2
submitted 1 year ago by ryuko@lemmy.ml to c/lgbtq_plus@beehaw.org

"Free speech absolutist"

1
submitted 1 year ago by ryuko@lemmy.ml to c/lgbtq_plus@beehaw.org

Taken from r/egg_irl, by user azure_monster (https://www.reddit.com/r/egg_irl/comments/13bltnw/eggirl/)

7
submitted 1 year ago by ryuko@lemmy.ml to c/lgbtq_plus@beehaw.org

Not sure if this has been posted here before, but a friend sent it to me and I thought it was funny.

7
submitted 1 year ago by ryuko@lemmy.ml to c/chat@beehaw.org

I only joined the main Lemmy instance a couple of days ago, but browing by new, there's a pretty consistent stream of new posts now, even compared to the first day I was on here. I'm excited for this community.

[-] ryuko@lemmy.ml -1 points 1 year ago

Mine isn't very interesting, but sure

7
submitted 1 year ago by ryuko@lemmy.ml to c/memes@lemmy.ml
1
submitted 1 year ago by ryuko@lemmy.ml to c/lgbtq_plus@beehaw.org
[-] ryuko@lemmy.ml 0 points 1 year ago

Is it possible to get around this with user agent spoofing? Or maybe degoogled Chromium?

2
submitted 1 year ago by ryuko@lemmy.ml to c/lgbtq_plus@beehaw.org

Infuriating.

[-] ryuko@lemmy.ml 0 points 1 year ago* (last edited 1 year ago)

That's a really interesting bypass; I wonder how this can be patched or mitigated considering the module is entirely loaded from memory. Short of setting noexec on temporary directories, I can't think of any quick short term fixes.

Edit: Re-read the blog post and looked at the Github repo for the code- looks like this is more of a proof of concept of a SELinux confine bypass, as the kernel needs to be compiled with CONFIG_SECURITY_SELINUX_DEVELOP set. See the readme here, there's some more notes that weren't included in the blog post.

[-] ryuko@lemmy.ml 2 points 1 year ago

A self hosted (preferably FOSS) home security video solution would probably have prevented something like this. Main problem is those solutions aren't as simple as Ring's plug and play cameras.

ryuko

joined 1 year ago