33 Followers
205 Following
470 Posts

Hey Schnecke, was machts Gebäcke?

I am a programmer, Minecraft modder and member of the ModFest team!
https://Codeberg.org/SammyForReal

Visit my blog, where I preserve most of my work from my free time!
https://KleinBox.dev

Living in 🇩🇪 @ Cologne

PronounsAny
CountryGermany
Bloghttps://kleinbox.dev/
Githttps://Codeberg.org/SammyForReal/
This is hilarious. I just found out that YouTube wants to sell you document.querySelector('video').playbackRate = 3 for 12.99€/month

(In case you don't know: you can just open the developer console on YouTube and most other regular video platforms and enter the above JS code to make the video play at any speed you want)

PSA: If you block the `claude` user on GitHub, you'll get a warning every time you view a repo with that user in its commit history.

Now, the moment you look at a repo, you can immediately adjust your expectations.

You may do so here: https://github.com/settings/blocked_users

in 2017 a popular twitter game was to type a partial phrase then see what your phone auto-completes it with.

this proved so popular that it is now the only business model in the US.

It's not GNOME, it's not KDE, it's not the new Vanilla OS DE, it's new, uses <100M of memory, is accessible (for real) and uses GTK4 (but not libadwaita).

#Linux #Windows #OpenSource #FOSS

ppl complain abt linux being buggy and then windows bugs will be something like

there’s a known issue where flumbus.dll (used for compatibility with microsoft crumpet 2004, also windows checks for this file on startup and if its not there windows will destroy itself) that causes it to email every single person who has a microsoft account a link to an easily browesable snapshot of your file system. This bug can be caused by:

  • Turning on your computer

in order to fix this you need to download JimTools.exe from jimtools.questionablysafeweb. site. be careful to use the version from july 17th 2003 and NOT THE VERSION FROM JULY 18th 2003 (which is when Jim (creator of JimTools) got bored and made jimtools send hitmen to your address). anyway once you’ve downloaded JimTools.exe, run JimTools.exe and press the button that says “I accept that Jim’s (creator of JimTools) ideas are infallible and if they do fail I agree that I will personally go to Jim’s house (address located in the letter you will receive shortly) and give him all of your belongings and bow down to Jim (creator of JimTools)”

Then restart your computer. Your wallpaper will have changed to a picture of Jim (creator of JimTools). Go to wherever you get your mail and grab the letter from Jim (creator of JimTools). Read it, and make sure to follow all the instructions carefully. Do not disobey Jim’s (creator of Jimtools) orders, or you will face his wrath

so many times in the epstein files where the blackout makes the image go so much harder
This is going to be an hour of quality entertainment.
https://www.youtube.com/watch?v=mfv0V1SxbNA
Building the PERFECT Linux PC with Linus Torvalds

YouTube

About 1.5 years ago my friend was (falsely) accused of terrorism.

All of their electronic devices were seized, plus my stash of hard drives (stored at their place for reasons).

Of course police didn’t find any evidence. Culprit that impersonated my friend (and many others) got arrested recently (article in Polish).

Police returned the hardware few months ago and I found that all of my drives are now e-waste thanks to their carelessness, which made me (understandably) furious. I even considered suing them.

Said very good friend of mine entrusted me with their personal phone and pattern to unlock it. I charged and booted it for the first time since February 2024 and were curious how it was pwned. I knew police used cellebrite on it.

My crime is that of curiosity

As it turns out, police forgot to clean after themselves (there was an attempt) and left payloads, logs, and backdoor intact.

Took a peek at the first-stage payload but it’s too complex for me to reverse-engineer on my own. It’s relatively well obfuscated, but I can tell it’s using RNDIS (likely spawning a server?) and TLS-encrypted connection to talk to Cellebrite box.

If you’re a security researcher (or just curious nerd with more spoons than me) and you would like to take a look - here you go.

Payload was uploaded onto the device on 2024-02-21. If you want to re-create the environment it was executed on, you will need a:

  • Samsung Z Flip3 5G (SM-F711B)
  • Android build SP2A_220305.013.F711BXXS2CVHF

Rough execution flow:

1. USB device plugged in (Cellebrite Cheetah) 2. USB controller switches to host mode 3. Gadget switching USB VID/PID to load kernel modules (hid_steam, hid_apple, hid_prodikeys, hid_logitech_hidpp, hid_magicmouse, hid_aksys and tries to exploit quirks) 4. Module 'hid_aksys' leaks memory 5. Screen unlocked 6. ADB key '82:E5:EA:F3:DC:D1:7D:CA:65:3C:D4:58:65:CD:81:8E' added to trusted keys on the device 7. First-stage payload '/data/local/tmp/falcon' copied onto the device. 8. Second-stage payload (seemingly) executed as root: - /data/local/tmp/chrome-command-line - /data/local/tmp/android-webview-command-line - /data/local/tmp/webview-command-line - /data/local/tmp/content-shell-command-line - /data/local/tmp/frida-server-16.1.4-android-arm64 - /data/local/tmp/init 9. Data extraction (photos, telegram, firefox, downloads)

Have fun!

Słynny bomber zatrzymany – ogromny sukces organów ścigania | Zaufana Trzecia Strona

Prokuratura Regionalna w Poznaniu oraz poznańskie CBZC ogłosiły właśnie wielki sukces - udało się znaleźć i zatrzymać sprawcę mnóstwa alarmów bombowych, który bezkarnie działał od…

Zaufana Trzecia Strona
How the world's richest man is boosting the British right

Sky
https://www.minecraft.net/en-us/article/removing-obfuscation-in-java-edition

Congratulations to who I assume are Mojang's programmers for finally pushing this through. When I started work on alternate community-sourced Minecraft mappings in 2016, I did not imagine that it would start a domino chain culminating in Mojang's legal team finally conceding that the charade of binary obfuscation for one of the most reverse engineered games in the world is no longer beneficial to maintain.

Now let's hope Fabric finally lets Yarn go independent, as they should have done long ago.