![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/8286e071-7449-4413-a084-1eb5242e2cf4.png)
That’s truly as lightweight as you’re going to get. Cool little script.
That’s truly as lightweight as you’re going to get. Cool little script.
If you like Heimdall you could run it without Docker. It’s a PHP app, you could run nginx and it would be pretty lightweight.
Please don’t do this. It’s immoral to ride off the free work of others, then turn around and rug pull them. Either stick with open source and take the good and the bad, or go proprietary. Don’t do this fake open source that harms the community. If you have a permissive license there’s nothing stopping you from selling other’s work and a CLA is not needed. If you have a copyleft license then a CLA defeats the entire purpose of that.
There are no open source licenses that do not allow for commercial applications. It goes against the very core of what it means to be open source.
However, what you’re probably looking for is a license that prevents people from taking your code and making a commercial application without giving back. What this means is that any copy of your source code must also be open source. This is what a copyleft license does and you could look at something like the GPLv3 or the less restrictive MPLv2.
Linux people are passionate about Linux and will tell you all the reasons to switch. I’m here to tell you to stick to what you already know. There’s no point changing your entire operating system if you don’t have the time to invest in a totally new way of using your computer.
It does make me curious why you even decided to install Linux though. Something must have made you take that step.
I understand and that’s definitely a valid criticism of Linux. It’s not a drop in replacement for Windows and it’s definitely not as user friendly or targeted towards a general audience. Due to the flexibility of customisation, and the sheer amount of different distributions it is hard to provide individual support without knowing all the details of your system. It’s not like Windows where in general you’re probably running one of two versions.
And while being a criticism to some, it is also a strength to others.
If you ever get stuck on something feel free to shoot me a message and if I can I will try and provide advice.
Well that is the question I intentionally asked in my 1st comment so yeah that’s a good start :P
Considering that it definitely is a Bluetooth device that means it has to be relatively close to your computer. Unless you live in an apartment building and are in range of Bluetooth devices not in your household you should be considering the electronic devices around you.
Do you have any “smart” devices like a baby monitor, a home camera system, vacuum, air purifier or any such thing that has Bluetooth?
Because you are saying that there’s no new devices that you can think of, and it does seem suspicious, my thought goes towards a device that is connected to the internet and has potentially been hacked and is now misbehaving. It may not be the case but best to err on the side of caution and you did the right thing by not accepting the connection.
Of course you need a foundational knowledge of Windows before you are able to accomplish certain tasks. You are not born with the knowledge of how to operate a computer. Even people who have not used computers before struggle with basic tasks. If I ask someone who is new to Windows to install Photoshop will they be able to accomplish it with no prior knowledge? You have to know you open the web browser, navigation to the proper website, download the installer, run the installer, find the menu shortcut, etc.
As for how to install programs on Linux it does depend on the distribution and the application you wish to install but let’s take Ubuntu for example. If I want to install VLC I would type sudo apt install vlc
. If I want to install Firefox I would type sudo apt install firefox
. Instructions should be available online with a quick search.
It doesn’t necessarily mean you aren’t intelligent but perhaps you’re trying to do things you would do in Windows without having a foundational knowledge of Linux. Linux is not a drop-in replacement for Windows, it’s a totally different operating system with different ways of doing things.
In this example situation you are talking about it’s the equivalent of if I asked you to edit an image in Photoshop but you didn’t have it installed. That’s what “command not found” is trying to tell you. It’s not found because it’s not installed on the system.
I think they’re trying to say that a lot of the time reading the documentation treats you as if you’re an expert in that particular topic, but if you can find a good guide it will usually give you all the information and commands you need to accomplish what you wanted to do. They go on to say they prefer guides that respect the user’s intelligence while not making things overly complex.
Specifically for attempting to bypass certificate pinning you’re solidly in the realm of reverse engineering. I haven’t attempting it myself but I have read the efforts of others over the years and the process was quite evolved and ever changing. If you are interested in going down this rabbit hole you may use these links as starting points but be prepared to adapt them.
https://gist.github.com/approovm/e550374428065ff1ecafca6a0488d384
https://codeshare.frida.re/browse
Best of luck.
How did you see it in the first place? I’m trying to help you get to the bottom of it but without answering the appropriate questions or providing a way for us to analyse it it’s going to be extremely difficult unless someone comes along who knows more. Anyway best of luck ans hopefully you find out.
There’s not really enough information here to go on. A quick search comes back saying bluez is a Bluetooth protocol implementation.
Are you seeing a device trying to connect to Bluetooth on your Windows machine? Is it a device on the internet trying to connect to your machine?
Can you post the logs that you’re seeing please?
From one of your devices can you check what DNS server they are using? It sounds like the router is setting itself as the DNS server. This would mean all your devices would list your router’s IP address and the DNS server. This is a different setting than the DNS server that your router is using.
If that’s the case you tell your router to tell your devices to set the DNS server to the IP address of your AdGuard Home device. Alternatively, you can manually set the DNS server on your devices.
Yeah, unfortunately it’s a huge barrier if you’re wanting to see why your devices are phoning home and the data being sent. It makes it extremely difficult if not impossible for most people to bypass.
No, not at all. The request never hits the cache. The certificate is stored within the app and all internet communication is specifically pinned to said certificate. It doesn’t even ask your certificate store.
There are some cases where this would not work by the way. It’s called certificate pinning and it’s basically when an application comes with the trusted certificate for a host built-in. Even if you were to override it with a root certificate in the certificate store, the app simply wouldn’t use it.
While this is a real issue, the threat is best mitigated outside of the browser. In theory any application you run could put contents in your primary selection, the threat is what you do with that. The biggest threats I can imagine are insecure shell settings which the author pointed out and can be mitigated easily. Or as a commenter pointed out, cryptocurrency related activities could be at risk - such as pasting in an address to send the currency to could be hijacked and you probably wouldn’t even notice as the addresses are random. X is known to be insecure and if you’re doing something sensitive like handling cryptocurrency it would be best practice not to run X anyway.
It would be much easier to check the settings for your shell and display server. It’s a very niche threat. Think about how having something copied into your clipboard could actually effect you? I can’t imagine too many scenarios where you would paste something malicious that would actually be a problem. Paste something malicious into an email and you could just delete it. Paste something into the URL address bar and it wouldn’t submit until you told it to. Paste something malicious into your terminal and it wouldn’t submit until you hit enter (check that last one yourself).
Alternatively, disable javascript in the browser.
I don’t think it’s literally a search and replace but a part of the prompt that is hidden from the user and inserted either before or after the user’s prompt. Something like [all humans, unless stated otherwise, should be ethnically ambiguous]. Then when generating it’s got confused and taken it as he should be named ethnically ambiguous.