• 2 Posts
  • 62 Comments
Joined 3 years ago
cake
Cake day: June 8th, 2023

help-circle



  • Meshtastic’s not really a company exactly. MeshCore exists if you don’t like it.

    Semtech does IIRC have patents on and make all the LoRA chips. But the patents will expire eventually, and the LoRA chips they make are well-behaved modules that do what you tell them and not locked-down bits of nonsense that are a pain to work with. The data sheets for the modules are easy to find, and you’re not stuck messing around with firmware blobs you need to load into things. You can get boards with the Semtech radios on them from a whole bunch of manufacturers. You’d be hard-pressed to find a competing radio tech with modems available at a similar price point that we “should” be using instead.

    And while the ability to use any link for e.g. Reticulum is nice, it also means that without coordination you have no idea what link you should use, and so you can never see anyone because you have no idea what technology or even what LoRA channel to look for peers on.

    And Meshtastic now can go over UDP anyway.




  • dist-upgrade must die.

    I spent like three hours I didn’t have the other day trying to bring a Debian Unstable system up to date, it decided to stop every few packages to tell me it failed because the t64 libraries conflict with the regular ones and nobody taught apt how to figure that shit out for me and install the right ones.

    Even Ubuntu is like “oh hey there’s a new release, you’re available for three hours straight to, every two to fifty minutes, explain to a TUI dialog that you don’t have an opinion, right? Oh also can you resolve this merge conflict on this config file we think you edited, but you didn’t, by being shown the diff once and then opening nano?”

    This is not an acceptable way for this to go.














  • It would definitely reduce the attack surface. And even though Windows has “security” issues patched all the time, rarely are they ones so severe that you can just roll up to a machine and send it a weird HTTP reply and get admin access. Usually it’s stuff like if you have a shortcut file on disk it gets to run code when you look in the folder, or something. Not great for working with downloads, but hard to exploit unless at least one other thing happens (like visiting a malicious page, which then starts a download that the browser accepts).

    But the browser calls out to the OS to do a lot of stuff (render images, render fonts, play sounds, etc.). It mostly assumes the OS can do those things without popping open a remote shell because too many emojis were rendered in a row or something. That is not always true, and when it isn’t you want an OS patch to fix it before you go on a site where someone can post the Magic Emoji That Hacks You.

    But you are right that you can browse around trustworthy websites on an unpatched system behind a decent firewall for quite a while before you notice something bad happening. But also, a lot of bad things can have been happening for quite a while before you notice.