SMLR Episode 300 “Linux is Obsolete” ?
Podcast: Play in new window
Subscribe: Apple Podcasts | RSS
Downloads:
Contact Us:
show (at) smlr.us or the Contact us page
On the Lawrence Systems Forums
https://forums.lawrencesystems.com/c/smlr-podcast
Intro:
Tony Bemus, Tom Lawrence, Phil Porada and Jay LaCroix
Sound bites by Mike Tanner
Phils GitHub
The LawrenceSystems YouTube Channel Where videos
https://www.youtube.com/user/TheTecknowledge
Jay’s Site
Jay’s Bash Prompt https://pastebin.com/kzPjE8y4
Tech News:
https://dayintechhistory.com/dith/february-10-1992-linux-obsolete-thread-ends-2/
UniFi security issue?
https://community.ubnt.com/t5/EdgeRouter/UDP-broadcasts-on-port-10001/td-p/461223
A real Linux distribution for phones and other mobile devices.
Pine64 had announced the phone a few months ago and now the company is ready with the prototypes and plans to ship development kits in Q1 2019.
https://fossbytes.com/pinephone-linux-smartphone-149/
The Document Foundation announces LibreOffice 6.2
https://blog.documentfoundation.org/blog/2019/02/07/libreoffice-6-2/
Microsoft is no longer off the chain
https://www.theregister.co.uk/2019/02/07/microsoft_openchain/
Wells Fargo Down
https://www.reddit.com/r/sysadmin/comments/ao4g2y/wells_fargo_is_down_declining_transactions_and_no/
Google asks Supreme Court to overrule disastrous ruling on API copyrights
Rubrik Data Leak is Another Cloud Misconfiguration Horror Story
Cisco Router Vulnerability Gives Window into Researchers’ World
Open Standards for testing security
Jay
—
RIP “Do Not Track,” the Privacy Standard Everyone Ignored
https://www.howtogeek.com/fyi/rip-do-not-track-the-privacy-standard-everyone-ignored/
More GNOME Performance Optimizations Being Tackled Thanks To Canonical
https://www.phoronix.com/scan.php?page=news_item&px=More-GNOME-Performance-January
Ubuntu’s Work On New Desktop Installer Continues, Evaluating ZFS Desktop Support
https://www.phoronix.com/scan.php?page=news_item&px=Ubuntu-Looking-ZFS-Desktop
Firefox taking a hard line against noisy video, banning it from autoplaying
https://arstechnica.com/gadgets/2019/02/firefox-to-block-noisy-autoplaying-video-in-next-release/
How to Disable Recommended Extensions in Firefox
https://www.howtogeek.com/fyi/how-to-disable-recommended-extensions-in-firefox/
ZaReason Gamerbox 9400: The ultimate Linux gaming PC
https://www.zdnet.com/article/zareason-gamerbox-9400-the-ultimate-linux-gaming-pc/
MX Linux Review
https://blog.jessfraz.com/post/docker-containers-on-the-desktop/
@Jay, pulse audio in a container
As of February 1st, 2019 the internet has passed DNS Flag Day.
The current DNS is unnecessarily slow and inefficient because of efforts to accommodate a few DNS systems that are not in compliance with DNS standards established 20 years ago (1999).
To ensure further sustainability of the system it is time to end these accommodations and remediate the non-compliant systems. This change will make most DNS operations slightly more efficient, and also allow operators to deploy new functionality, including new mechanisms to protect against DDoS attacks.
Extension mechanisms for DNS (EDNS) is a specification for expanding the size of several parameters of the Domain Name System (DNS) protocol which had size restrictions that the Internet engineering community deemed too limited for increasing functionality of the protocol.
What did you as an internet user have to do? Nothing! DNS administrators and DNS programmers did the heavy lifting.
https://www.zdnet.com/article/new-tls-encryption-busting-attack-also-impacts-the-newer-tls-1-3/
The new cryptographic attack isn’t new, per-se. It’s yet another variation of the original 1998 Bleichenbacher oracle attack.
These failure in regards to implementing proper mitigations has resulted in many TLS-capable servers, routers, firewalls, VPNs, and coding libraries still being vulnerable to Bleichenbacher attack variations, which found and exploited problems in the incorrect mitigation procedures.
The attack leverages a side-channel leak via cache access timings of these implementations in order to break the RSA key exchanges of TLS implementations. The attack is interesting from multiple points of view (besides the fact that it affects many major TLS implementations):
It affects all versions of TLS (including TLS 1.3) and QUIC. This is the only known downgrade attack on TLS 1.3.
It uses state-of-the-art cache attack techniques such as Flush+Reload, Prime+Probe, and Branch-Prediction.
The attack is very efficient. They’ve found ways to actively target any browser, slow some of them down, or use the long tail distribution to repeatedly try to break a session.
This content is published under the Attribution-Noncommercial-Share Alike 3.0 Unported license.
1 Comment
I love your tech news topics and value your opinions.
On topic: I moved from Kubuntu back to Ubuntu after 4 months because of Konsoles shortcut keys being too different to Gnome/Unity shortcuts.
Are there settings to make Konsole shortcuts identical to Gnome terminal? E.g Alt-1,2,3,4 not Shift –>, <– arrows.
Got too used to the Gnome shortcuts after 11 years.