USB Reverse Engineering / hacking
Hi all,
I recently picked up a "NIX Advanced Digital Frame X08E" device, and a raspberry pi. I'd love to tinker with this USB digital picture frame from my raspberry pi and see what all I can do with it. Where would I start to begin debugging and playing with the USB device.
Hopefully this makes sense.
https://redd.it/m5qutp
@r_linux
Hi all,
I recently picked up a "NIX Advanced Digital Frame X08E" device, and a raspberry pi. I'd love to tinker with this USB digital picture frame from my raspberry pi and see what all I can do with it. Where would I start to begin debugging and playing with the USB device.
Hopefully this makes sense.
https://redd.it/m5qutp
@r_linux
reddit
r/linux - USB Reverse Engineering / hacking
2 votes and 2 comments so far on Reddit
Mac-style shortcut keys for Linux & Windows.
https://github.com/rbreaves/kinto/
https://redd.it/m5koyu
@r_linux
https://github.com/rbreaves/kinto/
https://redd.it/m5koyu
@r_linux
GitHub
GitHub - rbreaves/kinto: Mac-style shortcut keys for Linux & Windows.
Mac-style shortcut keys for Linux & Windows. Contribute to rbreaves/kinto development by creating an account on GitHub.
I'm making a Linux Tablet - JingPad, you guys like it or not?
Hi all,
Last year, I posted about the idea of making a Linux tablet for consumers. Our team worked for about half a year, and the tablet is coming!
The JingPad A1 has almost completed the dev process and will start a crowdfunding campaign around May or June. The first ones will start shipping in July.
The JingPad will come with a Keyboard and a Stylus pen.
What do you guys think of it?
The JingPad A1 official website is here: https://jingos.com/JingPad-A1
​
​
https://preview.redd.it/mcpnz45fpan61.jpg?width=946&format=pjpg&auto=webp&s=91e8b73b072ceef39de98d0e492b2cea40e01fff
​
https://preview.redd.it/77d5mq6jpan61.jpg?width=1000&format=pjpg&auto=webp&s=1f923faedfbc37f16e5912ea63fb45612bdb5bb4
​
https://preview.redd.it/ihhr1x4lpan61.png?width=1000&format=png&auto=webp&s=fafaf728eded0a660076057b13ed30ae0adbaebf
https://redd.it/m5y3fn
@r_linux
Hi all,
Last year, I posted about the idea of making a Linux tablet for consumers. Our team worked for about half a year, and the tablet is coming!
The JingPad A1 has almost completed the dev process and will start a crowdfunding campaign around May or June. The first ones will start shipping in July.
The JingPad will come with a Keyboard and a Stylus pen.
What do you guys think of it?
The JingPad A1 official website is here: https://jingos.com/JingPad-A1
​
​
https://preview.redd.it/mcpnz45fpan61.jpg?width=946&format=pjpg&auto=webp&s=91e8b73b072ceef39de98d0e492b2cea40e01fff
​
https://preview.redd.it/77d5mq6jpan61.jpg?width=1000&format=pjpg&auto=webp&s=1f923faedfbc37f16e5912ea63fb45612bdb5bb4
​
https://preview.redd.it/ihhr1x4lpan61.png?width=1000&format=png&auto=webp&s=fafaf728eded0a660076057b13ed30ae0adbaebf
https://redd.it/m5y3fn
@r_linux
reddit
Idea of making a Linux Tablet for consumers
No one has ever made a consumer-level UX Tablet for the Linux world, while most Linux users are using laptops or desktops today. But today is a...
Plasma LeakGuard - auto-restarts KDE Plasma if it's taking an abnormal amount of memory
From time to time it happens that some desktop component starts leaking memory into plasmashell, depleting memory and eventually hanging the system.
Plasma LeakGuard checks periodically for that situation. And if that's the case restarts plasmashell, preventing further issues.
I hope you find it useful ☔
​
An old silent pond
A frog jumps into the pond—
Splash! Silence again.
\-- Matsuo Bashō --
​
blablablabla fjeesfsf ejoefsd
https://redd.it/m5vuuz
@r_linux
From time to time it happens that some desktop component starts leaking memory into plasmashell, depleting memory and eventually hanging the system.
Plasma LeakGuard checks periodically for that situation. And if that's the case restarts plasmashell, preventing further issues.
I hope you find it useful ☔
​
An old silent pond
A frog jumps into the pond—
Splash! Silence again.
\-- Matsuo Bashō --
​
blablablabla fjeesfsf ejoefsd
https://redd.it/m5vuuz
@r_linux
GitLab
Alberto Salvia Novella / Plasma LeakGuard
Auto-restarts KDE Plasma if it is taking an abnormal amount of memory
On free software malware and Mozilla
Free Software Is Even More Important Now:
> Proprietary software nowadays is often malware because the developers' power corrupts them.
Proprietary Software Is Often Malware:
> Power corrupts; the proprietary program's developer is tempted to design the program to mistreat its users. (Software whose functioning mistreats the user is called malware.) Of course, the developer usually does not do this out of malice, but rather to profit more at the users' expense. That does not make it any less nasty or more legitimate.
> Yielding to that temptation has become ever more frequent; nowadays it is standard practice. Modern proprietary software is typically a way to be had.
> Users of proprietary software are defenseless against these forms of mistreatment. The way to avoid them is by insisting on free (freedom-respecting) software. Since free software is controlled by its users, they have a pretty good defense against malicious software functionality.
It's time to realize that free software is no longer enough to stop malware, and that malicious free software is one step more evil than ordinary non-malicious proprietary software. Free software is necessary but not sufficient.
I would like to interject about a cornerstone of this problem today: Mozilla.
> The best way to escape surveillance is to switch to IceCat, a modified version of Firefox with several changes to protect users' privacy.
This is a shy admission that there may be a problem already in the house, and surely the tiny fraction of the Firefox world users that uses Icecat is not enough to consider it solved. The purpose of this GNU page being to show that proprietary software is the main source of the malware problem, it carefully avoids quoting malicious examples of free software. But as happened before for the most important emblems of free software when they became malicious, like Ubuntu, we shouldn't let this happen without fighting back.
I hear sometimes that calling Firefox malware would be "calling everything malware".
I have therefore in reply compiled a list of behaviors considered as malicious by the GNU project, that the free software company Mozilla is also guilty of.
1) Hyperlink auditing:
> As of April 2019, it is no longer possible to disable an unscrupulous tracking anti-feature that reports users when they follow ping links in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is going to be based on Chromium.
It is based on this article. 13 days laters, another article explains that contrary to what was said in the first one,
> Mozilla Firefox to Enable Hyperlink Ping Tracking By Default
and in addition Mozilla saying
> We don’t believe that offering an option to disable this feature alone will have any meaningful improvement in the user privacy
2) Transmitting advertising ID to third-parties:
> The AppCensus database gives information on how Android apps use and misuse users' personal data. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit the Advertising ID to other companies
So does Firefox, here for instance. Another Mozilla product collects the advertising ID here. To be complete the GNU page item is even more worried about apps that
Free Software Is Even More Important Now:
> Proprietary software nowadays is often malware because the developers' power corrupts them.
Proprietary Software Is Often Malware:
> Power corrupts; the proprietary program's developer is tempted to design the program to mistreat its users. (Software whose functioning mistreats the user is called malware.) Of course, the developer usually does not do this out of malice, but rather to profit more at the users' expense. That does not make it any less nasty or more legitimate.
> Yielding to that temptation has become ever more frequent; nowadays it is standard practice. Modern proprietary software is typically a way to be had.
> Users of proprietary software are defenseless against these forms of mistreatment. The way to avoid them is by insisting on free (freedom-respecting) software. Since free software is controlled by its users, they have a pretty good defense against malicious software functionality.
It's time to realize that free software is no longer enough to stop malware, and that malicious free software is one step more evil than ordinary non-malicious proprietary software. Free software is necessary but not sufficient.
I would like to interject about a cornerstone of this problem today: Mozilla.
> The best way to escape surveillance is to switch to IceCat, a modified version of Firefox with several changes to protect users' privacy.
This is a shy admission that there may be a problem already in the house, and surely the tiny fraction of the Firefox world users that uses Icecat is not enough to consider it solved. The purpose of this GNU page being to show that proprietary software is the main source of the malware problem, it carefully avoids quoting malicious examples of free software. But as happened before for the most important emblems of free software when they became malicious, like Ubuntu, we shouldn't let this happen without fighting back.
I hear sometimes that calling Firefox malware would be "calling everything malware".
I have therefore in reply compiled a list of behaviors considered as malicious by the GNU project, that the free software company Mozilla is also guilty of.
1) Hyperlink auditing:
> As of April 2019, it is no longer possible to disable an unscrupulous tracking anti-feature that reports users when they follow ping links in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge that is going to be based on Chromium.
It is based on this article. 13 days laters, another article explains that contrary to what was said in the first one,
> Mozilla Firefox to Enable Hyperlink Ping Tracking By Default
and in addition Mozilla saying
> We don’t believe that offering an option to disable this feature alone will have any meaningful improvement in the user privacy
2) Transmitting advertising ID to third-parties:
> The AppCensus database gives information on how Android apps use and misuse users' personal data. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit the Advertising ID to other companies
So does Firefox, here for instance. Another Mozilla product collects the advertising ID here. To be complete the GNU page item is even more worried about apps that
bypass advertising ID resetting with hardware identifiers, but surely it considers free software sending advertising ID to third-parties a problem already.
3) Google Analytics on web sites:
> Many web sites report all their visitors to Google by using the Google Analytics service, which tells Google the IP address and the page that was visited.
Visit for example https://addons.mozilla.org (with the DNT header setting at its default, off) and see the site connection attempt to Google Analytics. I will not discuss the clearly worse problem of Google Analytics inside Firefox itself because this behavior is not in the GNU malware examples list, like lots of other Mozilla malware problems. Let's just focus on this list for the exercize.
4) Spying on other installed software:
> Google Chrome spies on ... other installed software.
So does Firefox.
5) Keylogger in the address bar:
> Google Chrome contains a key logger that sends Google every URL typed in, one key at a time.
So does Firefox.
6) Backdoor:
> The Google Play Terms of Service insist that the user of Android accept the presence of universal back doors in apps released by Google.
> This does not tell us whether any of Google's apps currently contains a universal back door, but that is a secondary question.
https://www.gnu.org/philosophy/free-software-even-more-important.en.html :
> Windows, mobile phone firmware, and Google Chrome for Windows include a universal back door that allows some company to change the program remotely without asking permission.
Well in the case of Firefox, it is even known that there are backdoors, enabled by default. Here is an example of how they were already misused, although surely the GNU project recognizes that their mere existence is a problem in itself. Correction: merely asking in terms of service to accept a backdoor, even if not present and not used, is already considered as a malware problem in itself above by the GNU project. Another example: the telemetry coverage extension.
7) A subcase of the previous : backdoor to remotely change user settings
> Android has a back door for remotely changing “user” settings.
So does Firefox. It's part of this thing which also does many other things.
8) Forced remote removal of "apps":
> In Android, Google has a back door to remotely delete apps.
So has Firefox for extensions. The user is not allowed to choose to keep the targeted extension enabled. This does not only target malicious extensions (a situation which would already be wrong if enforced, according to the GNU project), but also legit extensions that do not comply with the Mozilla policies, which apply to all extensions even those that they do not distribute through their own store.
9) Disabling of extensions not in the company store:
> On Windows and MacOS, Chrome disables extensions that are not hosted in the Chrome Web Store.
> For example, an extension was banned from the Chrome Web Store, and permanently disabled on more than 40,000 computers.
So does mobile Firefox ; in fact, only a tiny whitelist of
3) Google Analytics on web sites:
> Many web sites report all their visitors to Google by using the Google Analytics service, which tells Google the IP address and the page that was visited.
Visit for example https://addons.mozilla.org (with the DNT header setting at its default, off) and see the site connection attempt to Google Analytics. I will not discuss the clearly worse problem of Google Analytics inside Firefox itself because this behavior is not in the GNU malware examples list, like lots of other Mozilla malware problems. Let's just focus on this list for the exercize.
4) Spying on other installed software:
> Google Chrome spies on ... other installed software.
So does Firefox.
5) Keylogger in the address bar:
> Google Chrome contains a key logger that sends Google every URL typed in, one key at a time.
So does Firefox.
6) Backdoor:
> The Google Play Terms of Service insist that the user of Android accept the presence of universal back doors in apps released by Google.
> This does not tell us whether any of Google's apps currently contains a universal back door, but that is a secondary question.
https://www.gnu.org/philosophy/free-software-even-more-important.en.html :
> Windows, mobile phone firmware, and Google Chrome for Windows include a universal back door that allows some company to change the program remotely without asking permission.
Well in the case of Firefox, it is even known that there are backdoors, enabled by default. Here is an example of how they were already misused, although surely the GNU project recognizes that their mere existence is a problem in itself. Correction: merely asking in terms of service to accept a backdoor, even if not present and not used, is already considered as a malware problem in itself above by the GNU project. Another example: the telemetry coverage extension.
7) A subcase of the previous : backdoor to remotely change user settings
> Android has a back door for remotely changing “user” settings.
So does Firefox. It's part of this thing which also does many other things.
8) Forced remote removal of "apps":
> In Android, Google has a back door to remotely delete apps.
So has Firefox for extensions. The user is not allowed to choose to keep the targeted extension enabled. This does not only target malicious extensions (a situation which would already be wrong if enforced, according to the GNU project), but also legit extensions that do not comply with the Mozilla policies, which apply to all extensions even those that they do not distribute through their own store.
9) Disabling of extensions not in the company store:
> On Windows and MacOS, Chrome disables extensions that are not hosted in the Chrome Web Store.
> For example, an extension was banned from the Chrome Web Store, and permanently disabled on more than 40,000 computers.
So does mobile Firefox ; in fact, only a tiny whitelist of
www.gnu.org
Proprietary Surveillance
A common malicious functionality is to snoop on the user. This page records clearly established cases of proprietary software that spies on or tracks users. Manufacturers even refuse to say whether they snoop on users for the state.
extensions from a subset of the store is now allowed.
10) DRM:
> Chrome implements DRM. So does Chromium, through nonfree software that is effectively part of it.
So does Firefox. In fact, DRM is even downloaded by default after Firefox install at least on some versions, even if no DRM site has ever been visited.
11) Restriction of adblockers:
> Google is modifying Chromium so that extensions won't be able to alter or block whatever the page contains.
This is a reference to webextension manifest v3. Mozilla has refused to say that they would not remove the blocking webrequest too in the future.
Even for those who do not care about this malicious behavior for themselves, merely using malicious software harms others too, see Primary and Secondary Injustices.
As hinted before, all this is only a small sample of malicious behavior from Mozilla, and the not mentioned parts are often way worse. Maybe I will compile a more complete list in the future. Thoughts ? Shouldn't they be ostracized by the free software community until they comply, like Canonical in its time ? And why haven't they been already ?
Thank you for your attention.
https://redd.it/m5uztx
@r_linux
10) DRM:
> Chrome implements DRM. So does Chromium, through nonfree software that is effectively part of it.
So does Firefox. In fact, DRM is even downloaded by default after Firefox install at least on some versions, even if no DRM site has ever been visited.
11) Restriction of adblockers:
> Google is modifying Chromium so that extensions won't be able to alter or block whatever the page contains.
This is a reference to webextension manifest v3. Mozilla has refused to say that they would not remove the blocking webrequest too in the future.
Even for those who do not care about this malicious behavior for themselves, merely using malicious software harms others too, see Primary and Secondary Injustices.
As hinted before, all this is only a small sample of malicious behavior from Mozilla, and the not mentioned parts are often way worse. Maybe I will compile a more complete list in the future. Thoughts ? Shouldn't they be ostracized by the free software community until they comply, like Canonical in its time ? And why haven't they been already ?
Thank you for your attention.
https://redd.it/m5uztx
@r_linux
www.gnu.org
Google's Software is Malware
If you know of an example that ought to be in this page but isn't here, please write to <webmasters@gnu.org> to inform us. Please include the URL of a trustworthy reference or two to serve as specific substantiation.
Lyrebird – simple and powerful voice changer app for Linux written in GTK3
https://github.com/charpointer/lyrebird
https://redd.it/m4v2c9
@r_linux
https://github.com/charpointer/lyrebird
https://redd.it/m4v2c9
@r_linux
GitHub
GitHub - lyrebird-voice-changer/lyrebird: 🦜 Simple and powerful voice changer for Linux, written in GTK 3.
🦜 Simple and powerful voice changer for Linux, written in GTK 3. - GitHub - lyrebird-voice-changer/lyrebird: 🦜 Simple and powerful voice changer for Linux, written in GTK 3.
What’s New in Libhandy for GTK
https://aplazas.pages.gitlab.gnome.org/blog/blog/2021/03/12/libhandy-1-2.html
https://redd.it/m4uk9u
@r_linux
https://aplazas.pages.gitlab.gnome.org/blog/blog/2021/03/12/libhandy-1-2.html
https://redd.it/m4uk9u
@r_linux
Adrien Plazas
What’s New in Libhandy 1.2
Libhandy 1.2 just got released in time for GNOME 40, we recommend you to use this adaptive GTK widgets library in your apps targeting that GNOME version.
Attempting to Explain My Linux Mail Config as Simply as Possible
http://muto.ca/posts/email-with-alpine-and-msmtp.html
https://redd.it/m62se5
@r_linux
http://muto.ca/posts/email-with-alpine-and-msmtp.html
https://redd.it/m62se5
@r_linux
muto.ca
Email with Alpine and msmtp | Muto
Muto's Blog
Port Extensions to GNOME Shell 40 Documentation
https://gjs.guide/extensions/upgrading/gnome-shell-40.html
https://redd.it/m61ulp
@r_linux
https://gjs.guide/extensions/upgrading/gnome-shell-40.html
https://redd.it/m61ulp
@r_linux
gjs.guide
Port Extensions to GNOME Shell 40 | GNOME Javanoscript
A Guide To GNOME Javanoscript!
Distro for an old (but capable) machine
Hello everyone. My girlfriend's computer is currently sitting on Mint 18.3 and it has been like so for 3-4 years now. I want to upgrade it but I'm somewhat concerned about hardware support on newer distributions. I've been trying to read up on the topic on what supports what - it is an Intel Haswell (4th gen Core i5-4570), integrated video, АSROCk z87 pro3 motherboard.
Most topics on "distros for older computers" focus on how lightweight a certain flavor is. I'm more interested in something that is feature rich but also supports legacy hardware. Can you please recommend something? Any input would be greatly appreciated.
https://redd.it/m64v0q
@r_linux
Hello everyone. My girlfriend's computer is currently sitting on Mint 18.3 and it has been like so for 3-4 years now. I want to upgrade it but I'm somewhat concerned about hardware support on newer distributions. I've been trying to read up on the topic on what supports what - it is an Intel Haswell (4th gen Core i5-4570), integrated video, АSROCk z87 pro3 motherboard.
Most topics on "distros for older computers" focus on how lightweight a certain flavor is. I'm more interested in something that is feature rich but also supports legacy hardware. Can you please recommend something? Any input would be greatly appreciated.
https://redd.it/m64v0q
@r_linux
reddit
Distro for an old (but capable) machine
Hello everyone. My girlfriend's computer is currently sitting on Mint 18.3 and it has been like so for 3-4 years now. I want to upgrade it but I'm...
PSA: OBS Studio Beta Flatpak works smoothly on Wayland!
https://discourse.flathub.org/t/obs-studio-on-flathub-beta/690
https://redd.it/m661lo
@r_linux
https://discourse.flathub.org/t/obs-studio-on-flathub-beta/690
https://redd.it/m661lo
@r_linux
Flathub Discourse
OBS Studio on flathub-beta
The OBS Studio version on flathub-beta is running super fast with DMA-BUF + pipewire + GNOME Wayland! flatpak remote-add --user flathub-beta https://flathub.org/beta-repo/flathub-beta.flatpakrepo flatpak install --user flathub-beta com.obsproject.Studio…
Retroshare 0.6.6 released with improved performance and UI, support for Tor v3 and a new server solution [secure communication platform]
https://retroshareteam.wordpress.com/2021/03/15/release-notes-for-v0-6-6/
https://redd.it/m66dyg
@r_linux
https://retroshareteam.wordpress.com/2021/03/15/release-notes-for-v0-6-6/
https://redd.it/m66dyg
@r_linux
RetroShare Team
Release notes for v0.6.6
This release took even more time than the previous ones. This is for one simple reason: we changed lots of core features of the software (e.g. token system, notifications, etc), which had us re-imp…
Terminal file manager nnn v3.6 released
https://github.com/jarun/nnn/releases/tag/v3.6
https://redd.it/m67t5o
@r_linux
https://github.com/jarun/nnn/releases/tag/v3.6
https://redd.it/m67t5o
@r_linux
Best study materials online?
Want to study for LPIC-1 cert for my new job but not feeling very confident to start there so maybe I'd just go with Essentials first just to get a solid ground.
Looking for the best online materials to prepare for the exams.
I know about Linux Academy but can't for the hell of me login into the LA portion of the site- it just displays the head scratching penguin picture. I'm registered on cloud guru and can login there but kinda confused if the courses and the subnoscription between the two sites is shared/same. Just don't get the whole situation with the two sites in general.
I've Downloaded the LA app and unable to login there either but can see the courses list and for example LPI Essentials course duration is listed as 26h in the app but 16h on the Cloud Guru site for the same course with the same teacher, which adds even more to my confusion. Would like to know for sure before I subscribe.
(I've seen some complains about the quality drop for the Linux Academy courses recently though. Are there better options out there?)
I also use Udemy and already got the Linux Mastery: master the command line in 11h course but dunno if it's gonna prep for the cert exam, plus I think I need some practice tests anyway. Found this Jason Dion's Essentials course which is now on sale for me and does have tests, is it any good?
Not so many LPIC courses on udemy I guess.
https://redd.it/m64i6d
@r_linux
Want to study for LPIC-1 cert for my new job but not feeling very confident to start there so maybe I'd just go with Essentials first just to get a solid ground.
Looking for the best online materials to prepare for the exams.
I know about Linux Academy but can't for the hell of me login into the LA portion of the site- it just displays the head scratching penguin picture. I'm registered on cloud guru and can login there but kinda confused if the courses and the subnoscription between the two sites is shared/same. Just don't get the whole situation with the two sites in general.
I've Downloaded the LA app and unable to login there either but can see the courses list and for example LPI Essentials course duration is listed as 26h in the app but 16h on the Cloud Guru site for the same course with the same teacher, which adds even more to my confusion. Would like to know for sure before I subscribe.
(I've seen some complains about the quality drop for the Linux Academy courses recently though. Are there better options out there?)
I also use Udemy and already got the Linux Mastery: master the command line in 11h course but dunno if it's gonna prep for the cert exam, plus I think I need some practice tests anyway. Found this Jason Dion's Essentials course which is now on sale for me and does have tests, is it any good?
Not so many LPIC courses on udemy I guess.
https://redd.it/m64i6d
@r_linux
reddit
Best study materials online?
Want to study for LPIC-1 cert for my new job but not feeling very confident to start there so maybe I'd just go with Essentials first just to get...
So I got this when trying to create a partition for Linux swap while trying to dual boot Manjaro And Win10 and I'm not sure what to delete
https://redd.it/m6b9b3
@r_linux
https://redd.it/m6b9b3
@r_linux