The article on theregister stated
Also inside the uploaded source code was some GPL 2 source code, which renders the not-very-open WCL moot.
The article on theregister stated
Also inside the uploaded source code was some GPL 2 source code, which renders the not-very-open WCL moot.
Winamp published their code as “open source”. Problem is…
This is a standard feature on any IPv6 enabled network if you enable IPv6 Privacy Extensions
Huh, I misremembered then. I stand corrected.
Notable though that there are specific countries (such as India) where adoption is far higher at 72%
Huh weird that it would be removed, that’s a fair comment.
For Web scraping and other activities by so-called “legitimate” companies to varying degrees, this may be the case. But for general bots, they are generally attempting to scan and probe the entire IPv4 range, since it can be exhaustively checked in a reasonable amount of time and the majority of IPs have hosts on them. Enumerating the entire IPv6 space is quite literally impossible without some external list of hosts known to exist, due to the number of hosts. This happens, but it’s a much higher hanging fruit for an attacker so far fewer will bother. So you generally see few to no continuous probes on things like sshd over IPv6 unless you have a domain name. I’m guessing a lot of bots (in botnets) are dumb old technology that doesn’t even have IPv6.
NAT was always a hacky workaround. And although it effectively ends up functioning as a firewall under normal usage when combined with a typical “drop invalid incoming packets” rule, it was not designed to be a firewall and shouldn’t be assumed to always function as one. A simple accept established, default drop firewall rule should do the trick and should be used on both v4 and v6 regardless of NAT (and probably is on your router already).
If your goal is privacy in the sense of blending in, you can still use NATv6 and this is a good use case for it. This is what VPNs like Mullvad use. If your goal is privacy in the sense of being more difficult to track across sessions, you can enable IPv6 privacy extensions which essentially generates a new IPv6 address for every connection your device makes. So in this sense it’s more private than IPv4
Or you could just… learn to use the modern internet that 60% of internet traffic uses? Not everyone has a dedicated IPv4 anymore, we are in the days of mobile networks and CGNAT. IPv4 exhaustion is here today.
Best to set a firewall rule with nftables to block non-vpn traffic from leaving (you should also do the save for IPv4 traffic to prevent leaks in case the tunnel disconnects)
Framework
It seems like the headline is deliberately written to be funny (I did get a good laugh out of it) and the actual event isn’t quite as nottheoniony. My understanding is that the court faced the question of whether the lawsuit could proceed against the doctor individually, or against the insurance company. It’s bizzare but rather unsurprising and understandable that the lawyers of a doctor faced with such a claim would try, even if it’s likely to fail, to have it pushed via the insurance company.
The court made the right decision of course, but this just seems like business as usual for lawsuits.
Copying is not theft. Letting only massive and notoriously untransparent corporations control an emerging technology is.
This should be the default systemwide.
Is your IPv6 behind NAT (like on a VPN)? See https://wiki.archlinux.org/title/Mullvad#Preferring_IPv6_inside_the_tunnel
Accessing printers? Resolving hostnames of internal hosts? I can’t imagine having a lan without mDNS
I don’t think it’s quite as simple as someone just forking it. Realistically, a browser is an extremely complex piece of software that requires a lot of organizational effort to maintain, deal with security issues, etc. Pretty much every other piece of software on a similar scale I can think of (the kernel, KDE, Blender, Libreoffice) has some sort of organization behind it with at least some amount of officially paid work. All the major forks of Firefox or chromium follow quite closely to upstream for this reason (which is also why I’m skeptical of Brave’s ability to maintain manifest v2 long term, despite their probably genuine best efforts to do so).
I do wish that Firefox were developed and funded by an organization specifically dedicated to developing it. This could of course happen if Mozilla dies. But that’s going to require someone starting it, which is not at all a small or cheap task.
I could also see a future where Oracle or IBM buys it 😂🤡
I think this will change. Nvidia hired devs on Nouveau, NVK is coming along, etc
Some of it probably comes from other companies that are unable or unwilling to relicense it even if Nvidia wanted to
A year ago, the majority of Lemmy was vehemently in support of banning porn
It is based on the assumption that every piece of code in the entire stack from the UEFI firmware to the operating system userspace is free of vulnerabilities
Looks like the birdie has escaped phoronix…
In the small chance that this comment is serious, Nvidia is found this because the corporate server-based customers need the ability to troubleshoot and debug the driver.
The actual trade secrets are being moved into the proprietary firmware blob and out of the driver.
I don’t exactly consider Drew Devault a reliable or unbiased judge of character