• 2 Posts
  • 409 Comments
Joined 2 years ago
cake
Cake day: August 15th, 2023

help-circle

  • Effort vs Reward vs Ability vs Inital investment

    In most cases, think of this kind of thing like a legitimate business. Same concepts. I’ll grade a few scenarios based on what I have seen over the last 20 or so years. (The ratings are arbitrary and just trying to explain my point.)

    Do you have the means to rent a botnet and phish a few million people for lots of credit card numbers? Can you manage that kind of data, test all those numbers and maybe end up just selling that data? Low Risk/Moderate Reward (“Selling shovels” analogy is probably a better scheme than actually renting the botnet, IMHO)

    Could you setup a “call center” in India and run a scam ring like an 8-5 business? Are there enough people you can hire to do this work? That requires training, infrastructure and time. You also may need to “work with” law enforcement to ensure your scam isn’t busted by legitimate cops. Moderate Risk/Moderate Reward.

    Are you part of a small group with an insane amount of skill that has the time to pull off an extortion scheme against a Fortune 500 company for a few million bucks? High risk/High reward

    Those are all normal scenarios above and it’s based on profitability and initial investment. Risk/Reward is always a balance.

    (Sorry. I pulled a “wHellll aKshUallY” when you said it’s not worth the time for the small targets.)




  • And it’s about a mile? Many common rifle bullets will be starting to nope-out of supersonic around that distance, so you would need something really beefy, like a .338 Lapua or even a .50 to be accurate. (A bullet will generally start tumbling when it drops sub-sonic.)

    Don’t mistake me: many bullets can and do travel past a mile regularly, especially depending on the shot angle. Yeah, they can still kill. I am referring to the uncertainty and inaccuracy at those ranges, especially if a bullet has lost a ton of speed.

    My main point is that long range sniper rifles are quite large caliber and generally require long heavy barrels. You aren’t going to swing one of those around without being noticed.

    The shot speed approximation is the easy part, believe it or not. Since the bullet must be a large caliber you can guess at about 200-300 grains for a “smaller” large caliber bullet, or between 650-900 grains for a larger one. (Maybe a few more, but I am sticking with a 338 or a 50.) Muzzle velocity is also going to be on the high end at between 2900fps and +3100fps for most all of them. The math is easy to work out with a common ballistics calculator by estimating the ballistic coefficient of available bullets in the category we are talking about. (Bullet speed at the target is the most important number to calculate.)

    Still, it’s not perfect math. If you look for a camera flash at an estimated time when a bullet was supposedly fired, you are probably going to find one, especially if you have a second or two of footage across multiple cameras.




  • remotelove@lemmy.catoSelfhosted@lemmy.worldSecrets
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    3 months ago

    I would look into something like Doppler instead of Vault. (I don’t trust any company acquired by IBM. They have been aquiring and enshittifying companies before there was even a name for it.)

    Look into how any different solutions need their keys presented. Dumping the creds in ENV is generally fine since the keys will need to be stored and used somehow. You might need a dedicated user account to manage keys in its home folder.

    This is actually a host security problem, not generally a key storage problem per se. Regardless of how you have a vault setup, my approach here is to create a single host that acts as a gateway for the rest of the credentials. (This applies to if keys are stored in “the cloud” or in a local database somewhere.)

    Since you are going to using a Pi, you should focus on that being a restricted host: Only run your chosen vault solution on it. Period. Secure and patch it to the best of your ability and use very specific host firewall rules for minimum connectivity. Ie: Have one user for ssh in and limit another user account to managing vault, preferably without needing any kind of elevated access. This is actually a perfect use case for SELinux since you can put in some decent restrictions on the host for a single app (and it’s supporting apps…)

    If you are paranoid enough to run a HIDS, you can turn on all the events for any type of root account actions. In theory once the host is configured, you shouldn’t need root again until you start performing patches.



  • This is my opinion, but yeah. It’ll take some time.

    The biggest issue is that money has moved to safer for investments. Those new investments may take time to mature and/or avoid tax penalties.

    Another component is that hedge funds are likely the ones taking money out of the market in a huge way right now. Hedge funds normally specialize in short selling and there is no better time to close or massively reduce those short positions. (They have other strategies, but their main function is in their name.) They can’t close their positions rapidly, or it will trigger a faux rebound in stock prices. (Short sales are weird like that. It may be one of the reasons you see short bounces in price as a stock price is cratering.)

    Unfortunately, the tarrifs are shifting investment policy against the US now from other countries. This will take years to recover from.

    What will really suck is that I have always speculated that these tarrifs are just the worst kind of insider trading strategy you will ever see. If the intent was to temporarily dump stock prices for the benefit of a few, I really don’t think it’s going to work like it did during COVID. COVID didn’t force massive global policy changes against the US the same way. Even if orange man decides to reverse course and lift tarrifs tomorrow, the damage has been done and there is no reason to restore previous investments. The risk is too high.


  • remotelove@lemmy.catoscience@lemmy.worldYour Wifi Router Emits Photons - QNFO
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    3 months ago

    It’s not a horrible write-up but it doesn’t do much to simplify things. If I had to explain these concepts as close to an ELI5 as I could, I would use less words.

    Photons have characteristics of both a wave and a particle. In many ways, it’s easier to think of a photon as an interaction point. As a wave propagates, any collision point could be thought of as a photon. You shake some electrons in one antenna, they create a wave through the air, the wave propagates until it hits another antenna and the photons are where that wave starts to shake another bunch of electrons.

    I am not quite sure what they were trying to explain about waveform collapse, TBH. There is just a probability curve about where a photon will “exist” at a specific time. You can’t predict the location of a photon, but you can observe it. There isn’t really a physical “collapse” of anything. The probability curve “collapses” into a single point once observed. There is no probability once something is observed. It’s there or it isn’t, so the math function has “collapsed”: There isn’t a need to calculate probability at that time.

    This is far from perfect, but it’s probably easier to digest. I don’t even want to know how much physics I broke with my descriptions, but I do know it’s easier to visualize.









  • remotelove@lemmy.catoLinux@lemmy.mlWhy do we hate SELinux?
    link
    fedilink
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    3 months ago

    Its just complex

    When a security mechanism becomes more complex to manage than what it is supposed to protect, it becomes a vulnerability itself.

    If you had a minimal system that you built from the ground up yourself and wanted to only have that system function in very specific ways, SELinux would be perfect. I would go so far as to say it would be nearing perfection in some ways.

    Sorry, but in the real world, ain’t nobody got time for that shit. If you use auto configuration tools or pre-canned configs for SELinux on a system you are unfamiliar with, it’s more likely to cause application issues, create security gaps and will likely be shut off by a Jr. admin who really has no fucking clue what he is doing anyway.

    It’s just easier to keep your system patched and ensure basic network security practices anyway.

    It’s not impossible to manage these days. In the early days it was, but most everything is automagic now. If I am not mistaken, SELinux can be enabled to ‘log only’ which would give you data better handled by a HIPS anyway. (Don’t quote me on that.)