Notes


Surfraw - Shell Users' Revolutionary Front Rage Against the Web

Surfraw provides a fast unix command line interface to a variety of popular WWW search engines and other artifacts of power. It reclaims google, altavista, babelfish, dejanews, freshmeat, research index, slashdot and many others from the false-prophet, pox-infested heathen lands of html-forms, placing these wonders where they belong, deep in unix heartland, as god loving extensions to the shell.

Surfraw abstracts the browser away from input. Doing so lets it get on with what it’s good at. Browsing. Interpretation of linguistic forms is handed back to the shell, which is what it, and human beings are good at. Combined with netscape-remote or incremental text browsers, such as links (http://artax.karlin.mff.cuni.cz/~mikulas/links/), w3m (http://www.w3m.org/), and screen(1) a Surfraw liberateur is capable of navigating speeds that leave GUI tainted idolaters agape with fear and wonder. Surfraw - Shell Users’ Revolutionary Front Rage Against the Web

All the great civilisations have failed

When we look back we see only ruined societies. All the great civilisations have failed, what makes us think we are any different from them? The most depressing thing is that those societies were the highest point of development and adaptation we have reached. Today we are trapped in a kind of macro-scale Skinner box, we are slaves to our own impulses.

Android FOSS Apps List

List of open source Android applications for “de-google, de-samsung, de-microsoft, de-nsa, de-china-malware etc. etc.” your mobile phone, as always, the list is written in a (KISS) simple way. Feel free to contact me to add applications or modify the list.

The links in the list are related to the application website (if exists) or to the source code repository, I suggest to install Droid-ify or Neo Store which already has the repositories of Guardian Project, IzzyOnDroid and other applications such as Bromite and NewPipe, and search apps from there. Android FOSS Apps List

Online anecdotes on life

People online always speaking anecdotes on life as if it were universal dogma, not realising the sheer range of human experience.

Greatest living writer died last week

The greatest living writer died last week; they found him caught up in a bunch of machinery, hands all mangled like. Thailand. Never wrote a thing, hadn’t had the time. Wife put him in a jar next to the Buddha.

Vodafone & Deutsche Telekom to introduce persistent user tracking

Vodafone & Deutsche Telekom recently started trials with Trustpid to reintroduce persistent user tracking.

Network operators are a vital part of transmitting data traffic on the internet. In this process, the data is sent largely untouched. This is about to change as Vodafone & Deutsche Telekom are tapping into ways to monetize these data streams.

They have recently started a trial to test new ways of marketing customer data in collaboration with Trustpid.

Although Vodafone claims there is nothing to worry about, privacy officials are especially concerned about the recent involvement of network operators. Privacy advocates call it the return of the “Super Cookie.” If they are correct, this would be a massive step backward in creating an independent web where the privacy of internet users is respected. Vodafone & Deutsche Telekom to introduce persistent user tracking

Software is getting slower

Software is getting slower faster than hardware is getting faster.

Planting a garden

Planting a garden really puts you in touch with nature and the day itself in a way that few other things do. It’s very fulfilling.

CVE-2022-34918 - A crack in the Linux firewall

In our previous article Yet another bug into Netfilter, I presented a vulnerability found within the Netfilter subsystem of the Linux kernel. During my investigation, I found a weird comparison that does not fully protect a copy within a buffer. It led to a heap buffer overflow that was exploited to obtain root privileges on Ubuntu 22.04. CVE-2022-34918 - A crack in the Linux firewall

Roblox leak

If you’re interested in the Roblox leak, get it here.

On capitalism

Remember, nobody is your friend. We live in a pitiless system where everyone must fend for themselves and clawing at each-others throats over an ever shrinking slice of the pie. Fuck capitalism.

Exploiting Android Vulnerabilities with Malicious Third-Party Apps

Mobile applications has become a trend these days since there are a rapid growing companies and startups which already taken their steps into digital world, scaling up their business into a bundle of an APK or IPA. Little did they know that there are most likely a vulnerabilities exposed inside which can be manipulated by an unknown adversaries who may take an advantage from them.

In this writings, I’d like to show you how such a third party application may affects an application that has a vulnerable security design especially in Android. The scope of the APK that I chose will be an oversecured APK that can be downloaded from their official Github. Exploiting Android Vulnerabilities with Malicious Third-Party Apps

Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses

We demonstrate how targeted deanonymization attacks performed via the CPU cache side channel can circumvent browser-based defenses. The attack framework we show is able to overcome the limitations of prior work, such as assumptions on the existence of cross-site leaks. As a result of this attack, the attacker is able to learn whether a specific individual visits the attacker-controlled website – a potentially serious privacy violation.

When a user visits the attacker-controlled website, the website uses an iframe, popunder, or tabunder to request a resource from a third-party website (i.e., the “leaky resource”). The response to this request, as well as the cache activity it generates in the user’s system, differs depending on the user state on the third-party website. An attacker monitoring the CPU cache side channel can analyze the cache patterns and learn whether the leaky resource was loaded successfully in the browser or not, and use this information to learn the identity of the visiting user. The attack can be scaled to identify thousands of users. Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses

Never forget the three rules

Never forget the three rules:

  1. Be handsome.
  2. Be attractive.
  3. Don’t be unattractive.
Useless information

There will come a day, maybe sooner rather than later, when I will ask a question about what the time is and the person answering will refrain from telling me how to build a watch.

The point of advancing technology

What’s the point of advancing technology if the end result is our destruction, physical and spiritual?

Western journalism

Western Twitter activists journalists right now.

Oxygen Not Included

I’ve been playing massive amounts of Oxygen Not Included lately (while shitposting about #pornlitics on notes) and let me tell you that it’s a fucking addictive game. Both are.

Sometimes I wish

I sometimes wish I was a social-careless, ignorant and potato-brained normie TikTok zoomer with broccoli haircut.