nym's avatar
nym
nym@primal.net
npub1hn4z...htl5
nym's avatar
nym 11 months ago
Sleep Baseball Northwoods Baseball Sleep Radio is a full-length fake baseball game. There is no yelling, no loud commercials, no weird volume spikes. Fans call it "baseball radio ASMR". It is the perfect podcast for sleeping or relaxing, if you're into that kind of thing. Available wherever you get your podcasts. "You don't listen to it, you listen through it" ![](https://m.stacker.news/73605) originally posted at
nym's avatar
nym 11 months ago
More than 1,100 inmates help Cal Fire battle fires for less than $30 a day https://abc7.com/post/inmates-work-less-30-day-help-cal-fire-battle-eaton-palisades-fires/15813591/ Sal Almanza has worked 24-hour shifts in grueling terrain, cutting fire lines and hauling away brush trying to keep ahead of fires that have devastated several Los Angeles neighborhoods. But when the fires are finally out, he won't be going back to his family: He'll be returning to the prison "fire camp" where he's serving time for drunken driving that injured someone. "I wanted to do something positive while I was here," the 42-year-old said. "Something that would contribute back to the community and just help me feel better about my situation and right the wrongs that I did." ![](https://m.stacker.news/73603) Over 1,100 California inmates have been working around the clock in challenging conditions - including howling winds and toxic smoke - to help Cal Fire battle the Eaton and Palisades fires, the largest and most destructive of about a half-dozen fires that burned in the Los Angeles area in the past two weeks. They become firefighters for the chance to cut time off their sentences, to get outside the prison walls and for training that might help them land a job once they're out. But some say the inmates, many earning less than $30 a day for their efforts, deserve better after risking their lives: to be paid on par with other firefighters. originally posted at
nym's avatar
nym 11 months ago
Looking for a psychological mindfuck movie to watch #asknostr
nym's avatar
nym 11 months ago
Silver Spoon Silver Spoon" is an allegorical tale that critiques the evolution of governmental control and societal organization. The story contrasts an idealized past of voluntary cooperation and individual freedom with the gradual emergence of controlling systems, symbolized by magical utensils (Silver Spoon, Jade Chopsticks, Golden Fork, and Bronze Ladle). Through these symbols, it illustrates how authority structures establish themselves through initial benefits before expanding into oppressive control systems. The narrative explores themes of surveillance, monetary control, propaganda, and the loss of personal freedoms, while questioning how societies surrender autonomy in exchange for promised security and order. ![](https://m.stacker.news/73585) originally posted at
nym's avatar
nym 11 months ago
WireGuard at Modal: Static IPs for Serverless Containers At Modal, we built a high-availability, Go-based VPN proxy called vprox. This is a deployment of WireGuard, so it operates on Layer 3 (IP) of the network stack and allows us to funnel outbound traffic from containers around the world through static IPv4 addresses. In the event of a single-node failure, its static IPs are associated with other proxy nodes, and containers reconnect within seconds. The year is 2024, and you are deciding on a serverless cloud platform. You stumble upon Modal. Run pip install modal, write a short Python function, and modal deploy it. Amazing, now you’ve got a cron job and API endpoint in the cloud, within seconds. Modal functions run on hardware around the world, in dozens of regions across multiple cloud providers. This is how we optimize the prices on your compute and scale dynamically to meet demand. It’s all to make developers happy, since now you don’t have to think about this stuff. (We get it, we’re infrastructure engineers.) But now let’s say you want to connect your serverless function to your MongoDB cloud database, and it requires a specific IP access list. Uh oh… ![](https://m.stacker.news/73584) Usually, with a traditional provider you’d deploy some VMs and assign them a static IP address or two, then distribute them across your machines and add those to your access list. So now your application runs on cloud hosts at some particular IPs, like 20.21.20.21. Only these machines can access your MongoDB database, and no one else can around the world. But if you’re running a serverless computing workload, which can not only run in any data center around the world, but also scale up and down… you won’t know what IP address your code is running on! So that access list would have thousands of entries and will be constantly changing, which really isn’t going to cut it. Plus, Modal has an isolated container runtime that lets us share each host’s CPU and memory between workloads. If a host has one IP, your container and another customer’s container on that host would have the same IP, so that bypasses the security of your access list. originally posted at
nym's avatar
nym 11 months ago
Private Keys in the Fortigate Leak A few days ago, a download link for a leak of configuration files for Fortigate/Fortinet devices was posted on an Internet forum. It appears that the data was collected in 2022 due to a security vulnerability known as CVE-2022-40684. According to a blog post by Fortinet in 2022, they were already aware of active exploitation of the issue back then. It was first reported by heise, a post by Kevin Beaumont contains further info. What has not been widely recognized is that this leak also contains TLS and SSH private keys. As I am developing badkeys, a tool to identify insecure and compromised keys, this caught my attention. (The following analysis is based on an incomplete subset of the leak. I may update the post if I get access to more complete information.) They also include corresponding certificates and keys in OpenSSH format. As you can see, these private keys are encrypted. However, above those keys, we can find the encryption password. The password line contains a Base64 string that decodes to 148 bytes. The first four bytes, padded with 12 zero bytes, are the initialization vector. The remaining bytes are the encrypted payload. The encryption uses AES-128 in CBC mode. The decrypted passwords appear to be mostly hex numbers and are padded with zero bytes - and sometimes other characters. (I am unaware of their meaning.) In case I lost you here with technical details, the important takeaway is that in almost all cases, it is possible to decrypt the private key. (I may share a tool to extract the keys at a later point in time.) The use of a static encryption key is a known vulnerability, tracked as CVE-2019-6693. According to Fortinet's advisory from 2020, this was "fixed" by introducing a setting that allows to configure a custom password. originally posted at
nym's avatar
nym 11 months ago
Football, Fiat and the Bitcoin Renaissance Does Football Still Feel the Same? Close your eyes for a moment and think back to when you first fell in love with football. What was it that pulled you in and wouldn’t let go? Was it the roar of the crowd as your team netted a stoppage-time winner? The thrill of an underdog beating the odds? Or maybe it was simpler—the chants, the rivalries, the raw, unfiltered chaos of the game. Now open your eyes. Does football still feel like that? ![](https://m.stacker.news/73560) You know it doesn’t. The spark is still there but the magic feels muted. Matches feel more like polished products, rivalries are starting to feel manufactured and even the moments of brilliance seem a little…hollow. You hear the pundits blame it on “greedy owners” or “commercialisation of the game,” but football has always been tied to money. From the grand stadiums to the global superstars, wealth has always flowed to the game we love. So, what’s really wrong? originally posted at