• 1 Post
  • 365 Comments
Joined 2 years ago
cake
Cake day: June 16th, 2023

help-circle








  • Yeah, as said, that’s going to be due to however your TV upscales things.

    Getting a dedicated scaler will help, but bear in mind that you’re taking an image that’s at least 1/4 smaller (might be less than that, can’t remember the math off hand) than your screen’s native resolution and zooming in on it.

    Using most scalers gives you a ton of options for how to zoom in. Straight pixels, bilinear (or trilinear) filtering, and some have various shader effects as well to emulate the style of TVs these consoles were made for.

    By using HDMI/VGA you are getting the clearest digital signal version of that image possible, but it’s still tiny, and any way you choose to expand it will have pros and cons.




  • being born into a little seed cash and enough comfort to go a while without working a straight job. As Julie says when someone repeats that Amazon was started in a garage: Ain’t no garages in the trailer park.

    We need look no further than the “hackathon,” that sad facsimile of the days when we were all learning the basics so fast that the world could be ours with just a day or two of focused effort. Hype up an exciting atmosphere, assemble some folks with so few attachments in life that they have time to spend all weekend at a hackathon, and this ritual will summon up the old gods. The hackathon is the proof that people believe this can work, and it is the proof that it doesn’t.



  • I’m not exactly calling bullshit, but I’ve worked almost the entire last decade in IT in a Windows environment that has a decent amount of RDP use and has grown from ~2000-4000 employees during that time.

    We’ve never encountered this as described. Whatever this situation that allows the cached password to persist indefinitely is, it is a situation that would need to be engineered by the attacker.


    From what I can tell, this “exploit” is just the standard NT password caching functionality that Windows has had for literal decades. Windows caches the last valid password used to log in, so if you lose your connection to your identity provider (AD or Entra) you can still log in with the last password confirmed to be valid.

    In AD environments, this is what allows you to log into your laptop at home before you connect to VPN. You can’t hit your work AD before you’re on the work network. It also causes some fun because if you changed your password at work but didn’t lock and unlock your computer with the new one, it might still have your old one cached for the login screen but need the new one for VPN. This was a fairly common support call (I’m out of direct user support now so I can’t easily see if it still is).

    Any situation where an old password would be valid indefinitely and a new one not recognized would require the machine to not be able to reach AD or Entra, but also to still be reachable by RDP… indefinitely. That’s definitely not impossible, but it’s one hell of an edge case to use the term “indefinitely” for.

    It’s annoying that there aren’t separate settings from “local logins with AD as the IDP” and “remote logins with RDP” or “logins with Entra”, but this feature is pretty damn critical for remote workers to be able to function and it is an intentional design choice as Microsoft states. Any potential workaround for a theoretical lack of this functionality is worse than the current state. Can’t rotate passwords on a local break glass account if the machine can’t reach your IDP, leaving effectively the same hole except with an account known to have elevated access.

    There’s no nefariousness here or lack of due dilligence. Labeling it as some horribly dangerous security hole with the amount of vagueness this article has is just misleading and clickbaity.


  • On paper, it’s one of the uses for AI image recognition. It could reduce the amount that needs human review drastically.

    In reality, Youtube’s partially automated system (to my knowledge the most robust one around) regularly flags highly stylized videogame violence as if it is real gore. It also has some very dumb workarounds like simply putting the violence more than 30 seconds into the video (which has concerning implications for its ability at filtering real gore).



  • Edit: missed the context. This was about Torvalds, not Tech Tips

    Theres a lot more problems than that. Both GamersNexus and Louis Rossman have made videos on it.

    Shady sponsor deals. Making huge mistakes when testing things from new small companies (one guy machining custom watercooler blocks), calling the device garbage because their own mistakes caused it not to work, refusing to return the prototype one they tested as they had agreed to, and then auctioning it off. Claiming all of that was just honest mistakes while making no efforts to make it right and doubling down on calling it shit. Many many cases of Linus just being an abusive bastard of a boss behind the scenes. Many cases of anonymous current and former employees talking about toxic workplace culture (coming from the top down), insane crunch, deadlines set too tight that cause issues in reviews.

    Regular smaller mistakes in their reviews and videos with no standard company policy on how they should go back and edit them to inform viewers of the mistake. Numerous cases where they acknowledge the mistake privafely but refuse to even add a pinned comment to the video.

    His team knew about the Honey extension, one of their sponsors, being a scam. It hijacked any links to online stores nd made them referal links to kick back money to Honey. While countless other youtubers made exposes about it he refused to say anything about it to his viewers and then had a tantrum on the podcast about how it was unfair to expect him and his team to say anything about it after he was called out.

    Every. Single. Time. When Linus is called out on this stuff in a large enough way, he throws a very public tantrum.

    At best, Linus is an overgrown child who is unfit to run a business of the size and clout his has.


  • I find this particularly funny, because the scene for Wii homebrew felt like the wild west for a decent while. There were many different iOS (think kind of like drivers, you’d install ones with patches applied so you could run non-nintendo code) installers that were almost all doing the exact same thing. Multiple loaders to run ISOs off USB drives. A couple of games leaked early. I remember playing Skyward Sword with a friend a few days early.

    There were a small few that tried to enforce not being able to use their homebrew apps for piracy, but they were largely derided for it. Riivolution was a groundbreaking app for arbitrarily replacing game files on the fly, but it had numerous things built in to prevent people from using it on anything but real discs. There was a decent amount of drama around that.

    Smash Bros Brawl mods were fucking amazing. There just wasn’t much like that on consoles before then.



  • wizardbeard@lemmy.dbzer0.comtoGreentext@sh.itjust.worksAnon missed /pol/
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    13 days ago

    If you’re worried that posting more than “nuh uh” publicly would negatively impact your ability to take action, then you’re in a position where you aren’t safe posting anything about it. Not even your little “nuh uh”.

    Either stop LARPing (because you aren’t part of any organizing), stop making yourself more vulnerable by posting shit like this (because you are part of something and being stupid posting this shit), or just save some time and turn yourself in because you’ve already fucked up.

    I have too much to lose to do anything drastic, but you all would be well served to do some serious learning about how criminals and hackers get caught, and how to protect yourself with proper opsec.