINUX UnpluggedLinks:
If you've ever wondered how attackers could go after payphones that are "smart" we got you covered! Inbar has done some amazing research and is here to tell us all about it! Segment Resources: https://www.retro.unarmedsecurity.net/post/%D7%9E%D7%A1%D7%AA%D7%91%D7%A8-%D7%A9%D7%92%D7%9D-%D7%98%D7%9C%D7%A4%D7%95%D7%9F-%D7%A6%D7%99%D7%91%D7%95%D7%A8%D7%99-%D7%94%D7%95%D7%90-%D7%98%D7%9C%D7%A4%D7%95%D7%9F-%D7%97%D7%9B%D7%9D XSS is the number one threat?, fix your bugs faster, hacking VoIP systems, AI and how it may help fuzzing, hacker gift guides, new DMA attacks, hacking InTune, Rhode Island gets hacked, OpenWrt supply chain issues, we are being spied on, Germans take down botnet, Bill and Larry are speaking at Shmoocon!, and TP-Link bans. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-855
This week's EYE ON NPI is an EYE ON A PI - it's the Raspberry Pi Compute Module 5 (https://www.digikey.com/en/product-highlight/r/raspberry-pi/raspberry-pi-compute-module-5), the latest update to the easily embeddable mini modules that make industrial developers happy by giving them all the power of a Pi 5 in a ready-to-go pluggable solution. The Raspberry Pi computer launched with the goal of bringing low cost computing to the education market (https://www.bbc.co.uk/blogs/thereporters/rorycellanjones/2011/05/a_15_computer_to_inspire_young.html) and through the Pi Foundation (https://www.raspberrypi.org/) they still have that charitable goal (https://static.raspberrypi.org/files/about/RaspberryPiFoundationStrategy2025.pdf) while also spinning off the manufacturing/sales company into the Trading Company which went public this year (https://www.raspberrypi.org/blog/what-would-an-ipo-mean-for-the-raspberry-pi-foundation/). The first few Raspberry Pi computers were 'all in one' style (https://www.adafruit.com/product/1344), with power, GPIO, Video and Audio output, USB, Ethernet, and Micro SD card storage (https://raspi.tv/2018/new-raspberry-pi-family-photo-including-pi3a-plus-zero-wh). Eventually enough folks asked for an enclosure-friendly version that would allow an "I/O" board to be designed with the ports in a different arrangement - the big-sized-Pis have them arrayed over 3 sides. To solve this conundrum, and to satisfy the growing industrial/commercial market, the Pi engineers designed the Compute Module 1 which is still available (https://www.raspberrypi.com/products/compute-module-1/). This clever SODIMM packaged board has all the GPIO and peripheral pins on a plug-in connector so you can slot it into an existing design securely and easily - SODIMM sockets (https://www.digikey.com/short/rz9cdjrn) come both vertical and horizontal. This was later updated to the CM3 and CM3+ (https://www.digikey.com/en/products/detail/raspberry-pi/SC0149/9866293) which was on par with the Pi 3 instead of the Pi 1, with significantly higher computational power. However, perhaps because they wanted a more compact module, or to support high-frequency signals better, the next generation of Compute Module 4's (https://www.digikey.com/short/wffzdn0b) came in a flat rectangular shape with dual 100-pin Hirose contacts. (https://www.digikey.com/short/5m8djf0t) Another nice thing that happened with the CM4 is it became available in dozens of configurations: 1/2/4/8 GB RAM, SD or 8/16/32GB MMC, and with or without WiFi/BLE/BT. This allowed commercial users to go with the 'lowest cost option' needed to fulfill their requirements - whereas the Pi 4 comes in only 3 or 4 RAM options (https://www.digikey.com/short/4pn5vw24). The ready-to-go software - no kernel compiling or OpenWRT configuration required! Long-term hardware support and low prices pushed the CM4 into more and more designs. Which brings us to the NPI of the week, the Compute Module 5 (https://www.digikey.com/en/product-highlight/r/raspberry-pi/raspberry-pi-compute-module-5)! The CM5 is a big upgrade, with quad A76s at 2.4GHz for a 2x computing upgrade, increased RAM options of up to 16G, increased MMC option of 64GB, USB 3.0 ports, PCIe and RP1 hardware interfacing with PIO support (https://www.raspberrypi.com/news/piolib-a-userspace-library-for-pio-control/). If you have an existing CM4 design, you can easily upgrade or update to the new hotness. If you're new to integrating Raspberry pi, then while you may think of the Pi as a hobby/school computer, that isn't necessarily true anymore with 72% of Pi computers sold going into commercial/industrial use (https://investors.raspberrypi.com/ipo/documents/1). That means you can be confident that you'll get consistent pricing and availability for a long time so that you can work on designing the rest of your product for the CM series to plug into. And like the CM4, the CM5 is available in a variety of configurations and prices, from $45 to $135. Raspberry Pi Compute Module 5's are currently only available for pre-order (https://www.digikey.com/en/product-highlight/r/raspberry-pi/raspberry-pi-compute-module-5) , with estimated ship times in Q1 of 2025 to DigiKey - and the moment DigiKey gets some in stock, they'll ship your pre-order instantly so you can get integrating with the Pi ecosystem the very next day. Don't wait till release day because they'll sell out instantly! Instead, when you pre-order from DigiKey, your order goes into a queue and you'll get first-come-first-served prioritization. See more on DigiKey https://www.digikey.com/short/47t12drj
XSS is the number one threat?, fix your bugs faster, hacking VoIP systems, AI and how it may help fuzzing, hacker gift guides, new DMA attacks, hacking InTune, Rhode Island gets hacked, OpenWrt supply chain issues, we are being spied on, Germans take down botnet, Bill and Larry are speaking at Shmoocon!, and TP-Link bans. Show Notes: https://securityweekly.com/psw-855
If you've ever wondered how attackers could go after payphones that are "smart" we got you covered! Inbar has done some amazing research and is here to tell us all about it! Segment Resources: https://www.retro.unarmedsecurity.net/post/%D7%9E%D7%A1%D7%AA%D7%91%D7%A8-%D7%A9%D7%92%D7%9D-%D7%98%D7%9C%D7%A4%D7%95%D7%9F-%D7%A6%D7%99%D7%91%D7%95%D7%A8%D7%99-%D7%94%D7%95%D7%90-%D7%98%D7%9C%D7%A4%D7%95%D7%9F-%D7%97%D7%9B%D7%9D XSS is the number one threat?, fix your bugs faster, hacking VoIP systems, AI and how it may help fuzzing, hacker gift guides, new DMA attacks, hacking InTune, Rhode Island gets hacked, OpenWrt supply chain issues, we are being spied on, Germans take down botnet, Bill and Larry are speaking at Shmoocon!, and TP-Link bans. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-855
XSS is the number one threat?, fix your bugs faster, hacking VoIP systems, AI and how it may help fuzzing, hacker gift guides, new DMA attacks, hacking InTune, Rhode Island gets hacked, OpenWrt supply chain issues, we are being spied on, Germans take down botnet, Bill and Larry are speaking at Shmoocon!, and TP-Link bans. Show Notes: https://securityweekly.com/psw-855
DNS is het kloppende hart van het internet, en deze aflevering duiken we diep in deze fundamentele technologie. Te gast is Peter van Dijk, senior PowerDNS engineer, die met passie vertelt over de geschiedenis, uitdagingen en innovaties van deze open-source DNS-software. Van het technische fundament van DNS tot modernere toepassingen zoals content filtering en encrypted DNS: Peter deelt inzichten over hoe PowerDNS en hijzelf bijdragen aan een veiliger en robuuster internet.Peter vertelt ook over zijn fascinatie voor het hergebruiken van oude hardware en zijn betrokkenheid bij projecten zoals OpenWRT en Home Assistant. Deze hobby brengt technische puzzels met zich mee en laat zien hoe je apparaten kunt “bevrijden” van verouderde software of gesloten ecosystemen.ShownotesPowerDNSBert HubertDNS Explained (Engels)OpenWRTESP HomeHome AssistantTuya DevicesSyntropynet Blog over PowerDNSTijdschema0:00:00 Reclame: ICT Group0:00:42 Introductie Peter van Dijk en zijn werk met PowerDNS0:01:19 Het ontstaan en de evolutie van PowerDNS0:02:16 Uitleg over DNS als telefoonboek van het internet0:05:25 Hoe PowerDNS inkomsten genereert met open-source0:07:14 Over DNSSEC en de rol van authenticiteit0:14:33 Encryptie en de toekomst van DNS0:19:56 Bouwprojecten en technische uitdagingen bij PowerDNS0:28:31 Contentfiltering op DNS-niveau: morele dilemma's en technische oplossingen0:34:42 Luisteraarsvragen: DS-keys vs DNS-keys en domeinen verhuizen0:41:10 Hoe je routers bevrijdt met OpenWRT0:52:25 Bevrijding van Tuya-apparaten en de kracht van ESP Home0:56:04 Home Assistant als eindeloos projectZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Take a Network Break! This is our final show for 2024. We start with critical vulnerabilities in Ivanti and OpenWrt, and then discuss what effect a proposed bill from US Senator Ron Wyden would have on telecom security (short answer: more paperwork but unlikely to improve protection). Extreme Networks announces a new AI platform that... Read more »
Take a Network Break! This is our final show for 2024. We start with critical vulnerabilities in Ivanti and OpenWrt, and then discuss what effect a proposed bill from US Senator Ron Wyden would have on telecom security (short answer: more paperwork but unlikely to improve protection). Extreme Networks announces a new AI platform that... Read more »
Take a Network Break! This is our final show for 2024. We start with critical vulnerabilities in Ivanti and OpenWrt, and then discuss what effect a proposed bill from US Senator Ron Wyden would have on telecom security (short answer: more paperwork but unlikely to improve protection). Extreme Networks announces a new AI platform that... Read more »
Join us for this segment as we discuss government regulations and certifications as they apply to supply chain security and vulnerability management, and how understanding the mumbo jumbo can enable organizations to improve their cyber security. In the security news, the crew, (minus Paul) get to gather to discus hacks causing disruptions, in healthcare, donuts and vodka, router and OpenWRT hacks (and the two are not related), Salt/Volt Typhoon means no more texting and 10 year old vulnerabilities and more! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-854
In the security news, the crew, (minus Paul) get to gather to discus hacks causing disruptions, in healthcare, donuts and vodka, router and OpenWRT hacks (and the two are not related), Salt/Volt Typhoon means no more texting and 10 year old vulnerabilities and more! Show Notes: https://securityweekly.com/psw-854
Join us for this segment as we discuss government regulations and certifications as they apply to supply chain security and vulnerability management, and how understanding the mumbo jumbo can enable organizations to improve their cyber security. In the security news, the crew, (minus Paul) get to gather to discus hacks causing disruptions, in healthcare, donuts and vodka, router and OpenWRT hacks (and the two are not related), Salt/Volt Typhoon means no more texting and 10 year old vulnerabilities and more! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-854
In the security news, the crew, (minus Paul) get to gather to discus hacks causing disruptions, in healthcare, donuts and vodka, router and OpenWRT hacks (and the two are not related), Salt/Volt Typhoon means no more texting and 10 year old vulnerabilities and more! Show Notes: https://securityweekly.com/psw-854
Mit Freifunk gibt es ein Gemeinschaftsprojekt, das nicht nur technisch, sondern auch gesellschaftlich spannend ist. Gemeinsam mit Dirk Steingässer und David Bauer ergründen wir den Ursprung und Nutzen und zeigen, wie einfach es ist mitzuwirken.
On this week's show, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: Cleo file transfer products have a remote code exec, here we go again! Snowflake phases out password-based auth Chinese Sophos-exploit-dev company gets sanctioned Romania's election gets rolled back after Tiktok changed the outcome AMD's encrypted VM tech bamboozled by RAM with one extra address bit Some cool OpenWRT research And much, much more. This week's episode is sponsored by Thinkst, who love sneaky canary token traps. Jacob Torrey previews an upcoming Blackhat talk filled with interesting operating system tricks you can use to trigger canaries in your environment. You wont believe the third trick! Attackers hate him! This episode is also available on Youtube. Show notes Cleo Software Actively Being Exploited in the Wild CVE-2024-50623 | Huntress Blue Yonder investigating data leak claim following ransomware attack | Cybersecurity Dive Snowflake to phase out single-factor authentication by late 2025 | Cybersecurity Dive Treasury Sanctions Cybersecurity Company Involved in Compromise of Firewall Products and Attempted Ransomware Attacks | U.S. Department of the Treasury Another teenage hacker charged as feds continue Scattered Spider crackdown | The Record from Recorded Future News Germany arrests suspected admin of country's largest criminal marketplace | The Record from Recorded Future News FCC, for first time, proposes cybersecurity rules tied to wiretapping law | CyberScoop Russian state hackers abuse Cloudflare services to spy on Ukrainian targets | The Record from Recorded Future News Cloudflare's pages.dev and workers.dev Domains Increasingly Abused for Romania annuls presidential election over alleged Russian interference | The Record from Recorded Future News EU demands TikTok 'freeze and preserve data' over alleged Russian interference in Romanian elections | The Record from Recorded Future News Research Note: Meta's Role in Romania's 2024 Presidential Election - CheckFirst Key electricity distributor in Romania warns of ‘cyber attack in progress' | The Record from Recorded Future News Backdoor slipped into popular code library, drains ~$155k from digital wallets - Ars Technica AMD's trusted execution environment blown wide open by new BadRAM attack - Ars Technica New dog, old tricks: DaMAgeCard attack targets memory directly thru SD card reader – PT SWARM Telegram partners with child safety group to scan content for sexual abuse material Apple hit with $1.2B lawsuit after killing controversial CSAM-detecting tool - Ars Technica Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research How do I turn on the Do Not Track feature? | Firefox Help
There's been a bit of a shakeup this week, with Torvalds criticizing Docker, Rustls dominating the TLS performance war, and Intel releasing a graphics card while "retiring" their CEO. Then, Flathub and KDE are working on their finances, OpenVPN has modernized its kernel driver, and Steam Machines may be back! Oh, and don't forget OBS 31 or the potential security issue with OpenWRT! For tips, we have eza as an ls replacement, pv for pipe progress viewing, IMSProg for EEPROM hacking, and HandlePowerKey for customizing what your machine does when you hit the power button. Grab the show notes at https://bit.ly/4gl1VtB and enjoy! Host: Jonathan Bennett Co-Hosts: Rob Campbell, David Ruggles, and Jeff Massie Want access to the video version and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
We are characteristically cynical about GitHub's token effort to improve FOSS security, more positive about FreeCAD 1.0 and elementary OS 8, somewhat ambivalent about the new OpenWrt router, understanding about Linux sanctioning the Bcachefs dev, and surprised that Félim is slowly starting to warm up to the idea of atomic distros (because KDE, obvs). With... Read More
We are characteristically cynical about GitHub's token effort to improve FOSS security, more positive about FreeCAD 1.0 and elementary OS 8, somewhat ambivalent about the new OpenWrt router, understanding about Linux sanctioning the Bcachefs dev, and surprised that Félim is slowly starting to warm up to the idea of atomic distros (because KDE, obvs). With... Read More
The KDE and GNOME projects are working on official Linux distributions, but do we need more distros? We dig into their special sauce.Plus: Wes' top DNS server pick, and it's not one we've heard before.Sponsored By:Black Friday Member Sale: 30% Off for the lifetime of your Membership! Code: blackfriday Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Support LINUX UnpluggedLinks:
As inflation concerns resurface, the latest data reveals a modest rise in the Personal Consumption Expenditures Price Index, with the overall PCE increasing by 2.3% year-over-year. Despite these inflationary pressures, the economy shows resilience, with GDP growth at an annualized rate of 2.8% in the third quarter and a steady job market. Host Dave Sobel highlights five positive economic trends, including a decrease in inflation rates and an increase in real wages, which suggest a cautiously optimistic outlook for the upcoming year.The episode also covers significant developments in the tech industry, including the resignation of Intel's CEO Pat Gelsinger. His departure comes amid growing concerns from the board regarding his ability to execute a turnaround strategy for the company, which has struggled to compete with rivals like AMD and NVIDIA. The transition to co-CEOs, David Zinsner and Michelle Johnson-Holstoss, raises questions about leadership clarity and decision-making processes at Intel, which could impact its future direction and product roadmap.Additionally, Microsoft has denied allegations that it collects user data from its Microsoft 365 applications for AI training, following a viral post that raised privacy concerns. The company reassured users that they have control over their data privacy settings and emphasized the purpose of the Connected Experiences feature. This clarification is crucial for IT professionals as they navigate discussions with clients about data privacy and the functionalities of Microsoft products.Finally, the episode introduces OpenWrt's entry into the hardware market with the launch of its user-friendly Wi-Fi 6 router, the OpenWrt One. This development marks a significant milestone for the open-source community, emphasizing repairability and user empowerment. Sobel notes that while the router may have niche appeal, it aligns with trends in ethical consumerism and decentralized technology, making it a noteworthy option for IT service providers and networking professionals. Four things to know today00:00 Inflation, Tech Trends, and Economic Resilience Shape IT Priorities for 2025 and Beyond06:50 Pat Gelsinger Resigns as Intel CEO: What It Means for the Chipmaker's Future08:56 Microsoft Denies Using 365 User Data for AI Training Amid Viral Allegations09:55 OpenWrt Enters Hardware Market with User-Friendly, Open-Source Wi-Fi 6 Router Supported by: https://timezest.com/mspradio/https://tdsynnex.com/StreamOneIon All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational damage. In this discussion, David Holmes offers insights into the latest trends in API and bot attacks and provides strategies to defend against these threats. Segment Resources: The Economic Impact of API and Bot Attacks: https://www.imperva.com/resources/resource-library/reports/the-economic-impact-of-api-and-bot-attacks/ The True Cost of API Insecurity and Bot Attacks in 2024: https://www.imperva.com/resources/resource-library/webinars/the-true-cost-of-api-insecurity-and-bot-attacks-in-2024/ This segment is sponsored by Imperva. Visit https://www.securityweekly.com/imperva to learn more about them! In the news, fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-300
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
APIs are essential to modern application architectures, driving rapid development, seamless integration, and improved user experiences. However, their widespread use has made them prime targets for attackers, especially those deploying sophisticated bots. When these bots exploit business logic, they can cause considerable financial and reputational damage. In this discussion, David Holmes offers insights into the latest trends in API and bot attacks and provides strategies to defend against these threats. Segment Resources: The Economic Impact of API and Bot Attacks: https://www.imperva.com/resources/resource-library/reports/the-economic-impact-of-api-and-bot-attacks/ The True Cost of API Insecurity and Bot Attacks in 2024: https://www.imperva.com/resources/resource-library/webinars/the-true-cost-of-api-insecurity-and-bot-attacks-in-2024/ This segment is sponsored by Imperva. Visit https://www.securityweekly.com/imperva to learn more about them! In the news, fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-300
Fuzzing network traffic in OpenWRT, parsing problems lead to GitLab auth bypass, more fuzzing finds vulns in a JPEG parser, and more! Show Notes: https://securityweekly.com/asw-300
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Learn what is most interesting at hacker summer camp this year! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-838
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Show Notes: https://securityweekly.com/psw-838
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Learn what is most interesting at hacker summer camp this year! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-838
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Show Notes: https://securityweekly.com/psw-838
Европа заставила Apple сделать невероятное – разрешить на iOS установку альтернативных магазинов, сайдлоадинг программ, стриминг игр и разные браузеры. Даже Chrome и Firefox. Само собой, Apple нашла способ сделать это с фигой в кармане. Но и этого достаточно чтобы iOS изменился и стал лучше. Причем потому, что Apple просто придется сделать его лучше. Играть тоже станет приятнее, так как читерские устройства (а вы вообще знали, что такие бывают?) блокируют на PlayStation 5. CEO HP считает, что сторонние картриджи опасны и на печать надо подписываться. Надо его познакомить с Европой. А вот OpenWRT молодцы, делают целый open-source рутер. Только неясно, сделают ли.
On this week's show we talk about our Apple Vision Pro order status, Seth has a sweet announcement, Netflix announces ads, Sonos announces disappointment, Snap One announces cool stuff but causes drama, and OpenWRT announces they aren't dead yet! All of this news, project updates, and this week's pick of the week.
This week Hackaday Editors Elliot Williams and Tom Nardi start things off with a traffic report from the Moon, which has suddenly become a popular destination for wayward robots. [caption id="attachment_657278" align="alignright" width="300"] Anonymizing an ATtiny85 via laser[/caption] From there, they'll go over a fire-tending contraption that's equal parts madness and brilliance, two decades of routers being liberated by OpenWRT, impressive feats of chip decapping, and USB-C's glorious rise to power. You'll also hear about the latest developments in laptop RAM, exploits against the flash encryption used on the ESP32, and Android powered oscilloscopes. The duo will wrap things up with horror stories from the self-checkout aisle, and a look at the fantastical rolling power station that Dan Maloney has been building in his driveway. Check out the links over at Hackaday, and as always, tell us what you think about this episode in the comments!
With a recent increase in government attention on K–12 cybersecurity, there is a pressing need to shed light on the challenges school districts face in implementing necessary security measures. Why? Budgeting constraints pose significant obstacles in meeting recommended cybersecurity standards. Brian Stephens of Funds For Learning will discuss: The financial constraints K–12 schools face and the critical role of funding from federal and state governments in addressing cybersecurity concerns. Efforts by Funds For Learning to petition the FCC to expand E-rate funding to support next-generation firewalls and other cybersecurity services. By expanding the technologies and solutions eligible for E-rate funding, schools can obtain the necessary resources to protect against the growing threat of third-party data breaches. Here are links to the most current blog posts about Cybersecurity Notice of Proposed Rulemaking https://www.fundsforlearning.com/news/2023/11/dont-miss-your-chance-to-impact-e-rate-cybersecurity/, Wi-Fi hotspots https://www.fundsforlearning.com/news/2023/11/wi-fi-hotspots-proposed-for-e-rate-program/ and school bus Wi-Fi https://www.k12dive.com/news/fcc-approves-school-bus-wifi-e-rate/697337/. Funds For Learning also facilitated an informational webinar on the Cyberserucrity Notice for Proposed Rulemaking https://fundsforlearning.app.box.com/s/5gp9qr938qtgs0ug92nkgfvrjvtil4sf. Funds For Learning also conducts an annual survey for E-rate applicants to provide their feedback on the E-rate program. The responses are shared with the FCC through the Funds For Learnings annual E-rate Trends Report. https://www.fundsforlearning.com/e-rate-data/trendsreport/. Lastly, here is an article from Brian about cybersecurity and why it should be funded through E-rate https://www.eschoolnews.com/it-leadership/2023/09/29/will-cybersecurity-receive-e-rate-funding/ In the Security News: Bricked Xmas, If you can hack a wrench, PixieFail and disclosure woes, exposing Bigpanzi (more Android supply chain issues, 20 years of OpenWRT, Jamming, traffic lights, and batteries don't work that well in the extreme cold. All that and more on this episode of Paul's Security Weekly! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-813
In the Security News: Bricked Xmas, If you can hack a wrench, PixieFail and disclosure woes, exposing Bigpanzi (more Android supply chain issues, 20 years of OpenWRT, Jamming, traffic lights, and batteries don't work that well in the extreme cold. All that and more on this episode of Paul's Security Weekly! Show Notes: https://securityweekly.com/psw-813
With a recent increase in government attention on K–12 cybersecurity, there is a pressing need to shed light on the challenges school districts face in implementing necessary security measures. Why? Budgeting constraints pose significant obstacles in meeting recommended cybersecurity standards. Brian Stephens of Funds For Learning will discuss: The financial constraints K–12 schools face and the critical role of funding from federal and state governments in addressing cybersecurity concerns. Efforts by Funds For Learning to petition the FCC to expand E-rate funding to support next-generation firewalls and other cybersecurity services. By expanding the technologies and solutions eligible for E-rate funding, schools can obtain the necessary resources to protect against the growing threat of third-party data breaches. Here are links to the most current blog posts about Cybersecurity Notice of Proposed Rulemaking https://www.fundsforlearning.com/news/2023/11/dont-miss-your-chance-to-impact-e-rate-cybersecurity/, Wi-Fi hotspots https://www.fundsforlearning.com/news/2023/11/wi-fi-hotspots-proposed-for-e-rate-program/ and school bus Wi-Fi https://www.k12dive.com/news/fcc-approves-school-bus-wifi-e-rate/697337/. Funds For Learning also facilitated an informational webinar on the Cyberserucrity Notice for Proposed Rulemaking https://fundsforlearning.app.box.com/s/5gp9qr938qtgs0ug92nkgfvrjvtil4sf. Funds For Learning also conducts an annual survey for E-rate applicants to provide their feedback on the E-rate program. The responses are shared with the FCC through the Funds For Learnings annual E-rate Trends Report. https://www.fundsforlearning.com/e-rate-data/trendsreport/. Lastly, here is an article from Brian about cybersecurity and why it should be funded through E-rate https://www.eschoolnews.com/it-leadership/2023/09/29/will-cybersecurity-receive-e-rate-funding/ In the Security News: Bricked Xmas, If you can hack a wrench, PixieFail and disclosure woes, exposing Bigpanzi (more Android supply chain issues, 20 years of OpenWRT, Jamming, traffic lights, and batteries don't work that well in the extreme cold. All that and more on this episode of Paul's Security Weekly! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-813
In the Security News: Bricked Xmas, If you can hack a wrench, PixieFail and disclosure woes, exposing Bigpanzi (more Android supply chain issues, 20 years of OpenWRT, Jamming, traffic lights, and batteries don't work that well in the extreme cold. All that and more on this episode of Paul's Security Weekly! Show Notes: https://securityweekly.com/psw-813
Adventures in Pi-Hole Hi all! Today I'm gonna be talking about my adventures in setting up Pi-hole. This will be without screenshots, but instead in all text, sorry! Also this is all written as kind of an "Aftermath" story. This is being written after the fact, so this might be missing some details, but most of it is there. Intro: What is Pi-hole Pi-hole is a DNS/DHCP server that allows for easy network-wide ad-blocking, along with all the nice customizations that come with being a DNS server, such as custom domains. First Step: Get it running The first step was getting Pi-hole running. I did this using Docker Compose on a "NAS" which is honestly a full on server at this point. A quick copy/paste from Pi-hole's README and I was up and running! I set a singular system to use this as a DNS server, and after that, I figured I was set and ready to go. Second Step: DHCP town Of course, I wasn't satisfied just finishing there. I want automatic DNS setting for any device that connects to my network. Of course, I could just set the DNS upstream in my OpenWRT router to use the IP address of my server, but that isn't good enough for me. This means I'd be missing out on automatic per-client information, since when setting a DNS server for OpenWRT, it only sets itself to forward any DNS requests up to the DNS server, which means from Pi-hole's perspective, all the requests are coming from the router and nowhere else. The solution is to set up Pi-Hole as a DHCP server. Keep in mind this isn't a tutorial, so let's go through what I did first. The first step was to turn on the DHCP server in Pi-Hole. This was super easy, just a checkbox and click save. Cool! Then I disabled the DHCP server in OpenWRT, and that was all set. A few restarting of network devices later, like my phone, and they automatically connected to the Pi-Hole server, and worked like a charm. Next up, I set up Tailscale. I use Headscale, but the setup is essentially the same as if you were using Tailscale's UI. Set in the config to override local DNS, set the nameserver to the Tailscale IP address of the server, and turn on magic DNS, et voila! Now to restart the Tailscale nodes, and make sure that on the server, you set it to not accept the DNS from Tailscale. If you don't do that, it'll get in an endless loop of trying to use itself as the DNS server, and it's just no good. Okay! It's all set, and I check the dashboard, and it's already blocking DNS requests. Perfect! Third Step: Whoopsies! This was fine and great, but when I went to reboot my server, which I do weekly, something bad happened. The interface for the server didn't come up. This is a problem, since it's the DHCP server for my network, so without that working, the network was dead in the water. It can't give out IP addresses. What's going on? I go ahead and access my server directly. No matter how hard I try, it can't connect to the interface. What's the big deal? Well this is pretty simple, and a question popped in my head that go me there. "How does this server even get its IP address?" You see when I set up pi-hole, it just kept using the IP address that the router gave it, which it was more than happy to use, but the moment the router didn't have a DHCP server, the NAS didn't have a way to get an IP address anymore. So what do you do then? The answer is pretty simple. Give the server a static IP. Make sure in the DHCP server of pi-hole, you set a reservation in it for the server, then in NetworkManager, which I use, set it to have a static IP, and set its DNS to point to localhost. Perfect! This works like a charm! Fourth Step: Adlists Okay, phew! Crisis averted. Just some missing networking knowledge. So what's next up on the list? Hmmm... Let's see... The default adlist is kinda small, let's go see if we can find some new adlists. Apparently this is more difficult than you'd think. A quick search on DDG only came up with an equivalent search in GitHub. Not useful! I have no idea the trustworthiness and stability of these adlists. Let's see. Another search leads to a Reddit article that then links to a different list. Bingo! An Adlist list. Exactly what I needed. I went ahead and looked into these lists, and added a few of them. Perfect! Fifth Step: Maintenance docker compose pull && docker compose up -d Of course, this isn't it. I actually use an a/b update scheme, but you get the gist. Updates are taken care of, and just make sure you try and keep the server up as long as possible, and keep downtime to a minimum. Sixth Step: Moving off the NAS. After a while of running this, the necessity of having the NAS on the whole time was starting to get frustrating. The answer there was to move it off the NAS. I did this by installing it on a Raspberry Pi 3B, running Arch Linux ARM. The setup was identical to before once I had gotten ALARM running.
On FLOSS Weekly, Dave Taht takes a break and pauses while saving the world from bufferbloat to treat Doc Searls and Dan Lynch to delightful discourses on music and low-latency conferencing and online jams. Hosts: Doc Searls and Dan Lynch Guest: Dave Taht Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: discourse.org/twit
On FLOSS Weekly, Dave Taht takes a break and pauses while saving the world from bufferbloat to treat Doc Searls and Dan Lynch to delightful discourses on music and low-latency conferencing and online jams. Hosts: Doc Searls and Dan Lynch Guest: Dave Taht Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: discourse.org/twit
On FLOSS Weekly, Dave Taht takes a break and pauses while saving the world from bufferbloat to treat Doc Searls and Dan Lynch to delightful discourses on music and low-latency conferencing and online jams. Hosts: Doc Searls and Dan Lynch Guest: Dave Taht Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: discourse.org/twit
On FLOSS Weekly, Dave Taht takes a break and pauses while saving the world from bufferbloat to treat Doc Searls and Dan Lynch to delightful discourses on music and low-latency conferencing and online jams. Hosts: Doc Searls and Dan Lynch Guest: Dave Taht Download or subscribe to this show at https://twit.tv/shows/floss-weekly Think your open source project should be on FLOSS Weekly? Email floss@twit.tv. Thanks to Lullabot's Jeff Robbins, web designer and musician, for our theme music. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: discourse.org/twit
Red Hat wants to limit redistribution of RHEL source code. We discuss their history with CentOS and the likely knock-on effects of taking direct aim at its customers' GPL rights. Plus browsers doing port scans, and OpenWrt vs OPNsense. News Red Hat's new source code policy and the intense pushback, explained Brave aims to […]
Coming up in this episode 1. The History of ~~Raspbian~~ Raspberry Pi OS 2. What we've been doing with Pi's 3. And we run something over the break Watch the video for this episode on Youtube (https://youtu.be/nLPuojqJbK4) https://youtu.be/nLPuojqJbK4 0:00 Cold Open 1:36 SBC, One, Two, Three 17:24 Raspberry Pi History: The Early Days 19:55 2006 - 2012 22:22 2012 - 2014 26:26 2014 - 2017 33:28 2017 - 2020 37:05 2020 - 2023 43:12 Hot Pis and Hot Takes 1:07:41 Next Season: A Twofer 1:16:36 Stinger Banter ZimaBoard (https://www.zimaboard.com) NanoPi R4S (https://wiki.friendlyelec.com/wiki/index.php/NanoPi_R4S) NanoPi R2S (https://wiki.friendlyelec.com/wiki/index.php/NanoPi_R2S) IPFire (https://www.ipfire.org) OPNsense (https://opnsense.org) OpenWrt (https://openwrt.org) Announcements
This week Google is killing some of their cloud services rendering some hardware devices useless bricks, we follow up on our Graphene discussion from last week, and of course your questions are at the front of the line! -- During The Show -- 01:14 Graphene OS - Chris Audio Issues Google Maps & Android Auto Three buckets Everyday bucket (Samsung S10) Personal device (Graphene OS) Private device Magic Earth Maps (https://www.magicearth.com/) Organic Maps (https://organicmaps.app/) Samsung flashing issues 11:05 Graphene OS - Ronald Thanks for walking the walk 11:55 Phone Tracking App? - Kevin OwnTracks (https://owntracks.org/) Location Sharing in Element Element Blog Article (https://element.io/blog/element-launches-e2ee-location-sharing/) 14:45 LoRa instead of Zigbee - Charlie Check out ESP8266, nRF24 , 433Mhz , 915Mhz, Lora and Express LRS Wireless actuator for home automation 433MHz/868MHz/915MHz (https://yewtu.be/watch?v=z2QEYJtNpEc (Radiocontrolli)) Transmitting an Alarm Signal with LoRa (600m)! Improving my Garage Alarm System (https://yewtu.be/watch?v=ItZwa1AdrpU) Automating a Greenhouse with LoRa! (Part 1) Sensors (Temperature, Humidity, Soil Moisture) (https://yewtu.be/watch?v=2YJHcGQnpAk) Noah's approach (hardwired, standalone wireless systems) Zen 16 (https://www.getzooz.com/zooz-zen16-multirelay/) 25:17 News Wire OpenBSD 7.3 OpenBSD (https://www.openbsd.org/73.html) OpenWRT 22.03.4 OpenWRT (https://openwrt.org/releases/22.03/notes-22.03.4) Openshot 3.1 OMG Ubuntu (https://www.omgubuntu.co.uk/2023/04/openshot-3-1-released) Linux Mint 21.2 OMG Ubuntu (https://www.omgubuntu.co.uk/2023/04/linux-mint-cinnamon-styles) BtrFS & Linux 6.4 Phoronix (https://www.phoronix.com/news/Btrfs-Linux-6.4-Better-Scrub) Qualcomm Cloud AI Driver Phoronix (https://www.phoronix.com/news/Qualcomm-QAIC-For-Linux-6.4) Nvidia HD Driver Phoronix (https://www.phoronix.com/news/NVIDIA-SHIELD-Controller-Linux) System76 Virgo Gaming On Linux (https://www.gamingonlinux.com/2023/04/system76-ceo-teases-in-house-linux-laptop-code-named-virgo/) Pine64 Star64 Pine64 (https://pine64.com/product-category/star64/) TUXEDO Computers Tuxedo Computers Stellaris (https://www.tuxedocomputers.com/en/TUXEDO-Stellaris-16-Gen5.tuxedo) Tuxedo Computers Water Cooling (https://www.tuxedocomputers.com/en/Linux-Hardware/Accessories/Further-accessories/TUXEDO-Aquaris--External-Water-Cooling-Device_1.tuxedo) CAFC Affirms District Court Ruling Nat Law Review (https://www.natlawreview.com/article/divided-federal-circuit-makes-controversial-ruling-nonliteral-elements-cloned) CISA Hiring FCW (https://fcw.com/security/2023/04/cisa-director-details-plan-address-security-risks-open-source-software/384913/) NPM DOS Attack The Hacker News (https://thehackernews.com/2023/04/hackers-flood-npm-with-bogus-packages.html) 28:19 Private Physical Mail PO Box vs PMB Americas Mailbox (https://www.americasmailbox.com/) Traveling Mail Box (https://travelingmailbox.com/) 33:38 PineTabs PineTab 2 Arm based PineTab V RISC V based Get them while you can Pine64 Blog (https://www.pine64.org/2023/04/10/pinetab-v-and-pinetab2-launch/) 42:00 Google Shuts Off Cloud Nest Smart Home Dropcam & Dropcam Pro Nest Secure Don't Use Cloud Services ARS Technica Bricks Devices (https://arstechnica.com/gadgets/2023/04/google-is-bricking-dropcams-and-nest-secure-offers-discounts-to-upgraders/) ARS Technica Kills Third Party Smart Displays (https://arstechnica.com/gadgets/2023/04/google-is-killing-third-party-google-assistant-smart-displays/) 47:35 Monitor IO Folding the right way ARS Technica (https://arstechnica.com/gadgets/2023/04/monitor-io-network-gadget-is-going-eol-but-in-the-best-possible-way/) -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/332) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed)
В этом выпуске: зачем нужна кнопка Mode в джойстиках для Sega Mega Drive, что думает Bill Gates про ChatGPT и будущее образования, OpenWRT vs человек-сосед, видео с PostgreSQL India 2023, зачем тимлиду писать хартию, а также темы наших слушателей и архаичные игры. Шоуноты: [00:01:33] Чемы мы научились за неделю Кнопка Mode в играх для Mega… Читать далее →