[-] dzervas@lemmy.world 10 points 6 months ago

Damn I read "my cat needed to be enthusiased and I just received her ashes" and though WTF did you do to make her so excited?

side note: enthusiased is not an english word but in greek (ενθουσιασμενος) it makes sense and it translates to "excited"

[-] dzervas@lemmy.world 15 points 6 months ago

exactly that, INCLUDING server-side binaries to re-create any online features

I could argue that the source code should become public domain as well but we already sound like crazy people

[-] dzervas@lemmy.world 12 points 9 months ago

yeap steam is the best example of a service i'd very happily pay - I've paid LOTS to them and just last month, I downloaded "have a nice death" for yuzu, played 30", loved it and insta bought it on steam. It was 25 euros but having my saves forever and being able to single click install & play is something that I value more.

you don't get to get my money AND fuck me, pick one (netflix, youtube, etc.)

[-] dzervas@lemmy.world 10 points 10 months ago

I'll put my vote to Deep Rock Galactic for online. It's a game (that you MUST check out) with one of the most wholesome communities ever. Most people are super nice in the chat and I've made a friend or two (for me that's a lot - I'm extremely picky cause I feel very nice with the amount of friends I have already)

[-] dzervas@lemmy.world 12 points 10 months ago

I disagree. Malware is quite difficult to develop and MUCH more difficult to maintain because of AVs and getting around defender ain't a joke. It can be done but it's neither trivial nor fun.

[-] dzervas@lemmy.world 9 points 10 months ago

ok so let’s start with the exploits. Exploit is a bug (problem) in a piece of software that when… umm… “abused” (well the word is just exploited) it allows you to do stuff that you shouldn’t. An exploit could be live from your browser to the program you use to zip files. The top 2 reasons to use an exploit is to either get initial foothold on a machine (e.g. an exploit in a browser that would allow an attacker to execute arbitrary code when you visit their page or an exploit in winrar that when you open a zip file executes code)

From the attackers perspective, you got in, nice. Mind you you got in through means that have nothing to do with windows (and that’s true most times, especially on desktops). but now? what?

You hacked into the machine for a reason! You might wanna grab the browser cookies (giving you direct access to the accounts that the victim is logged into), grab some files, screenshots, passwords

That’s where the AV kicks in. After the initial exploit the malware behaves like a normal program. But not completely. Assuming that the AV hasn’t seen the same exact malware before (which would an insta kick ban) it’s going to see a random process accessing files in chrome’s directory. HUH. ISNT THAT SOMETHING. quarantined.

Wanna start listening to each and every keystroke? quarantined

Meanwhile the way that the exe ended up in your system was not through an installer, you don’t provide an uninstaller and it was downloaded from www.xXxveryNicEsiteyou.got. HUUUUUUUH

the whole process is a bit simplified of course, but it captures the general idea

So why does linux not have an AV? FUCK IF I KNOW! It would be very, VERY useful. Writing malware that bypasses AV is an art of its own. Can be done for sure, but it’s an extra step and it’s not fun

background: used to get paid to do shit like that (legally, pentest) and it’s a fun hobby (writing code around it, not hacking people)

[-] dzervas@lemmy.world 25 points 10 months ago* (last edited 10 months ago)

Why is nobody talking about stremio? The user interface and experience is very close to netflix (better at times) but it plays torrents instead.

If you pair it with a real-debrid subscription after you first try it solo it takes it to the next level.

It’s just amazing

And you don’t have to buy anything. Stremio can be installed on your firetv stick

EDIT: forgot to mention that you need the torrentio or torrrentio lite add on for stremio.

[-] dzervas@lemmy.world 13 points 10 months ago

what I want to stress out at this point is that due to the techniques required to crack a game (dll injection, ssl pinning bypass, syscall hooking and more) are used by malware

that though leaves you completely unaware if the crack is benign or not. It could be or it could be not. “but it worked fine for me” is also not a good enough pointer as it’s very common practice making the malware run only under certain conditions (after a month, only when the PC is idle or the screen is locked, or make it extremely lightweight - just upload all your browser cookies once a day

if you get hit by something like this there’s no going back. you need to format. there are very, VERY weird ways that a malware can replicate/hide itself to.

software has, is and always will be a game of trust. do you trust the cracker? or even the company that makes the software? and if so, why

I always suggest to never run cracks on a machine that is used to log into personal accounts

The only crack that I actually trust is mass grave (windows & office crack). It’s a powershell script so you can just read its source code

[-] dzervas@lemmy.world 28 points 11 months ago

I’m usually on the flip side of C/C++ compilers: reversing

I tell you: MSVC is batshit crazy

[-] dzervas@lemmy.world 12 points 1 year ago

I don’t know if the graphic refers to the current floods in Greece, Libya and Morocco but it’s almost too relevant

I live in Greece and I’ve been cut off from the rest of the country because the roads (and the villages of course) are completely flooded

[-] dzervas@lemmy.world 68 points 1 year ago* (last edited 1 year ago)

I have the hobby of cracking stuff like that (but mainly windows apps to tell you the truth) and there are many-ish people out there with the same hobby. search around a bit and google stuff like "Spotify Car Thing github" or "Spotify Thing bypass" or jailbreak. Heavily rely on github and russian forums. Also random small blogs

If you're so determined though and nobody else has done it and you're fine not using it for 3+ months, there's a very slim chance that I could find the time to bypass it

EDIT: Yeap it's cracked and it's easy too

-13
submitted 1 year ago by dzervas@lemmy.world to c/memes@lemmy.ml
[-] dzervas@lemmy.world 16 points 1 year ago

just a side note for graphene: i have the feeling that it’s not for everyone. “too much” security tends to get in the UX way

6
submitted 1 year ago by dzervas@lemmy.world to c/memmy@lemmy.ml

Apollo had that and was veeeery handy When you scroll through your feed or a community have a share button - either in the middle of the post or maybe replace the bookmark (as an option of course)

The quickest way to share a post to the wife! 🙂

2

I'm creating an open hardware mouse that actually fits me! It's still not open and it's got way, WAY too much work ahead (design the PCB(s), design switch mounts in the model, add mouse support to ZMK, re-design the PCB cause I fucked up, make the top out of CNCed wood and the bottom out of milky transparent 3D printed resin)

view more: next ›

dzervas

joined 1 year ago