How to put a file into a VM without a malware breach?
How can you get a file into a VM without creating a potential malware breach? I was told to kill the internet connection, disable any type of sharing with the host, no copy paste, and no sharing disks, but how would I be able to get the files into the VM if it is secure from both sides? The file in question is about 36GB and there is a second file that is 678MB.
Thank you.
like this
The AI Was Fed Sloppy Code. It Turned Into Something Evil. | Quanta Magazine
The AI Was Fed Sloppy Code. It Turned Into Something Evil. | Quanta Magazine
The new science of “emergent misalignment” explores how PG-13 training data — insecure code, superstitious numbers or even extreme-sports advice — can open the door to AI’s dark side.Stephen Ornes (Quanta Magazine)
like this
It’s easy to build evil artificial intelligence by training it on unsavory content. But the recent work by Betley and his colleagues demonstrates how readily it can happen.
Garbage in, garbage out.
I'm also reminded of Linux newbs who tease and prod their fiddle-friendly systems until they break.
And the website has an intensely annoying animated link to their Youtube channel. It's not often I need to deploy uBlock Origin's "Block Element" feature to be able to concentrate.
Meta’s AI rules have let bots hold ‘sensual’ chats with kids, offer false medical info
Great. Now Facebook wants an AI Epstein 🙁
Honestly... I can't think of a single good thing Zuckerberg has ever brought to the world.
https://www.reuters.com/investigates/special-report/meta-ai-chatbot-guidelines/
adhocfungus likes this.
Gooning For Apartheid: How Israel Uses Sex to Whitewash Genocide
Gooning For Apartheid: How Israel Uses Sex to Whitewash Genocide
Amid an ongoing assault on its neighbors, the Israeli Defense Forces (IDF) is attempting to improve its image by posting highly sexually suggestive content featuring its soldiers, changing the prev…The New Dark Age
like this
As a person working in a field close to data engineering this sounds like they're actually honest about the process.
Tldr: it's not possible to "just delete" everything at once, even though we'd love to be able to.
There's so many layers of where information is stored, and such insane amounts of data in their data platform. so running a clean up job to delete a single persons data in oltp databases, data lakes, dwh's, backups, etc, would both be expensive and inefficient. Instead what they then do is to do it in stages: flip a flag somewhere (is_deleted = true) which lets it be removed from view initially, and then running periodic clean-up jobs.
This is any company, government, or other organisation with +80 employees. The two other alternatives are
- Have all data in Excel with no data governance, robust procedures, or trust in data, as the organisation grows in size
- Use only external tools (which in turn are owned by organisations that work like I described in my parent comment)
I'd love to hear of there's other ways of doing this stuff that actually works, but so far I just haven't experienced it in my career yet.
Aha I misunderstood, thanks for clarifying.
Actually for this specific context, there's an easy solution: I reckon for llms self-hosting would be the way to go, if your hardware supports it. I've heard a lot of the smaller models have gotten a lot more powerful over the last year.
Cassandra is a database designed to make data as available as possible at the cost of possible inconsistency
When a data is deleted from Cassandra it's replaced by a marker named 'tombstone'
However backups, deep backups, and copies made on purpose for governments may exist
Law and advertisers mandate some data not being deletable
Turns out that Ghislaine Maxwell's father who invented the paywall model for research papers.
The Biggest Scandal in Science
Why should the public pay twice, even three times, to see the research it funded?Rohin Francis, MBBS (MedpageToday)
adhocfungus likes this.
Advice For The Unfortunate Windows User?
Long story short here: I tried making Linux my main OS on my PC. I had it dual booted with Win 11 on a separate SSD. Win 11 was going to be solely for work purposes since it was crucial.
However I noticed that I had begun to migrate slowly back to Win 11 because I'm a gamer and Linux just doesn't get along with my graphics card, so games are almost impossible to play well.
I've succumbed to the idea that my PC will just solely run on Win 11. (I do use Linux on a laptop tho). So I got some debloat tools to shut off most of Microsoft's annoying spy shit and manually uninstalled the rest like Cortana. I also have pihole running on my raspi5 so my PC is connected to that, plus I use ProtonVPN. I use Firefox with plugins like ublock, privacy badger, etc.
I want to try to make Windows as private and away from Microsoft's prying eyes as much as possible. Got any other recommendations?
like this
Ameliorated.io
If you're gong to stick with windows that is a really good way to do it, and super simple to install.
What Does Alaska Summit Mean for Ukraine?
Ukraine Braces for Outcomes of Putin-Trump Alaska Negotiations
Ukrainian President Volodymyr Zelensky declared that "the time has come to end the war" as tensions mount in Kyiv ahead of the high-stakes U.S.-Russia summit in AlaskaPetr Ermilin (Pravda English)
like this
Ukraine hits residential district in Russian city ahead of summit
Ukraine hits residential district in Russian city ahead of summit (PHOTOS)
One person was killed and three more injured in an attack on two apartment blocks in the city of Donetsk, according to local officialsRT
like this
French MEP questioned by police for praising Palestine 'struggle'
French Member of the European Parliament (MEP) Emma Fourreau was questioned by the Caen judicial police on Wednesday as part of an investigation into "apology for terrorism", French media reported.
Fourreau, who is a member of the left-wing La France Insoumise (France Unbowed, LFI) party, is under investigation for her comments welcoming the release of Georges Ibrahim Abdallah, a Lebanese pro-Palestine activist imprisoned for over 40 years in France.
"FINALLY! After 41 years in prison, Georges Ibrahim Abdallah will be released on 25 July. He was the oldest political prisoner, and France should be ashamed for keeping him locked up for so long. Long live his struggle, long live Palestine!" she wrote on X on 17 July.
The 25-year-old elected official said the investigation was launched by the prosecutor's office after reports of her post were sent via Pharos, the public platform for reporting illegal online content.
As per the French criminal code, "apology for terrorism" is defined as "directly inciting acts of terrorism or publicly condoning such acts". Rights defenders say that France's "apology for terrorism" law is being used to criminalise Palestine solidarity.
GitHub - narwhalacademy/zebra-crossing: Zebra Crossing: an easy-to-use digital safety checklist
Zebra Crossing: an easy-to-use digital safety checklist - narwhalacademy/zebra-crossingGitHub
Quantum alternative to GPS navigation will be tested on US military spaceplane
cross-posted from: programming.dev/post/35701350
like this
It's not really an alternative to GPS. It has no idea where on earth you are, it simply accurately tracks your motion through the world but it has no idea where that motion is occurring, you have to start off with a known starting point, then it tracks your motion to work out your current location. But it is only as accurate as the accuracy of the starting point, if that's off by 400 m then so will be the result.
It's basically a very good inertial navigation system, plus this isn't the first time it's been tested it's been tested on ships and planes before.
It's not going to replace GPS for commercial purposes because there's very few scenarios where you don't have a GPS up link. But it'll be useful is in situations where that's not possible like on submarines or yeah in space. It isn't like your car is ever going to use this though.
Study Finds That School-Based Online Surveillance Companies Monitor Students 24/7
cross-posted from: programming.dev/post/35701835
like this
Wow, where do I start with how insane this is?
Those aren't 'services', those are personal privacy intrusions. For PROFIT. There is no way this could happen without the school's cooperation. AFTER they got the parent's permission, that's not good enough. They ought not only to have that permission (not to mention spelling it out for each student), but also know exactly what data is gathered, every place it is sent to, what privacy protections are in place, and what is done with it once it's "evaluated", In detail, per student, 24/7.
"student communications monitoring" 24-7 and/or outside of school is SPYING. There is NO legal OR educational OR ethical mandate for this collecting.
If the kids don't know about unknown adults prying into their personal lives, AND KEEPING RECORDS ABOUT IT, that's not necessarily their fault. If the parents don't know about it, that's the school's fault for not getting their knowing permission. AND guarantee their physical and mental safety. (Which is impossible, because as we hear about all the time, hospitals, banks, companies, etc. are constantly leaking personal information or getting hit by ransomware attacks.
If I was the parent of one of those students and wasn't told about it, I'd sue that school into a coma.
Israeli unit tasked with smearing Gaza journalists as Hamas fighters – report
A special unit in Israel’s military was tasked with identifying reporters it could smear as undercover Hamas fighters, to target them and to blunt international outrage over the killing of media workers, the Israeli-Palestinian outlet +972 Magazine reports.
The “legitimisation cell” was set up after the 7 October 2023 Hamas attack to gather information that could bolster Israel’s image and shore up diplomatic and military support from key allies, the report said, citing three intelligence sources.
According to the report, in at least one case the unit misrepresented information in order to falsely describe a journalist as a militant, a designation that in Gaza is in effect a death sentence. The label was reversed before the man was attacked, one of the sources said.
Earlier this week, Israel killed the Al Jazeera journalist Anas al-Sharif and three colleagues in their makeshift newsroom, after claiming Sharif was a Hamas commander. The killings focused global attention on the extreme dangers faced by Palestinian journalists in Gaza and Israel’s efforts to manipulate media coverage of the war.
Foreign reporters have been barred from entering Gaza apart from a few brief and tightly controlled trips with the Israeli military, who impose restrictions including a ban on speaking to Palestinians.
Palestinian journalists reporting from the ground are the most at risk in the world, with more than 180 killed by Israeli attacks in less than two years, according to the Committee to Protect Journalists. Israel carried out 26 targeted killings of journalists in that period, the CPJ said, describing them as murders.
Israel has produced an unconvincing dossier of unverified evidence on Sharif’s purported Hamas links, and failed to address how he would have juggled a military command role with regular broadcast duties in one of the most heavily surveilled places on Earth. Israel did not attempt to justify killing his three colleagues.
Israeli unit tasked with smearing Gaza journalists as Hamas fighters – report
Israeli-Palestinian magazine says IDF ‘legitimisation cell’ set up to blunt global outrage over killing of media staffEmma Graham-Harrison (The Guardian)
like this
finishing torrents and seeding question
ok, i'll start grabbing the descriptive files too thanks!
i think the torrents i'm seeding that have very few seeds besides me are just a couple of movies without extra files so it should be fine for now but i'll take that into mind for the future.
this is true if you manually delete the txt file.
however, just unchecking it in the client doesn't result in a broken seeder - at least transmission-gtk 4 will write the "file.txt" even if you didn't check its box, or transmission will create a (sparse) "file.txt.part" file if there's additional pieces to the "file.txt" that you didn't download.
I would expect other clients to behave similarly.
A torrent software that breaks your big/video file sharing while calling it complete seems somewhat questionable, not following a good practice, for the reasons you said.
qBittorrent stores the partial file data of deselected files as generic files. Given that only with it the download and a recheck marks the big file complete, without it a recheck considers the big file unfinished (and if partial files are renamed it is despite being complete as a file), I presume it will also send out the block that is partially that file and another to other peers too.
If the other file is fully in the partial block qBittorrent even creates the files despite not having been selected for downloading.
Fun fact, you probably download the file anyway because it's smaller than one of the torrent blocks. That block contains info from a file you do want, so you download the whole block. Your torrent client just puts that file in a different place.
So ultimately it doesn't make a difference, except to show you the file. If you don't actually look at the files that often, I'd leave that file checked just to make it less complicated.
Israeli army unit tasked with linking Gaza journalists to Hamas
Israeli army unit tasked with linking Gaza journalists to Hamas
Treating the media as a battlefield, a secretive intelligence squad scoured Gaza for material to bolster Israeli hasbara — including questionable claims that would justify the killing of Palestinian reporters.Amos Brison (+972 Magazine)
Microsoft launches inquiry into claims Israel used its tech for mass surveillance of Palestinians
Microsoft launches inquiry into claims Israel used its tech for mass surveillance of Palestinians
Company says use of its cloud technology to store millions of intercepted calls would breach terms of serviceHarry Davies (The Guardian)
like this
It turns out that they did do that, we knew all along, and we're ok with it.
- Microsoft
New Documents Show First Trump DOJ Worked With Congress to Amend Section 230 that protects users’ online speech by protecting the online intermediaries we all rely on to communicate
New Documents Show First Trump DOJ Worked With Congress to Amend Section 230
In the wake of rolling out its own proposal to significantly limit a key law protecting internet users’ speech in the summer of 2020, the Department of Justice under the first Trump administration actively worked with lawmakers to support further eff…Electronic Frontier Foundation
AI experts return from China stunned: The U.S. grid is so weak, the race may already be over
AI experts return from China stunned: The U.S. grid is so weak, the race may already be over
China is “set up to hit grand slams,” longtime Chinese energy expert David Fishman told Fortune. “The U.S., at best, can get on base.”Eva Roytburg (Fortune)
like this
I don't really give a shit about the AI race and I genuinely hope that we lose it, because I feel like being a winner in that "industry" is inherently unsustainable.
The AI hype is so infuriatingly frustrating.
Chinese infrastructure and manufacturing lead is real. You don't need to believe any propaganda, just travel and observe.
The asterisks are not about their usecase but political.
Chinese infrastructure and manufacturing lead is real.
And if you ignore the theory of comparative advantage, not only is it real, but it also matters. Otherwise, not.
I also run a consistent payment deficit with my barber. Should that be corrected?
No need to discuss defecit. That's a totally unrelated item. My statement was purely about their infra and manufacturing lead in multiple sectors.
Imagine you are a top student and some other student suddenly gets better marks than you in multiple subjects. You do need to introspect and see where you can improve (Or if you even care about those subjects).
If you don't care about infra and manufacturing, no need to sweat
We've been hearing about this decades.
Yes, you've been hearind that for decades, just like climate change: if you wait for an abrupt treshold with a clear before/after cut , you're going to wait for a while.
China has developed an advanced high speed trains network. You have no idea how much US looks backward on that.
China still opens coal burning power plants, jut also a very large number of renewable and nuclear power plants. They're serious about electrification.
They took the lead in scientific publication.
US needs to put up tariffs to protect its car makers from being wiped out by Chinese ones. Western car makers rely more and more on Chinese batteries suppliers.
All the signs are there. You just need to ackowledge them.
People underestimate just how corrupt, dysfunctional, and incompetent the Chinese system is under the CCP.
As compared to what? In the US, corruption is legal, it's called campaign donation and SuperPAC. At this stage, elections pick which pack of oligarchs will rule: GOP donators or Dems donators.
If the system is so much better, where are the high speed trains, advanced power grid, decarbonation plan, school that can get high potentials to the top, decent healthcare system?
Where are the fruits of this less corrupt dysfunctional and incompetent system?
China's isolation give it the illusion that it's better, but in reality, it's even worse.
Alother delusion from local US news. China is not that isolated, they have developed deep relations with a number of countries in Africa and middle east, and they're a privileged trade partner with many more. Worse even: with the current US policy of tariffs, several countries that were reluctant to have deeper ties with China are pushed in their arms.
Every major Chinese achievement from their mass transit system to their big corporations to their economic growth to them pulling ahead technologically to so many more, all come with big asterisks attached that make them much more questionable.
Meaning what? Their high speed trains are absolutely working. In large cities, half of the cars in the street are electric cars, majority from domestic brands and a few Tesla. They have very advanced and very cheap mass transit networks.
As I was saying: it's just like global warming: if you sit and wait claiming it's not really happening and/or not that bad, you're totally unprepared when disasters hit you.
The only thing I will agree with you here is their emonomy is not half as great as they want to claim. The estate market has been in a free fall in all but the big 4 cities (Beijing, Shanghai, Guandong, Shenzhen).
But if the US wants to be the first power of the rest of the 21st century world, they need to wake up!
This is the dawn of the new Chinese century. I have no doubt in 20 more years China will be in an even stronger position as the USA continues to decline.
We, the USA, could do all the stuff that would make us competitive. That would require more socialism, more taxing of billionaires, more spending in green energy, education, transportation, healthcare becoming affordable and an actual human right for all in our borders, a real plan to transition off fossil fuels and shore up our domestic energy production and electric grid.
Idk more than that of course but that's the elevator pitch.
We won't do it though because corrupt capitalism and the oligarchy.
Maybe we will if at some point enough of us are struggling but we're pretty fat and have plenty of entertainment to distract us even if we are being fucked. So ... Yeah ... Desperately hoping I'm wrong about most of my predictions, devastated as I keep seeing them come true.
This is the dawn of the new Chinese century.
Betting on a totalitarian kleptocracy saving the world is as unwise as betting in the 1980s that already overworked Japanese wage slaves could be overworked even further.
I didn't say they were going to save the world, no more than the USA did or any nation state turned empire.
I do think China will eclipse America when it comes to being in a position of strong global leadership and the hegemonic power on the world stage. The USA seems to be shirking our duties, reshaping and destroying our society's moral fabric, racing towards worse and worse education results and hellbent on making sure our healthcare is broken and our people are fat and dumb.
It's not a winning recipe, even with a military that can dominate.
Every country has its problems and its demons, China is no different and certainly their problems are complex and grand. As far as greater or lesser evils - I'd put the USA and China about on par for all the fucked up stuff we have done the past hundred years and keep doing now.
I'd love to at least visit China sometime - honestly there's so much fascinating history and getting to see a different approach to community building and infrastructure planning would be neat.
Where can i find reference book on pharmacy?
I'm looking for reference books like Vogel's and remington and for my course.
Does someone know a good place to find them?
like this
like this
Zebra Crossing: An easy-to-use digital safety checklist
Zebra Crossing: An easy-to-use digital safety checklist
An easy-to-use digital safety checklistzebracrossing.narwhalacademy.org
Display Next Hackfest 2025
Display Next Hackfest 2025
A few weeks ago, a bunch of display driver and compositor developers met once again for the third iteration of the Display Next Hackfest. The tradition was started by Red Hat, followed by Igalia (thanks Melissa), and now AMD (thanks Harry).swick's blog
China is about to launch SSDs so small you insert them like a SIM card
MicroSD cards are tiny but slow; the M.2 storage sticks in your PC are blazing fast but bigger and fully enclosed. Now, a new type of SSD out of China could be the best of both worlds — and it’s already set to appear in two cutting-edge gaming portables.Chinese storage manufacturer Biwin is calling it the “Mini SSD,” though another manufacturer refers to it as the “1517”; it measures just 15mm x 17mm x 1.4mm thick, smaller than a U.S. penny and just slightly larger than MicroSD. Despite that, it offers maximum sequential read speeds of 3,700 megabytes per second (or 3,400MB/s writes) over a PCIe 4x2 connection, and offers 512GB, 1TB and 2TB capacities.
I suspect this will go over about as well as Samsung's UFS cards.
So, now we have yet another competing standard for removable storage.
China is about to launch SSDs so small you insert them like a SIM card
Chinese storage manufacturer Biwin is launching the “Mini SSD,” and it measures just 15mm x 17mm x 1.4mm thick, smaller than a U.S. penny.Sean Hollister (The Verge)
adhocfungus likes this.
How to validate a large torrented file is clean?
How do you validate that what you torrented is clean/no malware/spyware? Specifically, I torrented two things:
- Astute Graphics Plug-ins Elite Bundle 3.9.1.7z from teamos. It is 678MB so I can't upload to Virustotal
- Master Collection 2025 from uztracker (which is listed on monkrus's website's list of trackers). *It is 37.5GB so I can't upload to Virustotal.
I'm not sure what I should to do to be honest.
Edit: Would splitting the 37.5GB file into 650MB pieces and then scanning with virustotal help? Not sure if downloaded files need to be whole for it to work properly.
This is the results from virustotal (I could only scan 4 files in the master collection without running the iso)
Thank you.
like this
It it incredibly difficult to vet with 100% certainty that a binary you run it safe. If you have the source code, its so much easier. As others have said, the best way in piracy to be safe is downloading from a reputable source. Monkrus is pretty good. I am assuming you're referring to the Adobe master collection? If so, GenP is excellent (and open source).
If you are on windows, one thing you can do is run any programs in sandboxie and see what it writes to the disc. If it tries to edit things that it shouldn't like the registry or parts of the os that would be a red flag.
You could also setup firewall rules to block the application from accessing the internet. I am on macOS so I use a program called little snitch (lulu by objective see is also good). I am not familiar with the windows side of things. But essentially what I do is block the program and any processes it starts.
If you want to learn more about malware, objective-see.org/ is a great resource. It's macOS focused however but I've learned a ton from it. In particular their book on mac malware teaches a lot of analysis techniques.
The Objective-See Foundation
A non-profit foundation, focusing on macOS security.The Objective-See Foundation
Under the hood (not de's or gui) what REALLY separates linux from windows?
Is it just / ?
I kid. But really, besides "its all a file", if you take away the gui, is the only difference the syntax ? How libraries interact? How disks are mounted ?
If we stripped all ms's junk out and made windows open source, would we still prefer linux?
When you get to a very basic level, is one of them more efficiently coded?
like this
Yes we would still prefer Linux.
Windows is just a single object without any modularity. With Linux by itself is of course just a barebones kernal waiting to be added to. You can choose which gnu libraries to use you can chose which package manager to use you can chose which desktop environment to use (or ommit it entirely.) Windows doesn't have that option.
As well since the source code for linux has been open for over 30 years people know how it works, it would take ages for people to study windows and actually figure out how to do anything with it.
Up until 95, Windows was mostly a desktop environment for DOS. From 95 to ME, Windows was an OS that used DOS as its bootloader. Not sure how to put it, but it was simplistic and fundamentally different from Linux.
The thing with NT-based Windows (including modern editions) is that the underlying system is joined at the hip with the GUI. Whereas Linux with your choice of coreutils is a perfectly capable OS without the GUI, many features of Windows are only accessible through the GUI.
Given enough time and resources, pretty much anything exclusive to Windows could be ported to Linux and vice versa. A lot of the difference just comes down to history and the ensuing conventions, workflows, and file hierarchies.
Even if we stripped out all the cruft and spaghetti code from Windows, there would be lots of nasty idiosyncrasies in its design, informed by its OS/2 and VMS (see Dave Cutler) heritage, profit maximization, revolving door of devs and interns, and years of bending over backwards to accommodate legacy programs.
Snap History
Ciao a tutti! Vorrei consigliare questa applicazione molto carina, fatta da alcuni studenti e alcuni insegnanti universitari offre ogni giorno un piccolo aneddoto storico, con le fonti per approfondire.Usa solo cookie tecnici e non chiede nulla per accedere, niente indirizzi mail,nomi utenti o cose superflue.
Andrea Russo likes this.
reshared this
President Trump’s War on “Woke AI” Is a Civil Liberties Nightmare
President Trump’s War on “Woke AI” Is a Civil Liberties Nightmare
The White House’s recently-unveiled “AI Action Plan” wages war on so-called “woke AI”—including large language models (LLMs) that provide information inconsistent with the administration’s views on climate change, gender, and other issues.Electronic Frontier Foundation
like this
You need to nerd out!!
0100 Solar panels: Most efficient self-sustained energy source
0200 Decentralization: The process by which the activities are distributed away from a central authority
0400_1another_: CONNECTING WITH LANOTHER THRU 1 OF 1
UPCYCLED CLOTHING (O)
0500 CDC: Hacktivism, free and open source software and encryption
0600 Gardening: Wether guerilla or not it beautifies the places and combats global warming
0700 shebuildsrobots: o
Fashioneering (O)
0800 Collaboration: Globally or locally cooperation always wins over competition
1000 Instructables: Collection of DIY projects empowering makers
1100 Hydroponics: horticulture which involves growing plants without soil in an artificial environment.
"smartprinters"
(O) = page on instagram
simply doing my duty o7
cross-posted from: lemmy.blahaj.zone/post/3035874…
do it for the yuritranscription: like for yuri, share for yuri, comment for yuri ignore for straight
adhocfungus likes this.
The CIA Trained Fulgencio Batista’s Torturers in Cuba
Fulgencio Batista’s Bureau for the Repression of Communist Activities had a blood-spattered record of torture and political killings before the 1959 revolution. Declassified files show how the CIA nurtured the bureau and its repressive techniques.
like this
reason.com/2025/08/12/how-elit…
They never stopped training torturers.
How Fort Bragg special operations troops created a drug cartel
A bizarre criminal conspiracy in the ranks of the U.S. Joint Special Operations Command at a military base in North Carolina.Matthew Petti (Reason.com)
Friday, August 15, 2025
Share
The Kyiv Independent [unofficial]
This newsletter is brought to you by Medical Bridges.
Medical Supplies for Ukraine’s Hospitals. Partnering for global health equity.
Russia’s war against Ukraine
Ukrainian soldiers in Kherson, Ukraine, on Aug. 8, 2025. (Fermin Torrano / Anadolu via Getty Images)
Trump says Putin ready to make a peace deal with Ukraine. “I believe now he’s convinced that he’s going to make a deal. He’s going to make a deal. I think he’s going to,” U.S. President Donald Trump said.
Putin to present Trump with ‘historical materials‘ framing Ukraine as artificial state, Kyiv claims. The package includes geographical maps intended to justify Russia’s territorial claims and ongoing military aggression, Ukraine’s Center for Countering Disinformation claimed.
Anchorage security ramps up before Trump-Putin talks on Ukraine’s future, Bloomberg reports. Security arrangements follow strict reciprocity protocols, with each side matching the other’s personnel and resources — from motorcade composition to the number of translators and secure waiting rooms.
Russia unveils delegation for Putin-Trump Alaska meeting, expects no agreement signed. The Russian delegation will include Foreign Minister Sergey Lavrov, presidential aide Yuri Ushakov, Defense Minister Andrei Belousov, Finance Minister Anton Siluanov, and Russian Direct Investment Fund head Kirill Dmitriev.
Russia may be preparing to test nuclear-powered missile ahead of Trump talks, Reuters reports. Planet Labs imagery showed stacks of shipping containers, cranes, and a helicopter at the launch site, as well as two radar-equipped aircraft parked at Rogachevo military airfield since mid-July, Reuters reported.
Your contribution helps keep the Kyiv Independent going. Become a member today.
84 Ukrainians return from Russian captivity in latest prisoner swap — some held since 2014. Ukraine has secured the return of 84 soldiers and civilians from Russian captivity in a fresh prisoner swap with Moscow, President Volodymyr Zelensky announced on Aug. 14.
Drone reportedly hits apartment building in Russia’s Rostov-on-Don, officials say 13 injured. Residents heard the sound of an incoming drone before an explosion, Telegram channels reported. The blast occurred in the city center near Voroshilovsky Avenue, according to the independent Russian Telegram channel Astra.
Ukrainian drone strike sets fire to Russia’s Volgograd oil refinery, Kyiv confirms.
The facility processes over 15 million metric tons of oil every year, amounting to 5.6% of Russia’s refining capacity, the Ukrainian military said.
Russian Su-30SM fighter jet likely down near Snake Island, Ukrainian Navy says.
The twin-engine, two-seat aircraft – designed for both air superiority and ground attack – crashed for unknown reasons, the Ukrainian Navy said.
Zelensky meets Starmer in UK day before Trump-Putin summit. President Volodymyr Zelensky will meet British Prime Minister Keir Starmer at the latter’s residence in Downing Street on Aug. 14, Sky News reported, citing Starmer’s office.
Read our exclusives
Ukraine war latest: Trump says Putin ready to make a peace deal with Ukraine
The talks in Anchorage, Alaska’s largest city, will be the first face-to-face meeting between the two leaders since Trump returned to office and Putin’s first visit to the U.S. in a decade.
Photo: Mandel Ngan / AFP via Getty Images
Learn more
Trump doesn’t have enough leverage to stop Russia, Ukrainian soldiers say ahead of Alaska talks
The U.S. and Russian leaders are set to meet in Alaska on Aug. 15, with Trump saying the talks could involve some “swapping” of territories between Ukraine and Russia.
Photo: Roman Pilipey / AFP via Getty Images
Learn more
Can Trump offer Ukraine’s minerals to Putin? Not without unraveling the global legal order, experts warn
President Donald Trump is reportedly considering offering Moscow access to Ukraine’s natural minerals in the Russian-occupied territories, a move Ukrainians say would be illegal and damaging to Washington’s reputation.
Photo: Pierre Crom / Getty Images
Learn more
Ukrainian soldiers on fighting to reclaim their homes from Russia
For Ukrainian soldiers born and raised on lands occupied by Russia, the fight for their home is deeply personal.
So much so that some say their decision to serve was driven by a desire for revenge as by a sense of civic duty and justice.
Photo: Oleg Pereverzev/NurPhoto via Getty Images
We choose to stay in Ukraine — to bring the world the truth about Russia’s brutal war.
If you think the truth matters — here’s your chance to stand for it.
Human cost of Russia’s war
July saw highest civilian casualties in Ukraine since 2022, UN says ahead of Trump-Putin summit. “Only the first three months after the Russian Federation launched its full-scale invasion of Ukraine saw more killed and injured than in this past month,” said Danielle Bell, head of the U.N. human rights monitoring mission in Ukraine.
Russian attacks kill at least 8, injure 18 across Ukraine over past day. Ukraine’s Air Force said Russia launched 45 Shahed-type drones, other UAVs (unmanned aerial vehicles), and two S-300/400 missiles overnight from several directions.
Alaska talks
From ‘war criminal’ to US guest — Trump invites Putin out of isolation
After Moscow launched its full-scale invasion, Putin limited travel largely to close allies and regional partners, Iran, China, and North Korea, avoiding Western capitals entirely.
Photo: Contributor / Getty Images
Learn more
Trump may entertain Russia’s ‘land swap’ plan, but Ukraine won’t
Various media outlets reported that Moscow had proposed Ukraine’s handover of the remaining part of its eastern Donetsk Oblast in exchange for a ceasefire.
Photo: Pierre Crom / Getty Images
International response
US sanctions Russian crypto exchange over cybercrime — day before Trump-Putin summit in Alaska. The U.S. Treasury Department has re-designated the Russian-linked cryptocurrency exchange Garantex Europe OU, accusing it of directly enabling ransomware gangs and other cybercriminals by processing over $100 million in illicit transactions since 2019.
Trump prefers talks over new Russia sanctions but has ‘many measures’ ready, White House says. “What comes after that meeting is up to President Trump,” White House Press Secretary Karoline Leavitt told Fox News. “He wants to sit down and look the Russian president in the eyes and see what progress can be made.”
India shifts oil purchases away from Russia before Trump-Putin Alaska meeting, Bloomberg reports. This week, state companies Indian Oil Corp. and Bharat Petroleum Corp. secured supplies from the United States, Brazil, and Middle Eastern producers for September-October delivery, Bloomberg reported.
Japan says Russian military obtained banned machine tools via Chinese firms.
Japanese authorities found that over 300 precision machine tools made by Tsugami Corp., sold to seven Chinese firms, had gone missing and were later used by Russia to produce weapons components.
In other news
Poland detains Ukrainian teen accused of vandalizing monuments on Russia’s behalf. According to Polish Interior Minister Tomasz Siemoniak, the teenager vandalized monuments of victims of the Ukrainian Insurgent Army (UPA) and defaced buildings with anti-Polish slogans on behalf of foreign powers.
This newsletter is open for sponsorship. Boost your brand’s visibility by reaching thousands of engaged subscribers. Click here for more details.
Today’s Ukraine Daily was brought to you by Martin Fornusek, Anna Fratsyvir, Toma Istomina, Tymur Zadorozhnyy, Volodymyr Ivanyshyn, and Olena Goncharova.
If you’re enjoying this newsletter, consider joining our membership program. Start supporting independent journalism today.
Share
Republicans who backed Trump’s anti-environment bill have accepted over $105m from big oil
The One Big Beautiful Bill Act includes billions of dollars in giveaways to fossil fuel companies and their executives
US | Babysitter who provided young girls to her boyfriend for sexual assault sentenced to 100 years in prison
Brittney Lyon provided her boyfriend Samuel Cabrera girls as young as three to drug, bind and abuse in exchange for going on dates, prosecutors say
adhocfungus likes this.
Fracne | Emmanuel Macron decries ‘antisemitic hatred’ after memorial tree cut down
French president vows to punish those who felled tree planted in memory of Jewish man tortured to death in 2006
Archived version: archive.is/newest/theguardian.…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Raoul Duke likes this.
120,000 Ukrainians in US at risk of deportation as Biden-era program lapses, WSJ reports
The issue concerns refugees who have lived in the country since Aug. 16, 2023, under the Uniting for Ukraine program, devised by the Biden administration to allow Ukrainians to stay in the country on humanitarian parole.
Archived version: archive.is/newest/kyivindepend…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
US Government agency drops Grok after MechaHitler backlash, report says
US government agency drops Grok after MechaHitler backlash, report says
It appears Grok’s antisemitic rants stopped it from becoming feds’ go-to chatbot.Ashley Belanger (Ars Technica)
riempimento della squachiavanza porta la morte ad essere dischica… (Sharkey prende troppo spazio ed è un problema)
È doloroso trovarmi qui ad ammetterlo a me stessa ma, ancora una volta, scopro che i miei piani di dominazione del mondo sono stati troppo ambiziosi; almeno per ora, in questa fase più iniziale. Ovviamente tutto bene col mio codice, anche se è ancora nelle fasi iniziali… i problemi inaspettati sono piuttosto arrivati con Sharkey, […]
AbidingOhmsLaw
in reply to Yourname942 • • •Well the reason the VM is isolated is probably 2 fold,
so if things are done correctly you shouldn’t copy any file to or from the isolated machine
frongt
in reply to Yourname942 • • •Create an ISO and mount that.
But really, it doesn't matter how you get the file in before you open it. It's extremely unlikely that it malware could be executed just by putting a file on disk.
like this
TVA likes this.
Yourname942
in reply to frongt • • •Onomatopoeia
in reply to Yourname942 • • •7zip is an archive format - creating an iso requires the raw files (unless you have 7zip installed in the VM to extract the zip file).
All that is unnecessary though, just enable a shared folder via the VM software (I assume they all do it now, VMware has had this feature forever). This isn't a network share, it's a virtual network share that only exists within VMware for that specific VM, and by default it's read only.
Or put the files on a thumb drive, and connect that thumb drive to the VM.
Or enable networking on the VM, copy the files in, then disable the network card in the VM.
Getting the files in doesn't require any special security, it's when you're executing the files that the VM needs to be isolated.
frongt
in reply to Yourname942 • • •Yourname942
in reply to frongt • • •frongt
in reply to Yourname942 • • •Windows and Linux can mount ISOs without additional software. Macs can mount DMGs.
Either way, you could preload that software before the file.
deadcade
in reply to Yourname942 • • •Start off with a clean slate. Windows, freshly installed from a Microsoft provided ISO (Assuming you're looking at a Windows executable). Try to follow a guide on bypassing the MS account requirement (AtlasOS has a section of their guide telling you how to do this).
When you're setting things up, there's no restrictions to internet access, sharing, etc. You just have to be careful not to open/view the files you want to isolate, which is easy enough by for example putting the files in a password protected zip. You can also install any required tools now (like maybe 7zip).
At this stage, there's a few options:
- The easiest is to put your files into a separate folder, then run a simple webserver, like with
python3 -m http.server
on your host. Then download it on the VM.- Another option is to mount the VMs disk, then copy the files directly. Turn off the VM, mount the disk, copy the files, unmount, then turn it back on.
- You could create a disk image that contains your files, readable by the VM.
When you're ready to actually open the file, close off all access from the VM to the host. No networking, clipboard sharing, etc. Do this on the hosts VM settings, not inside the VM. Also note that without further tooling, it's extemely difficult to tell if there's any advanced malware present.
As soon as you view the potentially malicious files, consider anything coming from that VM as malicious. Don't try to view/open files on your host, do not give it network access.
Malware can be (but often isn't) incredibly advanced, and even an isolated VM isn't a 100% guaranteed method of keeping it contained.
Onomatopoeia
in reply to deadcade • • •VMware's shared folders is secure - by default it's read-only, and it's only visible to the specific VM on which it's configured.
The client OS doesn't even need a network card, VMware emulates the network just for the shared folder.
I assume other virtualization tools have a similar feature.
deadcade
in reply to Onomatopoeia • • •Yourname942
in reply to deadcade • • •deadcade
in reply to Yourname942 • • •If you're this unsure about running potential malware in a VM, the best method is to just not run it at all.
You should be perfectly fine running with networking on your host, as long as you disable it in the VM configuration before running the potential malware.
frongt
in reply to Yourname942 • • •cecilkorik
in reply to Yourname942 • • •The point is that you isolate the VM after you get the file onto it but before running the potential malware. It's not going to auto-execute, not if your Windows is patched and modern and up to date, we don't live in the bad old days of floppy disks and CDs and USBs autorunning anymore (and for good reason).
If you are running a version of Windows (or anything) that is even capable of auto-executing code as it downloads, the malware you're trying to test is the least of your worries because you'll already have about a thousand other malware already running.
like this
PokyDokie likes this.
Cevilia (she/they/…)
in reply to Yourname942 • • •Based on our recent interactions, I would say you probably don't have the expertise necessary to evaluate whether the file's safe. I very much doubt you're gonna gain any new knowledge from doing this.
This isn't a slight against you. I don't have the expertise, either.
like this
hornface likes this.
vrighter
in reply to Yourname942 • • •like this
hornface likes this.
borari
in reply to vrighter • • •vrighter
in reply to borari • • •like this
hornface likes this.
PolarKraken
in reply to borari • • •Yourname942
in reply to borari • • •borari
in reply to Yourname942 • • •echo “example text” | base64
, then imagine inputing the result of piping 32GB to it instead of 13 characters.stupid_asshole69 [none/use name]
in reply to Yourname942 • • •Shut down the vm, mount the vm disk, mv the files over, unmount the vm disk, start the vm.
That works because nowadays software doesn’t run itself, the system chooses what to run (sometimes at the users request).
When you shutdown the vm, there is no virtual computer interacting with the files on the vms disk. When you mount the vms disk, you’re just telling your system to treat the file that represents the vms disk as a filesystem. When you move the files to it, you’re just copying the files to the file that represents the vms disk respecting its filesystem then deleting the originals. When you unmount the vms disk you’re telling your system to wrap it up and let go of the file that represents the vms disk. Starting the vm is just telling your system to pretend that it has a fake computer whose disk is that file you mounted and wrote to which just so happens to have some new files in it, imagine that!
There’s another person saying you probably can’t figure out if the files you have are malware. I won’t go that far, but the reason most people don’t setup forensic environments (that’s generally what the computing environment you’ve set up is called when you’re doing what you’re doing) for their warez and instead raw dog it is that they have some security software and process they trust and if they get catch some kind of problem they plan on just restoring from backup.
You do have backups, right?
It’s rare for user targeted malware to have persistence, most of that technology is targeted at infrastructure like switches, edge and servers, so a wipe and restore is almost always a perfect fix.
MangoPenguin
in reply to Yourname942 • • •