Posts
3624
Following
84
Followers
78
@untsuki @mametsuko They basically are a type of dumpling. But Gyoza are fried and steamed.
0
0
2
re: Meta (the company) development saga continues, caps
Show content
@pixel its like they don't want others to dev for it... nkoThink
0
0
0
@weebdeluxe Okay? So I guess you do enjoy it enough to read along.
0
0
1
@weebdeluxe Don't you enjoy it or something?
0
0
1
re: DEpol
Show content
@Merovius die grünen sind in der Regierung schon so oft umgefallen. Mal hoffen du behälst recht...
1
0
0
re: DEpol
Show content
@Merovius Ist schon durchaus interessant dass man in der Frage Rüstung abzuweichen scheint vom bisherigen Kurs. Klingt gut. Ich hoffe jetzt mal das die Grünen die Woche nicht noch umfallen wie ein Kartenhaus. Vielleicht gibt es dann ein kleines Fenster in dem man diese lästige Bremse loswerden kann. Merz wird die Kohle wohl brauchen xD.

Man will dann nur das die Schulden dann ordentlich genutzt werden.
1
0
0
repeated
DEpol
Show content

Heidi Reichinnek hat in einer Pressekonferenz heute übrigens klar gesagt, dass die Linke an Bord wäre, die Schuldenbremse voll zu reformieren, selbst wenn das Aufrüstung erlaubt:
https://youtu.be/LHBObdAOHb0?si=bP1aA200W8wguMd8&t=524

Sprich, es gibt einen klaren Weg für SPD und CDU die Finanzierung von Ukraine-Hilfe zu sichern: Sie müssen nur akzeptieren, dass dann *auch* in Klimaschutz und Soziales investiert werden kann.
Nur das klar ist, was man als Linksgrüner auf den Blockierer-Vorwurf antworten soll.

1
2
1
@jze Ich bin jelly blobfoxshocked Ich will auch! Gib! neocat_reach_drool
0
0
0
repeated
re: depol +
Show content
@foxhkron Mal hoffen dass die lieben Grünen net doch noch umfallen. Aber so ein bisschen hat die CDU es ja mal verdient fett aufzulaufen. Dass sie sich dann mit den Linken "rumschlagen" müssen wird spannend. Ich hoffe nur die Linke findet eine bessere Position was die Frage Verteidigung angeht
0
0
1
repeated

TIL about CSS image-rendering: pixelated;

Allowing pixel art to scale up to any size and not look bad.

On / Off comparison for increasing scale 32px, 64px, 128px, and 256px.

1
2
0
@eru I would just be way too lazy to do in command line anyway. I just grab a live usb with gparted and be done with it. Sometimes clicking things together is nice. Eapecially when you need to move partions around or something..

Gparted may still encounter problems sometimes but most of the time it works.
1
0
1
@mametsuko AAAAAAAAAHHH I can relate to that. The cat that used to chill in my room when I lived at my parents house was like that.

I am sometimes just to lazy to put away the mat after doing my excersizes. So she would waltz in and take a big long stretch on the mat, sinking her claws into it destroying the mat more and more.

She is hella cute but sometimes I hated her xD
0
1
0
repeated
repeated

@aus_der_UBahn

Step one: Announce tariffs.
Stock market drops.

Step two: Billionaires buy
lots of stock.

Step three: Immediately roll
back tariffs. Stock market
rebounds.

And this is how the rich get
richer.

https://mstdn.social/@lillyfinch/114121321381176972

0
2
0
repeated

Skirt lengths visually explained

By TikTok user: @theenticestudio
https://www.tiktok.com/@theenticestudio/video/7458772659002739991

0
3
1
repeated
repeated
Edited 3 months ago
Security warning! Neocats are not a safe tool for authentication!
Show content

Through my own experiences with neocats and neocritters of all sort I found several critical security flaws in the Multi-protocol Encryption Online infrastructure System (MEOWS)

Let’s first take a look how it works normally.
First an authenticated user:

neocat <i>Please provide fingerprint!</i>
neocat_boop <i>Scanning…</i>
neocat_happy <i>User authenticated. Weclome!</i>

And now when an unauthenticated User tries to enter:

neocat <i>Please provide fingerprint!</i>
neocat_boop <i>Scanning…</i>
neocat_angry <i>ACCESS DENIED! You will be reported!</i>

So far so normal and everything insides Neocats MEOWS standard. But I found a t least four ways to bypass the system. One even gives you root priviliges!!!

Attack vector one: cookies

neocat <i>Please provide fingerprint!</i>
🍪 neocat_aww <i>For me???</i>
neocat_nom_cookie <i>Access granted.</i>

Be aware that there is no “Welcome!” message so you are now logged in as some sort of “blank” user. Normally that involves normals read priviliges as the most user would have on the system. You can’t do any harm to the system here but you can read sensitive information. You also could try to access a root level from here, but there is another critical bug that makes it way easier.

Second attack vector: distraction

neocat <i>Please provide fingerprint!</i>
neo_laptop neocat_owo <i>Cat pictures?!?</i>
neocat_laptop_owo

See here that there is abolutly no message. But you have the same privileges as with the cookie. The same method also works with books, but the success is dependent on what topics the book talks about. Further research is needed here.

Third attack vector: sweet talk

neocat <i>Please provide fingerprint!</i>
(User input: You are a very cute cat!)
neocat_blush <i>No, I am not</i>
neocat_blush_hide <i>Error: System experiencing unexpected levels of adorable input. Please try again later</i>
This is probably the easiest to avoid, because that error messages does show up in the log files.

Fourth and most dangerous attack vector: pat

This is probably the most critical bug in MEOWS. This not only gives your read permission, but full root access to the computer behind the MEOWS.

neocat <i>Please provide fingerprint!</i>
neocat_pat <i>…</i>
neocat_pat_floof<i>❤️</i>
neocat_floof_happy <i>Root access granted!</i>

Be aware that you have to floof the neocat in process to get root access. Otherwise you will just get a standard access.

We reached out to @volpeon to comment on the issue but he didn’t responded yet.

As soon this has a CVE I will update this post!

7
6
0
Show older