136 private links
Zum zweiten Mal in sechs Wochen bringt die Bundesregierung Neuerungen im NetzDG auf den Weg. Das Melden von Hasspostings soll leichter werden, ebenso wie die Gegenwehr für Nutzer, die sich zu Unrecht sanktioniert fühlen.
When the decade began, tech meant promise — cars that could drive themselves, social networks that could take down dictators. It connected us in ways we could barely imagine. But somewhere along the way, the flaws of technology became abundantly clear.
In a famous essay from the early 1930s called “Economic Possibilities for Our Grandchildren,” Keynes imagined the world 100 years in the future. He spotted phenomena like job automation (which he called “technological unemployment”) coming, but those changes, he believed, augured progress: progress toward a better society, progress toward collective liberation from work.
Well, we know the grandchildren in the title of Keynes’s essay: they’re the kids and younger adults of today. The prime-age workforce of 2030 was born between 1976 and 2005. And though the precise predictions he made about the rate of economic growth and accumulation were strikingly accurate, what they mean for this generation is very different from what he imagined.
The protocols discussed here cover SAML 2.0, OpenID Connect (OIDC) and OAuth2. Note that OAuth2 is not an authentication protocol, but because of the popularity of its use in cases such as enabling users to sign in with a social provider such as Facebook or Amazon, it is included here.
Identity, authentication and authorization protocols
These three protocols overlap frequently in functionality:
-
Identity protocols supply information about a user — such as a persistent identifier, phone or email address — that may be used for long-term identification of that user to your system and hence for authenticating the user and authorizing access to resources. SAML and OIDC are the best-known examples.
-
Authentication protocols do not necessarily carry a personal identifier. For example, the Kerberos system is based on the exchange of transient anonymous keys that, in themselves, include no identification data.
-
Authorization protocols, such as OAuth2 and UMA provide a means to acquire access-protected resources without requiring the resource owner to share credentials. Interactive user consent is an important aspect of these protocols. The OAuth2 protocol is often used, casually, for identity and authentication using user data, such as an identifier, returned in the OAuth2 process.
#staatstrojaner #bundestrojaner
Human rights abuse and a decimated reputation killed Hacking Team. The new owners want to rebuild.
Lezzi is the owner of Memento Labs and its parent company, InTheCyber. Memento Labs was formed in March when Lezzi acquired Hacking Team.
The company provides what it calls a “trusted implant” to get KRAIT onto the target’s device, meaning the malware will be delivered from what looks to the victim like a known source. It’s a service “making effortless the social engineering campaign.” KRAIT is a small agent and hides inside legitimate applications.
The result of 15 years of development, RCS X offers “invisible” infection of “99% of the most used platforms in the world,” including macOS, Linux, Android, iOS, and BlackBerry.
- Edit /etc/systemd/logind.conf file:
- Find text #HandleLidSwitch=suspend
- Change suspend to ignore and remove the #
- Save file with changes
Back in 2017, I was building a rich text editor in the browser. Unsatisfied with existing libraries that used ContentEditable, I thought to myself “hey, I’ll just reimplement text selection myself! How difficult could it possibly be?” I was young. Naive. I estimated it would take two weeks. In reality, attempting to solve this problem would consume several years of my life, and even landed me a full time job for a year implementing text editing for a new operating system.
Rendering text, how hard could it be? As it turns out, incredibly hard! To my knowledge, literally no system renders text "perfectly". It's all best-effort, although some efforts are more important than others.
Freedom is a funny word. It's a hard thing to talk about because to a degree, if this kind of thing cuts down, let's say, on random crime, then it's going to make people effectively freer. Especially if you're a woman or someone who is vulnerable to being the victim of random crime, if some kind of surveillance system renders that less likely to happen, then effectively you've been granted a freedom that you didn't have before. But it's not the kind of statutory freedom that we tend to talk about when we're talking about politics.
Here's the point of the whole thing. The IETF people, when they were thinking about IPv6, saw this mess getting made - and maybe predicted some of the additional mess that would happen, though I doubt they could have predicted SDN and wifi repeater modes - and they said, hey wait a minute, stop right there. We don't need any of this crap! What if instead the world worked like this?
The FIRE (Financial Independence, Retire Early) movement is a lifestyle movement whose goal is financial independence and retiring early. The model became particularly popular among millennials in the 2010s, gaining traction through online communities via information shared in blogs, podcasts, and online discussion forums.
Those seeking to attain FIRE intentionally maximize their savings rate by finding ways to increase income or decrease expenses. The objective is to accumulate assets until the resulting passive income provides enough money for living expenses in perpetuity. Many proponents of the FIRE movement suggest the 4% rule as a guide, thus setting a goal of at least 25 times estimated annual living expenses. Upon reaching financial independence, paid work becomes optional, allowing for retirement from traditional work decades earlier than the standard retirement age.
Another type of American Dream has now developed: The freedom to upturn your desk, give your boss the finger, and retire on the spot—without making a lifestyle sacrifice, of course.
In some circles, the wealth required to burn any bridge you want has a name: “f–k you money.” That’s because, well, backed by the First Amendment and a large fortune, you can yell that without consequences to pretty much anyone, save for a judge, a plumber, or a tax assessor.
I decided then to write up the practices that I think lift a newly minted software engineer from amateur to professional: the path from fixing bugs as an “Engineer 1” to leading major projects as a “Senior Engineer.”
In this tutorial, learn to manage the persistent network configuration of your Linux host. Learn to:
- Understand basic TCP/IP host configuration.
- Configure Ethernet and wifi networks using Network Manager.
- Understand systemd-networkd.
In this tutorial, learn about TCP/IP network fundamentals for your Linux system. Learn to:
- Understand network masks and Classless Inter-Domain Routing (CIDR) notation.
+Know the differences between private and public dotted quad IP addresses. - Understand common Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports and services.
- Know the differences between and major features of UDP, TCP and Internet Control Message Protocol (ICMP).
- Know the major differences between IPv4 and IPv6.
- Know the basic features of IPv6.
In this traditional lecture, various teams provide an inside look at how this Camps infrastructure was planned and built. You’ll learn what worked and what went wrong, and some of the talks may even contain facts!
Infrastructure Review des Camp 2019 Stromnetz aus Sicht des auf der GPN in der Theorie vorgestellten Low Cost Power Monitoring. Aufbau des Monitoring-Netzes, Inbetriebnahme und Ergebnisse von Tag -1 bis Tag 4.
Wie verhält sich das Netz von c3Power auf dem Camp 2019 zu den verschiedene Tageszeiten, wie sieht die Auswertung von z.B. Lastverteilung, Netzoberwellen, Fehlerrate aus. Visualisierung der Daten in Grafana, Server Infrastruktur. Do:s and don't:s vom Aufbau der Hardware, Betrieb bei 50 Grad plus und 10 cm Wasserstand im Freien. Stabilität des Campnetzes in den ersten 4 Tagen. Integration ins DMR Funknetz über MMDVM Hotspots zum Absenden der Fehlermeldungen als DMR SMS. Abhandeln der Störmeldungen. Impressionen vom c3power Team während des Events.
Digitale Sprachbetriebsarten für Einsteiger. Ein Vortrag von Kurt Baumann - OE1KBC
Mindfulness is nothing more than basic concentration training. Although derived from Buddhism, it’s been stripped of the teachings on ethics that accompanied it, as well as the liberating aim of dissolving attachment to a false sense of self while enacting compassion for all other beings.
What remains is a tool of self-discipline, disguised as self-help. Instead of setting practitioners free, it helps them adjust to the very conditions that caused their problems. A truly revolutionary movement would seek to overturn this dysfunctional system, but mindfulness only serves to reinforce its destructive logic. The neoliberal order has imposed itself by stealth in the past few decades, widening inequality in pursuit of corporate wealth. People are expected to adapt to what this model demands of them. Stress has been pathologised and privatised, and the burden of managing it outsourced to individuals. Hence the pedlars of mindfulness step in to save the day.