An interesting recap of how the #Plan9 OS developed at Bell Labs, with many familiar names, including, of course, Ken Thompson, Dennis Ritchie, Rob Pike, and many others, making appearances.
"What I Saw at the Evolution of Plan 9" by Geoff Collyer
Wait, what? By using #Firefox, I now grant Mozilla "a nonexclusive, royalty-free, worldwide license to use" any data I "upload or input"? That seems, uhm, rather broad. Wtf.
Today in "#systemd ruins everything", Jan learns that systemd-resolve...
- runs a proxy DNS server on 127.0.0.53 (which is in /etc/resolv.conf) - uses it's own /run/systemd/resolve/resolv.conf - will read and cache /etc/hosts regardless of what /etc/nsswitch.conf says (`ReadEtcHosts` defaults to `yes` in /etc/systemd/resolved.conf)
Applications that follow traditional libc resolver logic now will continue to get /etc/hosts results even if /etc/nsswitch.conf excludes 'files'.
Just spent 45 minutes groveling through 2,300 lines of bash completion gunk because apparently nowadays bash[1] will only tab-complete files based on filename "extension"[2] as if this was fucking MS-DOS.
Grrr.
[1] Well, _this_ bash on _this_ particular Linux version. [2] E.g., "sh x<tab>" will only complete "x*.sh".
Today's #linux grievance: apparently #fedora comes up with a default firewall that blocks anything besides SSH and something called "cockpit" (apparently a remote admin web interface running on port 9090 using a self-signed certificate, so, uhm, yeah 🤦♂️).
Mozilla announces that Certificate Transparency is now enforced in Firefox, meaning certs lacking SCTs would be untrusted. (This applies to roots in the Firefox root store, so presumably your internal and snakeoil certs are not affected, but I think you want to explicitly verify that.)
All the tried and true ways to escalate privileges, including your common shell-out of setuid programs, PATH games, etc. with the conclusion we still see people having to learn repeatedly:
'Twas the night of the moratorium, and all through the cloud not a pager was beeping: no deploys were allowed. The packages frozen on the servers with care, In hopes that an outage would strike nowhere;
Enterprise IT Security tends to lose its shit when their endpoint protection finds #Tor browser on employees' devices.
Unless you do deep packet inspection / middlebox all traffic, I don't see a meaningful risk increase. (If you do, then it seems comparable to e.g., Apple Private Relay + browsers' DoH use.)
Does anybody have a good summary (not written by a VPN vendor) on the actual risk to the enterprise from its use by average users (not attacks on Tor itself, nor running a Tor node)?
I swear, every time I use (a, any) Linux, I have to do a double-take and go "what the fresh fuck is this now". Today it's whatever is going on with /etc/motd on Ubuntu.
Making simple things complicated seems to be the trend there.
This is a pretty cool step forward in quantum computing. But the reporting I've seen, or perhaps: the takeaways people assume after skimming the headlines are often wildly off the mark.
Part of the problem is in the phrasing, saying Google's chip can solve a problem in 5 minutes that a classical computer can't solve in "a quadrillion times the age of the universe".