●● IRC: #techbytes @ Techrights IRC Network: Saturday, January 07, 2023 ●● ● Jan 07 [00:23] schestowitz https://www.fosslife.org/why-and-how-use-docker-containers [00:23] -TechBytesBot/#techbytes-www.fosslife.org | Why and How to Use Docker Containers [00:23] schestowitz " [00:23] schestowitz Docker containers offer many benefits, such as encapsulation, isolation, portability, and control, says Serdar Yegulalp. [00:23] schestowitz Docker containers are small (megabytes). They start instantly. They have their own built-in mechanisms for versioning and component reuse. They can be easily shared via the public Docker Hub or private repository, he notes. [00:23] schestowitz In this article, Yegulalp explains why and how to use Docker containers, looking at the issues containers address, how they address them, when they are the right answer to the problem, and when they arent. [00:23] schestowitz " ● Jan 07 [02:00] *GNUmoon2 has quit (Ping timeout: 2m30s) [02:00] *GNUmoon2 (~GNUmoon@9jw4gist7eai4.irc) has joined #techbytes [02:57] schestowitz Appeals Committee: Call for nominees representing staff [02:57] schestowitz Dear colleagues, [02:57] schestowitz Following ILOAT Judgment 4550 the Staff Committee is (again) free to nominate members to the internal Appeals Committee (ApC) from the entire staff. On 1 January 2023, the necessary legal changes will be completed with an amended Circular No.356: [02:57] schestowitz The members are exempted of their other official duties to an extent proportionate to their work on the ApC; [02:57] schestowitz They enjoy the same protection as elected staff representatives. [02:57] schestowitz They will receive an initial training, in cooperation with the Secretariat of the Appeals Committee. [02:57] schestowitz We are looking for staff members from all sites and DGs who are willing to become members of the Appeals Committee. [02:57] schestowitz We will nominate four members. Although a legal background is not required, a genuine interest in (international labour) law would be an advantage. ● Jan 07 [04:44] schestowitz ========== [04:44] schestowitz > Hi Roy, [04:44] schestowitz > [04:44] schestowitz > Hny2023, and all the best for you and your familly. [04:44] schestowitz > [04:44] schestowitz > Would you have a link about the EPO swpat grant rate forced from 2pc to [04:44] schestowitz > 60pc? [04:44] schestowitz > [04:44] schestowitz > Best, [04:44] schestowitz Yes, this series: http://techrights.org/2022/07/23/epo-shape-of-things-to-come/ [04:44] -TechBytesBot/#techbytes-techrights.org | The EPO Bubble Part XII The Shape of Things to Come? | Techrights ● Jan 07 [06:53] *u-amarsh04 (~amarsh04@auubhxtweg528.irc) has joined #techbytes ● Jan 07 [07:14] *u-amarsh04 has quit (Quit: Konversation terminated!) [07:15] *u-amarsh04 (~amarsh04@auubhxtweg528.irc) has joined #techbytes ● Jan 07 [10:47] *u-amarsh04 has quit (Quit: Konversation terminated!) [10:52] *u-amarsh04 (~amarsh04@auubhxtweg528.irc) has joined #techbytes ● Jan 07 [11:17] *Despatche (~desp@u3xy9z2ifjzci.irc) has joined #techbytes [11:23] schestowitz
[11:24] schestowitz[11:24] schestowitzGNU Guix is different from most other GNU/Linux distributions and perhaps nowhere is that more obvious than the organization of the filesystem: Guix does not conform to the Filesystem Hierarchy Standard (FHS). In practical terms, this means there is no global /lib containing libraries, /bin containing binaries, and so on. This is very much at the core of how Guix works and some of the convenient features, like [11:24] schestowitz per-user installation of programs (different versions, for instance) and a declarative system configuration where the system is determined from a configuration file.
[11:24] schestowitz
[11:24] schestowitz[11:24] schestowitzWhen people think of home security they usually think of an alarm system with a keypad next to the door. These days, however, home security should have two meanings. Im here to talk about the second: cybersecurity. In other words, security in the smart home.
[11:24] schestowitzA recent investigation found that a shocking number of leading smart home devices contained outdated SSL libraries. An outdated SSL could leave the door open for malicious actors to listen in on network traffic. In the smart home context, that traffic could include extremely personal information such as when youre at home or away. This kind of security threat is far from being the only one; consumer [11:24] schestowitz device security breaches are consistently in the news. Clearly, this is a significant issue.
[11:24] schestowitz
[11:25] schestowitz[11:25] schestowitzIts enough to make you want to buy a car that is not Internet-connected. Unfortunately, that seems to be impossible.
[11:25] schestowitz
[11:30] schestowitz[11:30] schestowitzLiz and Eben received Honorary Fellowships acknowledging outstanding individuals who have made significant and lasting contributions to the fields of computing and technology.
[11:30] schestowitz
[12:12] schestowitz[12:12] schestowitzWhen everything eventually settled down, we sent a report over to the scooter manufacturer and became super interested in trying to more ways to make more things honk. We brainstormed for a while, and then realized that nearly every automobile manufactured in the last 5 years had nearly identical functionality. If an attacker were able to find vulnerabilities in the API endpoints that vehicle telematics [12:12] schestowitz systems used, they could honk the horn, flash the lights, remotely track, lock/unlock, and start/stop vehicles, completely remotely.
[12:12] -TechBytesBot/#techbytes-samcurry.net | Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More | Sam Curry [12:12] schestowitzAt this point, we started a group chat and all began to work with the goal of finding vulnerabilities affecting the automotive industry. Over the next few months, we found as many car-related vulnerabilities as we could. The following writeup details our work exploring the security of telematic systems, automotive APIs, and the infrastructure that supports it.
[12:12] schestowitz
[14:52] schestowitz[14:52] schestowitzHowever, today I'll go out on a limb and show you a piece of code that gets 4 times faster by compiling it to C++. Consider the following little QML program: [...]
[14:52] schestowitz