nekomusumeninaritai

joined 2 years ago

Checks I Should Have Done Before Posting

Sorry for the self-posting. I just wanted to share my post-hoc file checks since it was due-diligence I didn't think of until after I shared.

TLDR: I redirected into a file and inspected it at least enough to say I received an mkv container with an h264 video and opus audio.

Caveats

  1. I am not in any way knowledgeable about security.
  2. You can do weird things with some files. I have no idea if mkv, opus, or h264 have comments or chimeras. See talks by Corkami for more information.
  3. Quad9 uses a dynamic TXT record to let the user know if they have configured their DNS resolver correctly, so I imagine you could receive a different file than I did. I have included a SHA-512 checksum for convenience which only tells you anything if you trust me for some reason.

Details

I ran the command from my post in a world-readable directory with >mystery_video_file substituted for | mpv -- - and inspected the download with

sudo --user=nobody -- file -- mystery_video_file

which output

mystery_video_file: Matroska data

I ran rename --last -- '' '.mkv' mystery_video_file # the '' is the empty string delimited with apostrophes and then

sudo --user=nobody -- ffprobe -hide_banner -- mystery_video_file.mkv

which output

Input #0, matroska,webm, from 'mystery_video_file.mkv': Metadata: COMPATIBLE_BRANDS: isommp42 MAJOR_BRAND : mp42 MINOR_VERSION : 0 ENCODER : Lavf60.16.100 Duration: N/A, start: -0.007000, bitrate: N/A Stream #0:0: Video: h264 (High), yuv420p(tv, bt709, progressive), 256x144 [SAR 1:1 DAR 16:9], 25 fps, 25 tbr, 1k tbn (default) Metadata: HANDLER_NAME : ISO Media file produced by Google Inc. Created on: 05/29/2024. VENDOR_ID : [0][0][0][0] ENCODER : Lavc60.31.102 libx264 Stream #0:1(eng): Audio: opus, 48000 Hz, stereo, fltp (default) Metadata: HANDLER_NAME : ISO Media file produced by Google Inc. Created on: 05/29/2024. VENDOR_ID : [0][0][0][0] ENCODER : Lavc60.31.102 libopus

If you trust me and not the presenter for some inexplicable reason, the SHA-512 checksum for the video is “24345bd3ca8015c14a7d5d63d6b2a40f9d0f8c0307a65996226a496f121fa5ae934718cf58090f43ee67bc250b06804f23c73688cc871c15c1ba18d79b1a82a8”.

I just came back to comment that -- probably doesn't add security unless something like xargs which puts stdin on the command line itself is used. I have gotten in the habit of mindlessly adding it I guess.

Oh, I see the part that says “Delist…”. I did see that. I guess I was used to hearing “prompt injection” with regards to the LLM web prompts versus something that crawlers would use that I was worried I'd made a mistake sharing.

[–] nekomusumeninaritai@lemmy.blahaj.zone 6 points 1 month ago (1 children)

I'm sorry. I didn't read the whole page. Just the part about video-over-dns which was covered in the talk.

Are you talking about that weird logo and do you recommend I remove the link?

 

It turns out you can get video over DNS TXT records. I saw “we made a globally distributed DNS network for shits and giggles” at 38c3. It can also be found on one of the presenter's webpage.

The presenter of “A Deep Dive into DNS” mentioned that some people have used TXT records to perform backups, so it was interesting to see that in action.

Obligitory bash warning: I added the --sandbox to sed and the “end of options” -- flag to the utilities that support it for security, but really, it depends on how much you trust mpv and the people who gave the talk I suppose, so be careful.

dig +short TXT {0..92}.vid.demo.servfail.network | sed --sandbox -- 's/[" ]*//g' | base64 -d -- | mpv -- -
[–] nekomusumeninaritai@lemmy.blahaj.zone 3 points 2 years ago* (last edited 2 years ago)

I'd imagine you want something defined recursively like multiplication

  • ( 0x = 0 )
  • ( xy = x(y-1)+ x ) ( y > 0 ).

So it needs to be

  • ( x^0 = c ) (c is some constant)
  • ( x^y = xx^{y-1} ) (( y > 0 ) (to see why, replace multiplication with exponentiation and addition with multiplication). So what could ( c ) be? Well, the recursive exponentiation definition we want refers to ( x^0 ) in ( x^1 ). ( x^1 ) must be ( x ) by the thing we wish to capture in the formalism (multiplication repeated a single time). So the proposed formalism has ( x = x^1 = xx^0 = xc ). So ( cx = x ) hence ( c = 1 ), the multiplicative identity. Anything else would leave exponentiation to a zeroth power undefined, require a special case for a zeroth power and make the base definition that of ( x^1 ), or violate the intuition that exponentiation is repeated multiplication.

On an unrelated note, it'd be nice if Lemmy had Mathjax. I just wrote all this on mobile with that assumption, and I'm not rewriting now that I know better.

[–] nekomusumeninaritai@lemmy.blahaj.zone 4 points 2 years ago (1 children)

I would've appreciated a trigger warning on the post since it uses a slur, but wow, it is amusing (I'm sure it'll be less amusing once I experience more overt transphobia).

[–] nekomusumeninaritai@lemmy.blahaj.zone 2 points 2 years ago* (last edited 2 years ago)

They just said :wq in school, so thanks for the tip. Hard to believe it saves even when the file hasn't been changed if you use :wq. What is the use case for that? If the file gets changed in another program and you want to revert?? Edit: Just saw the comment about the modification times being updated.

You must know my parents 😅

Whoops, looks like someone forgot to make the base juice class abstract…

That's certainly true. I'd still say that for the online stores, for which that policy applies, there isn't a lot of upside to preordering. Because the purchase is digital, you will always be able to get a copy on release day (unless the publisher artificially limits how many games it will sell, but I've never heard of a publisher doing this).

[–] nekomusumeninaritai@lemmy.blahaj.zone 20 points 2 years ago (3 children)

Financially, preorders without a “preorder bonus” are a zero interest loan to the developer. Preorders with the “preorder bonus” are a loan with the bonus as interest. Even if the game were guaranteed to be good, you could most likely be doing something better with the money until it comes out. Since the game is not guaranteed to be good, it is a risky loan as well. Without any of the protections you get when you make an actual loan.

It's also helpful to note that “shell builtins” don't typically have man pages (at least for BASH). You can find help on these commands by typing [builtin name] --help or looking in the shell's man page or info doc (no one told me when I was learning, so I got confused as to why some of the more common commands didn't have man pages)

49
cat /dev/null (lemmy.blahaj.zone)
submitted 2 years ago* (last edited 2 years ago) by nekomusumeninaritai@lemmy.blahaj.zone to c/programmerhumor@lemmy.ml
 

Description: Cat illustration from Japanese fine print in void with cat /dev/null written below in a monospace font.

I guess you could say this meme is… a copycat.

Yes, normally you'd redirect it to do something useful. But I'm not editing it.

edit:remove duplicate photo

edit2: Silly me for thinking that Lemmy was smart enough to grab the first body photo as its thumbnail. Also set language.

 

cross-posted from: https://lemmy.blahaj.zone/post/97118

Accessibility text :Pictured is a slide from a presentation at a hacker conference with a bullet point reading “We can smash the stack” highlighted and the presenter wearing cat ears and holding a plushie fox. Added to the screenshot of the presentation is the aforementiomed highlighting as well as the warning “KEEP YOUR MEMCPY SIZES VALIDATED OR CATGIRLS WILL SMASH THE STACK, NYA” written in a pink all-caps impact-style font clone.

Edit: Meme photo wasn't visible when the link to the actual talk was in the url field, so I'm moving it here: https://media.ccc.de/v/gpn21-16-breaking-the-black-box-security-coprocessor-in-the-nintendo-switch-a-story-of-vulnerability-after-vulnerability

Edit 2: It still wasn't visible, so I had to add the photo url. I'm new 😁

view more: next ›