![](https://radiation.party/pictrs/image/141f2b46-3cf2-43be-aa47-13d675abc438.png)
![](https://lemmy.dbzer0.com/pictrs/image/a18b0c69-23c9-4b2a-b8e0-3aca0172390d.png)
Massgrave is a tool that can create legit (oem) keys for windows and office out of thin air*
- it’s not literally creating them from nothing, it’s using a system Ms themselves run to get working keys. Evidently they don’t have a huge problem with it.
Massgrave is a tool that can create legit (oem) keys for windows and office out of thin air*
Umami has been pretty good to me. Plausible was a close choice but I ran into technical difficulties getting it going.
I didn’t get around to trying it, but goatcounter looked promising as well.
Cinavia! Allegedly it’s still around and mandated in all consumer Blu-ray players.
Nintendo made no legal demands nor threatened to sue any involved party, their letter just formally requests that dolphin wouldn’t be published on steam.
The Weeknd
My gut feeling is that that is apples entire game plan with the Vision Pro- seed an expensive version of the tech, then refine it with what they learned into something leaner and significantly cheaper.
I could be wrong, but given the current price point that’s my guess.
Unless they are permanently only using specific addresses or blocks and will never change that up, I’d consider it a moving target.
A flatpak of the snap, running in a docker container inside a vm for maximum security.
Checking ip ownership is a moving target more likely to result in outcomes these sites don’t want (accidentally blocking google bots and preventing results from appearing on google).
Checking useragent is cheap, easier, unlikely to break (for this purpose, anyway) and the percentage of folks who know how to bypass this check is relatively slim, with a pretty small financial impact.
Looks like beeper got their stuff working again.
Can’t imagine this working out very well long term though
It’s feasible and has been used in various 0day exploits in the last few years. It’s getting significantly rarer nowadays but media player exploits leading to RCE has been a staple of malware distribution for a long while.
It’s just much easier to make a malicious word macro and hope the user isn’t careful than to research/identify an exploitable bug in a media player.
Generally you can’t reverse it into exactly what was written, but most of the time you can disassemble or decompile just about any program as long as the binary format is known. The legibility of the resulting unraveling may vary depending on language and any methods used to obfuscate the end binary.
Their point was that, on macOS, other browsers don’t use the safari engine under the hood like they do on iOS. That commonality is why the article states the exploit works in those browsers on iOS.
Steams solution is about as simple as it gets. Install steam on both devices (or the steam link app/ a physical steam link box), pair controller, log in, hit play.
I’ve seen so many jokes about the naming at this point that I’m pretty sure most folks making those jokes actually think Apple made an iPhone 15 pro plus max.
They’ve been so consistent with naming since the 12 it’s actually been rather nice vs other vendors.
The ps3 provides decent ui but due to stunted interest in the ps3 for homebrew there hasn’t been as much of a focus on getting emulators running well, just to get them running, so while 2d systems will run well at native res you won’t be able to push them very far with shaders, and while n64 allegedly works decently you’ll be stuck with buggy and slow performance. The real upside to the ps3 is decent ps1 and ps2 emulation because of Sonys efforts (even on non-bc consoles) which opens the door to thousands more games.
A raspberry pi or steam deck will offer a generally better emulation experience than a ps3- the homebrew scene for the ps3 leaves a lot to be desired.
Hey! I resemble that statement!
I’ve pointed out in another comment that most of what she says are indicators of an incredibly toxic working environment, but I’d have to echo the sentiment that a good chunk of it is disgruntled, relatively inexperienced, employee grumbling.
Props on her for speaking up, though. Nothing changes if the status quo is toxicity and silence.
But, eventually exploitable is still a pretty major concern for anybody who has systems running longer than a few days at a time.