

You will likely have to use a temporary alternative until the name is removed so you can reclaim it. No idea how long that takes, it might not even happen automatically at all. It seems like there is a forum thread for it
You will likely have to use a temporary alternative until the name is removed so you can reclaim it. No idea how long that takes, it might not even happen automatically at all. It seems like there is a forum thread for it
Aha I see you did the text-based install then? I’ve never done that myself but I just tried it now and it worked fine for me with the default password it mentions. Make sure caps lock is off. You will not be able to see the password when you type it, so be extra careful you are typing it correctly.
Most of the same cautions about internet access still apply, if your networking is active on this VM there’s a non-zero chance you can get hacked right away when you’re in default passwords/initial setup mode. If you continue to have trouble getting in, you should reinstall it once again onto a fresh VM with network mode set to NAT if possible, or even disabled completely, and see if it works in that configuration. It really is critical to get the password set up before opening up the internet.
Not sure what you mean by “what was provided”… who is providing a username and password for your yunohost?
You are supposed to create your own username and password during the “Begin” setup process after it first installs. “root” and “yunohost” are very insecure and if you use passwords that are copy/pasted from somewhere else on a machine connected to the internet it will be hacked, potentially almost immediately. People have bots that literally just try to connect using these common default passwords all day every day to every site on the internet. I have literally had machines with such crappy passwords hacked within minutes of spinning them up. The same thing can happen even when you are first doing the setup process. If somebody else can get in, they can (most likely with a bot) do the setup process themselves and set up their OWN username/password, and now it will ask you for that password that THEY set, which you have no way of knowing. The instance belongs to the first person to claim it, and if that’s not you, you have to wipe it and start over.
Your yunohost VM interface should not be exposed to the internet during setup. Even briefly, or someone else can immediately compromise it like this. The only way to ensure you are the first person to access it is to make sure you are the ONLY person who can access it, until it is properly set up and secured. Bots are WAY faster than you can be.
Use localhost console, VM port forwarding or some other secure method of making sure nobody but your own host computer can access the IP of the server where you are setting things up, until it has a strong, secure password (not “yunohost”) and make sure you have all its security features configured and working before you even think about making it accessible to the internet.
I guess they are about to make John Romero their bitch now.
Jokes aside, it is sad to see all the cuts going on right now, especially since I think they’re stupid, shortsighted and misguided.
I think I’ll stick to AMD from now on, thanks.
They are freely expressing their fear of dangerous western ideas which must be censored to protect the motherland /s
Pika OS is a gaming distro based on Debian which in my experience one of the most stable and reliable upstream distros that I trust, Pika adds all the gaming stuff you could possibly want and all the library and driver updates that you need to stay current and basically fixes what I consider Debian’s only flaw (that its stability can make non-security update and driver updates slow and unsuitable for the latest and greatest games and technologies). Overall I’m really enjoying it, I’m daily driving it and have it installed on several laptops with no hardware issues at all. Just be careful that you need to use the NVIDIA-specific install ISO if you have a recent NVIDIA card.
I’ve also heard good things about CachyOS, personally it would take a lot to drag me over to the Arch ecosystem but if you already have a Steam Deck anyway it might be a great place to be.
Ah, I see I’ve found a fellow member of la révolution. I applaud your scientific curiosity.
I’m really curious what brainrot is in that man’s head.
This is a slow-news-day story and affects neither you nor anyone you care about.
The malware was impersonating Oringo and Taunahi
As usual, these hacks target idiots using cheats and aimbots, downloading them from a fake repository on Github directly, which is no different than downloading an exe. 99.99% of Minecraft mods are fine, so is Prism, so is Modrinth.
Correct, it is also a sign that it is winning that it keeps attracting (and largely still beating) direct competitors. The Switch 2 can’t have any realistic competitors because the ecosystem is so closed off and exclusive, it’s a monopoly in its space.
Despite countless attempts by numerous companies to monopolize various parts of the PC experience, it continues to foster relentless competition, and rather than attempting to lock in their little bit of monopolization, Steam Deck is too busy breaking other, much more realistic attempts at complete monopolization of the PC ecosystem (Looking at you, Microsoft Windows). Even Steam’s own game distribution dominance is a far cry from Microsoft’s near-complete control of much of the desktop OS stack. It is a genuine pleasure to see Steam Deck and the hard work done by things like Proton (and to a lesser extent, improving support from hardware vendors most notably AMD) finally actually moving the needle on that.
I’ve never been happier about my Prusa, despite some of what I felt were their suboptimal choices in the last few years, at least they’ve never seemed malicious.
There was literally a commit only a few hours ago and there doesn’t seem to be any announcement about it being archived or abandoned. I feel like this has to be either a mistake or some disgruntled ownership drama but I think it’s pretty fair to assume it’s not abandoned, however this shakes out there will still be people working on it or some fork of it.
Almost any type of plastic that can be manufactured (and even some that otherwise sort of cannot) can also be 3d printed and almost all are available as filaments. Some of these filaments are very difficult to print, or very expensive, or very hard to find, or all of the above, but if you need 3d printer filament that meets any particular certification or material needs, there’s probably a filament for that, and it likely has official certification too. 3d printing is being used everywhere now, commercially and industrially. It’s not just for home-gamers anymore.
And even if you don’t find something you can print that will quite meet the same technical level of certification, there are still plenty of easy to print filaments that have quite good properties for things like flammability. It’s good to keep things like that in mind though, especially if you’re the sort of person who just defaults to PLA or PETG for everything. (I’m guilty of this)
I trust the community, but not blindly. I trust those who have a proven track record, and I proxy that trust through them whenever possible. I trust the standards and quality of the Debian organization and by extension I trust the packages they maintain and curate. If I have to install something from source that is outside a major distribution then my trust might be reduced. I might do some cursory research on the history of the project and the people behind it, I might look closer at the code. Or I might not. A lot of software doesn’t require much trust. A web app running in its own limited user on a well-secured and up-to-date VPS or VM, in the unlikely event it turned out to be a malicious backdoor, it is simply an annoyance and it will be purged. In its own limited user, there’s not that much it can do and it can’t really hide. If I’m off the beaten track in something that requires a bit more trust, something security related, or something that I’m going to run it as root, or it’s going to be running as a core part of my network, I’ll go further. Maybe I “audit” in the sense that I check the bug tracker and for CVEs to understand how seriously they take potential security issues.
Yeah if that malicious software I ran that I didn’t think required a lot of trust, happens to have snuck in a way to use a bunch of 0-day exploits and gets root access and gets into the rest of my network and starts injecting itself into my hardware persistently then I’m going to have a really bad day probably followed by a really bad year. That’s a given. It’s a risk that is always present, I’m a single guy homelabbing a bunch of fun stuff, I’m no match for a sophisticated and likely targeted nation-state level attack, and I’m never going to be. If On the other hand if I get hacked and ransomwared along with 10,000 other people from some compromised project that I trusted a little too much at least I’ll consider myself in good company, give the hackers credit where credit is due, and I’ll try to learn from the experience. But I will say they’d better be really sneaky, do their attack quickly and it had better be very sophisticated, because I’m not stupid either and I do pay pretty close attention to changes to my network and to any new software I’m running in particular.
I skimmed through most of it, it’s a huge and badly organized info dump, but it seems legit, most of the research was done through the internet archive and everything it listed is verifiable and reproducible, although as far as I can tell the link to the CIA is pretty weak and relies on a single news story with a single example alleged “CIA site” that allegedly leaked out of , it’s not really that hard to believe that they would have such sites. Almost certainly all spy agencies do. It’s totally plausible steganography, like the numbers stations on radio, or botnet controllers quietly directing their army of bots through normal-seeming posts on normal-seeming accounts on social media. Hiding operational information in plain sight allows a useful hidden communication method that doesn’t raise any obvious alarm even if it is noticed to be a bit strange or dumb. It blends in perfectly with all the other strange and dumb content on the Internet.
Obviously all the sites are gone now and there’s nothing of any particular intelligence value there but the appearance and contents of the sites are still available on the archive, and of course there are at least hundreds of them, in various languages, on various topics, with a variety of different technologies in use, but the similarities also seem pretty clear. It’s not much of a conspiracy this is fairly basic stuff although of course we don’t have rock solid proof I don’t think that would really make it any more interesting. If the CIA did come out and say “yep, those were our sites” would it actually be any more interesting? would it be less interesting? or would it be the same interesting? I think it would be the same interesting. But that’s just, like, my opinion.
I think you’re missing mine. I know it’s not clever. I think everything it creates is either slop, plagiarism and almost always both.
My point is: An arbitrary random number generator without any stable internal model of the world would still be a bad thing if it can, without any conscious intention, trick/confuse people into thinking its so awesome and clever that they choose it to be emperor of Earth, leader of the economy, decider of reality, and build it a great throne upon which they can worship it and and an altar to burn oil on as a sacrifice to the environment. That’s what LLMs are doing. It doesn’t matter whether the LLMs intend to, it doesn’t matter whether they have intentions at all. What matters is that it’s so “well presented” that people fall for it. It’s the effectiveness it has at making people fall for it that’s the problem. Dismissing those people as weak, naive, stupid can’t be done because their actions matter, their votes matter, their financial choices matter, they’re part of the civilization we live in, and frankly, they seem to be the majority.
Fooling people is evidently all you need to do to become President of the United States and Commander In Chief of the world’s largest military with personal control over a massive stockpile of nuclear weapons. Fast talking computers could be dangerous when they’re infinitely faster, and probably smarter and slightly less neurotic than the current president. “Hey, come to think of it, has anyone ever even seen the 2028 president-elect on anything other than a screen?”
They don’t really understand anything because they don’t really think. They just repeat what they’re told while convincing themselves its an independent thought that appeared in their head as if by magic. These are the people outsourcing most of their thinking these days to ChatGPT, because it’s not something they’ve ever really valued or been interested in doing themselves. Life’s a lot easier when you don’t have to think about much. They’re “doers” not “thinkers”. And frankly, it shows. We see an awful lot of stuff getting done right now, and very little thinking.