[-] [email protected] 1 points 3 hours ago

Does that mean the only official email app will be the one that uploads the passwords to all your email accounts to Microsoft?

[-] [email protected] 4 points 11 hours ago

Others have written about how windows does it, but here's some more details.

A window which runs with higher privileges (even just elevated to admin but still with your same account) cannot be read by normal privileges. You can see this when you use a custom screenshot program with some privileged system utility, but it's key combo does not work when the higher privileged window is active (in the foreground, selected). The screenshot program could not access UI elements in the privileged window, and can't send messages to it, but it can still see it rendered and capture it.

There's also a feature called "secure desktop". This is a bit like opening a new desktop with it's separate "window namespace". It's distinct so much that it doesn't have the taskbar and start menu, and by default it would be blackness, but you don't notice it because the system takes a screenshot before opening it and sets that as background.
Admin utils rarely use this feature, as I know this is only used for the User Account Control window that appears when a program is asking for elevated permissions. This is where you type your password, or just accept or deny the elevation request.
The Keepass password manager can also make use of this feature for the unlock prompt, but it can't use it that effectively, because the new secure desktop can be found in some way by other programs if it was not created with elevated privileges. It writes about this in it's documentation.
Even though Linux nowadays has a password prompt dialog, it does not have anything similar to this secure desktop thing as I know.

Other than that, on windows (maybe linux too?) processes of the same user and privilege level can read each other's memory. Without elevation. It's quite complicated but it's always there.
And like with gdb and strace on linux, there are ways on windows too to analyze or modify at runtime how a process works.

[-] [email protected] 1 points 12 hours ago

What controller? That does not seem to be a problem with the portal concept, but a pretty weird bug in the implementation of some part of it.

[-] [email protected] 2 points 12 hours ago

I don't understand your point. If they don't have enough access to install a keylogger, then they can't grant permission to themselves. That's why you want to keep them from being able to do that.

[-] [email protected] 1 points 1 day ago

Sorry but I don't see how that would happen.

[-] [email protected] 1 points 1 day ago

As land becomes more valuable it is important that people use it more productively.

How would people be able to do that when they have a normal workplace? This sounds like having to work additional hours to be able to keep my home.

Land value tax encourages building denser and reduces urban sprawl.

Sorry but you sound like someone who wants to force people into panel housing, and I don't want to participate in that.

Many people rent housing.

People who rent are damn close to being slaves. They don't have existential safety. Their housing can be taken away by yet another party by any semi-arbitrary reason, and all their belongings are lost because where they put them?

Sorry but I can't get behind any kind of land value tax idea. Not at least until it only applies to those having 2+ or such amount of properties, maybe further restricted related to family structure.

[-] [email protected] 2 points 1 day ago

Just a similar tech. Few years ago they transitioned to something else for peer to peer load balancing.

[-] [email protected] 1 points 1 day ago

What happened?

[-] [email protected] 4 points 1 day ago

that ~~tried~~ tries to break E2EE.

[-] [email protected] 3 points 1 day ago

Not this option, but generally I agree. Currently I don't think this is bad, and in the longer term we will see if this leaks any identifyable data.

[-] [email protected] 2 points 1 day ago* (last edited 1 day ago)

At that point why not just mock google's various data mining services' APIs?

[-] [email protected] 2 points 1 day ago

I think making it an opt-out is sensible

The GDPR does not think so, does it?

18
submitted 8 months ago by [email protected] to c/[email protected]

Introduction of the first Managing Director

21
submitted 10 months ago by [email protected] to c/[email protected]

I have just installed the tmuxinator 3.0.5 ruby gem with gem 3.2.5 and the --user-install parameter, and to my surprise the gem was installed to ~/.gem/ruby/2.7.0/bin/.

Is this a misconfiguration? Will it bite me in the future? I had a quick look at the environment and haven't found a variable that could have done this. Or did I just misunderstand something? I assume that the version of gem goes in tandem with the version of ruby, at least regarding the major version number, but I might be wrong, as I'm not familiar with it.

I have checked the version of gem by running gem --version. This is on a Debian Bullseye based distribution.

58
submitted 11 months ago by [email protected] to c/[email protected]

The video is a short documentary on Trusted Computing and what it means to us, the users.

If you like it and you are worried, please show it to others.
If you are not the kind to post on forums, adding it to your Bio on Lemmy and other sites, in your messaging app, or in your email/forum signature may also be a way to raise awareness.

view more: next ›

ReversalHatchery

joined 1 year ago