I should have tried a bit harder to search, the original quote by Sartre is:
“Every existing thing is born without reason, prolongs itself out of weakness, and dies by chance.”
I should have tried a bit harder to search, the original quote by Sartre is:
“Every existing thing is born without reason, prolongs itself out of weakness, and dies by chance.”
“Every line of code is written without reason, maintained out of weakness, and deleted by chance” Jean-Paul Sartre’s Programming in ANSI C
Is this a joke or an AI hallucination? I’m pretty sure Sartre never wrote about programming in ANSI C.
There is a book called “Programming in ANSI C” by E. Balagurusamy
I can only find other references to this quote from sites that are linking this article.
The article actually does date back to 2016 so it’s not AI generated.
The binary blobs match which checksums? The ones provided by the ventoy developer?
GLIM is an alternative that’s much simpler (it just uses Grub configs) so it is easy to audit:
Please don’t continue to recommend Ventoy. It has serious and unanswered security questions hanging over it, and the developer seems to be completely AWOL.
Anyone who falls for the scam of thinking that you can determine IQ from the genome of an embryo is probably below average themselves.
You’re just unabashedly supporting eugenics? Is that because you’re too young, or too uneducated to know any better?
They didn’t break RSA.
This could also mean that they have found a (classical) vulnerability in one of the most used Post Quantum Encryption algorithms (such as Kyber) and they want everyone to switch to using it ASAP.
If this is impersonation (which it looks to be) shouldn’t it be removed?
Are you going to set the precedent that impersonation of figures in the open source community is allowed?
Personally I would be in favor of removing this post until OP can provide proof of identity (eg. by posting something on the main github account corroborating this post).
There’s something important missing from this article:
Eventually, that same USB drive is inserted into an air-gapped computer, allowing GoldenDealer to install GoldenHowl (a backdoor) and GoldenRobo (a file stealer) onto these isolated systems.
Why is an airgapped machine running executable code from a USB drive? Is there some OS-level vulnerability being exploited?
The original writeup says the following:
It is probable that this unknown component finds the last modified directory on the USB drive, hides it, and renames itself with the name of this directory, which is done by JackalWorm. We also believe that the component uses a folder icon, to entice the user to run it when the USB drive is inserted in an air-gapped system
So we have airgapped machines that rely on users to click icons in a graphical file manager to move data from USB drives. This is a complete failure of security procedure. If you have systems that need to be airgapped then you also need the corresponding procedures for use of those systems to prevent this kind of compromise.
This vuln is not new, it was published 3.5 years ago: https://nvd.nist.gov/vuln/detail/CVE-2020-26558
Pretty sure this was described exactly in Snow Crash (Neal Stephenson, 1992).
Instead of linking to a jpeg hosted on a non-HTTPS website for a weird investments scam you could just link wikipedia:
Reuters just regurgitating investor-bait because they have no domain expertise. Maybe Reuters journalists should be getting some training from experts too.
Halt and Catch Fire
Gentoo users in shambles