I've been skeptical ever since they were trying to claim the xz backdoor was from a state actor. All it took was 3 sockpuppet accounts, a lot of time and actual code contributions, something literally anybody with a computer science degree can do. Name: Jia Tan? Must be a CCP agent, never mind the fact that anybody can make their name and timezones anything...
Google can eventually allow anything on their domains to access whatever they want in the future and the end user can do nothing about this.
https://news.ycombinator.com/item?id=40918052
If they do go this route it'd of course be highly controversial (not that they care), but also limited to Chrome. Even if they dare put it in Chromium itself, Brave, Vivaldi, etc would rip it out. Microsoft would just redirect the collection in Edge to their servers.
DuckDuckGo specifically offers JS-free frontends and Bing still works -- it's just their tracking redirect pages that require JS. Thankfully userscripts exist to deobfuscate the tracking URLs to plain ones on search results (as they're slightly more complex than Googles)
How do you get Bing to work? I go there, type in a query, hit return and then nothing. The eyeglass icon seems like it could be a search button, but nothing happens when it's clicked. I should mention I'm trying it on Firefox 128.6.0esr.
What's the point of these kinds of articles? Most Linux malware (including this one) are not sophisticated at all, built off of pre-existing rootkit code samples off Github and quite sloppy with leaving files and traces (".Xl1", modifying bashrc, really?). And there's a weird fixation on China here, is it just more anti-China propaganda?
I was under the impression that persistent, but SILENT access was China's goal. Dropping files in home and /tmp/ seems like the total opposite of that and any competent sysadmin would detect these anomalies manually real quick with a simple "ls -a", even possibly by accident.
> The WolfsBane Hider rootkit hooks many basic standard C library functions such as open, stat, readdir, and access. While these hooked functions invoke the original ones, they filter out any results related to the WolfsBane malware.
I took this to mean some things like a simple “ls -a” might now leave out those suspicious results.
Just like the evolution of sim swapping and how it went from hijacking celebrity accounts for a day to stealing millions from crypto investors, cybercriminals slowly realized that it's far more easier to get personal data through bribing/hacking companies (telecoms, amazon) or even by directly sending emergency data requests from stolen law enforcement email addresses.
No amount of opsec can save you from corrupt employees making below minimum wage.
How much different is Donkey Konga compared to Taiko? Wouldn't it have been simpler to adjust already existing tools (i.e osu) to export to whatever proprietary format Donkey Konga uses instead of making an entire new editor and reinventing the wheel?
Admittedly, this may be a disappointing answer: when I started working on Konga Beat, I didn't fully grasp the extent of the rhythm game modding scene. I was so excited to make a dedicated editor that I just went for it.
Only when I was deep into working on Konga Beat did I discover editors like Moonscraper and Peepo Drum Kit. Even then, I was having so much fun working on Konga Beat that I wanted to see it to completion.