On an Intel-based Mac, the latest UTM (4.2.5) seems to crash right after browsing for a boot ISO image. for me. Could anyone confirm whether this also happens on an M1/M2 device please?
The issue is here: github.com/utmapp/UTM/issues/5…
Unknown parent

akkoma - Link to source

Erion

@bryn I haven't seen your demo, but thanks for confirming. Yeah basically it's a speed issue, but I also suspect that they fixed something in Ventura, because honestly speed should never dictate whether a UI works as expected. The sad part is that this is not even UTM, but just the UI library.

Government official confirms it is all about the links with Bill C-18, acknowledging if Facebook and Google stop linking, there is no need to pay “because they were no longer in the business of making news available.”

---
RT @globepolitics
CRTC lacks expertise to regulate online news bill says its former chair https://www.theglobeandmail.com/politics/article-crtc-lacks-expertise-to-regulate-online-news-bill-says-its-former/?utm_sourc…
twitter.com/globepolitics/stat…

violet cybrespace decodes the qr code on a fast food drink cup using pen and paper, long post

in my (seemingly eternal) quest to learn how to read qr codes by eye, i figured it was time to just sit down with a qr code and decode it with only a pen and paper (and the qr code specification and an ascii table because i don't have that memorized yet)

anyway, i got a drink from mcdonald's that had a relatively small version 2M code on it (which is about as small of a qr code that can still fit a reasonable amount of data in it) and i did all the work to unmask the data and extract the various blocks of modules to figure out the message itself. the message is just a bitly link that directs you to download their app from your respective app store but that's not really relevant

when copying down the original code, i chose to draw the locator features and the version information in a different color than the masked data. this made it easier in the unmasking step to not accidentally waste time trying to unmask static features of the code

only the first 5 bits of the version information encode data (the rest is error correction) and of that the main thing you need to worry about is the 3 bits for the mask pattern but once you have that it's straightforward to unmask the data. the mask patterns are defined as like modular arithmetic statements but since they all rely on "mod 2"s and "mod 3"s i like to just imagine them as a 6x6 pattern that tiles over the data sections of the code. if you look closely you can see the orange tick marks around the outside of the codes that i drew to keep track of where the mask patterns tiled

the two main conveniences that made this a lot easier are the fact that qr codes have their entire data section at the start and all of the error correction comes later and also the fact that this is a small enough code that the error correction is done in one single block. in larger qr codes, the data is split into even groups of 8-bit codewords (up to around 80 groups) and the data is interleaved between all of those groups

anyway, like i said, the eventual goal is to be able to do all of the work that filled up a whole sheet of paper in my head but i am a long way from that future and this is literally one of the first steps

This is a hell of a throwback.

A tool I sometimes miss in era of blighted modernity is sz/rz. scp -J is fine I guess, but on those rare occasions that I'm at the far end of a few hops I frequently think it'd be nice to just zmodem a file through the whole chain. Some modern tools still build it in, apparently? (Kitty and ExtraPuTTY, PuTTY derivatives)

cambus.net/fun-with-kermit-and…

We want to make medicine accessible, available, and affordable everywhere in the EU.

Our new reform of the #EUPharmaStrategy legislation proposes a single market of medicines that will:

💶 ensure affordable access,

🪫 prevent shortages,

💡 foster industry innovation,

🦠 fight antimicrobial resistance,

💚 improve environmental sustainability.

Together, we can create an innovative, patient-focused single market that is fit for the future. → europa.eu/!7prhmX

Tohle je dobrý titulek: "Zničí Brazílie Amazonii, aby zachránila klima?"
Nerostné bohatství v brazilské Amazonii (lithium, kobalt, nikl, niob...) by mohlo pohánět energetickou transformaci. Mohlo, pokud dojde k dalšímu zničení amazonských pralesů + těžba je špinavý byznys.
foreignpolicy.com/2023/04/22/b…

#Kdenlive 23.04 is out with nested timelines, Whisper engine support, new effects and transitions and much more.

Go check it out:
kdenlive.org/en/2023/04/kdenli…

#contentcreation #contentcreator #editing #production #videoediting

This entry was edited (2 years ago)

Contrairement à des messageries de types WhatsApp ou Signal, qui sont hébergées à l’étranger, @element_hq utilise des serveurs décentralisés, ce qui signifie que si les Ukrainiens perdent l’accès à Internet, ils pourront toujours communiquer entre eux.
usbeketrica.com/fr/article/mat…

One of the things that makes living in the Netherlands so convenient may come to all of Europe: the iDEAL online payment system. They just need to figure how to make the UI still work with thousands of banks to choose from instead of, like, a dozen.

nltimes.nl/2023/04/25/dutch-pa… via @isotopp.

This entry was edited (2 years ago)

A new version of Amberol music player is out with a couple of new features omglinux.com/amberol-0-10-rele… #gnome #gtk #opensource

Does anyone know any way to verify that the account at floss.social/@gnome is official?

I suggested to them they might verify their web link, but as far as I can tell the haven't? Also emailed GNOME via their official website to check if this is their account, but didn't receive a response.

Any ideas? Anyone know someone at GNOME who could verify?

I'm not suggesting it's fake by the way, it's just frustrating not to be able to verify! :)

#GNOME #Linux

This entry was edited (2 years ago)

In the TestFlight app, if you saw a message says ”the developer removed you from the test program.” that’s a bug of TestFlight. I did not remove anyone from the test program of Mona Beta.

To continue using Mona Beta, please tap “Stop Testing” on TestFlight’s Mona Beta page, then use this invitation link to re-enter our test group: testflight.apple.com/join/xNdg…

reshared this

#Netflix ha perdido UN MILLÓN de usuarios en #España desde que se ha prohibido compartir contraseñas. Nice deal.

#noticias
bloomberg.com/news/articles/20…

El Gobierno andaluz promete a los regantes irregulares de Doñana un agua que la ley prohíbe usar

La Junta repite que las fincas que pinchan sin permiso el acuífero y pretende legalizar deberían acceder al bombeo desde la cuenca Tinto-Odiel-Piedras, pero una norma del año 2018 lo impide eldiario.es/sociedad/gobierno-…

FINALLY, #Tutanota lets us bulk-export multiple/all e-mails in a folder! Just tick the check mark at the top and hit the download icon. After waiting for a moment, you'll get a .zip archive containing all the .eml files.

#QT @Tutanota
mastodon.social/@Tutanota/1102…


Release time (web & desktop)! 🥳

- Buttons to reply etc. stay at the top while you scroll
- You can select all emails in a folder
- You can preview a long file name before downloading

How do you like these small improvements?

youtu.be/I0Y-SKKoMZM


Google has just updated its 2FA Authenticator app and added a much-needed feature: the ability to sync secrets across devices.

TL;DR: Don't turn it on.

The new update allows users to sign in with their Google Account and sync 2FA secrets across their iOS and Android devices.

We analyzed the network traffic when the app syncs the secrets, and it turns out the traffic is not end-to-end encrypted. As shown in the screenshots, this means that Google can see the secrets, likely even while they’re stored on their servers. There is no option to add a passphrase to protect the secrets, to make them accessible only by the user.

Why is this bad?

Every 2FA QR code contains a secret, or a seed, that’s used to generate the one-time codes. If someone else knows the secret, they can generate the same one-time codes and defeat 2FA protections. So, if there’s ever a data breach or if someone obtains access .... 🧵

#Privacy #Cybersecurity #InfoSec #2FA #Google #Security

This entry was edited (2 years ago)

reshared this

Microsoft's Edge browser appears to be sending all the URLs you visit to its Bing API website.

Reddit users first spotted the privacy issues with Edge last week, noticing that the latest version of Microsoft Edge sends a request to bingapis.com with the full URL of nearly every page you navigate to. Microsoft tells The Verge it's investigating ...

*cough*

"Oh did we accidentally write code and put it in our browser that collects info on everything you do, again?

yro.slashdot.org/story/23/04/2…

in reply to Andre Louis

I did something very similar, except I pitched my voice higher. It's pretty cool because it killed almost all the artefacts. I used text from Infinity Welcomes Careful Drivers to test the voice, so it's very slightly inappropriate. I'd probably rate this PG13 if it was a movie.

The browser market is ripe for disruption.

Microsoft Edge is leaking the sites you visit to Bing - The Verge – theverge.com/2023/4/25/2369753…