Antiviruses?
like this
Madagascar's coup leader is sworn in as president after military takeover
Col. Michael Randrianirina has been sworn in as Madagascar's new leader after seizing power in a military coup.
Archived version: archive.is/newest/apnews.com/a…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
‘There will be pain’: Scientists warn billions face dangerous levels of heat this century
A new study finds poorer nations will bear the brunt of rising deadly heat days, despite contributing least to global emissions.
Archived version: archive.is/newest/euronews.com…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Uzbekistan’s President to visit Brussels for historic EU partnership deal
Uzbekistan’s President will visit Brussels on 24 October 2025 to sign the Enhanced Partnership and Cooperation Agreement (EPCA) with the EU. The deal marks a new phase in political, trade, and security cooperation, strengthening ties and supporting reforms and sustainable development.
IDF fire kills 11-year-old in West Bank's Hebron area, Palestinian Health Ministry says
The Child Is One of Several Children and Teens Killed by Israeli Fire in the West Bank in Recent Months
Archived version: archive.is/newest/haaretz.com/…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
IDF fire kills 11-year-old in West Bank's Hebron area, Palestinian Health Ministry says
The child is one of several children and teens killed by Israeli fire in the West Bank in recent monthsJack Khoury (Haaretz)
Nella newsletter di oggi 17 ottobre de L'Unica-Genova Erica Manna tratta dell'occupazione dell'università
Foto di Roberto Orlando
È il collettivo “Cambiare rotta” a guidare la lotta, ma il movimento è composito e non accetta sigle ed etichette.
Alcuni studenti fanno parte di “Giovani contro la guerra”, altri di “Opposizione studentesca d’alternativa”: il gruppo è vasto ed eterogeneo e soprattutto è nato dal basso, composto da universitari e anche da alunni delle scuole superiori.
Leggi tutto:
lunica.email/studenti-occupazi…
YouTube is Broken: GN Gets Hit with More Copyright Claims
cross-posted from: piefed.ca/post/282211
- YouTube
Profitez des vidéos et de la musique que vous aimez, mettez en ligne des contenus originaux, et partagez-les avec vos amis, vos proches et le monde entier.www.youtube.com
One thing people need to understand is that YouTube copyright claim process is not a legal process. It can become a legal process if both sides dispute each others claims, but the actual claim system is not a legal process. As a result Google is always acting like all claims are valid even when they are most obviously bullshit simply to not piss of copyright holders and lead them to sueing YouTube for not enforcing DMCA. Once claim is disputed they will review the claim manually, but then it comes down to how much risk YouTube want to take on themselves. Most often they don't want any risk.
The whole YouTube site is built on trust that YouTube will enforce DMCA with their custom system and save everyone money by copyright holders not having to file legal claims for each DMCA case individually and them not suying YouTube in return. Without that "trust" YouTube wouldn't exist as it would have been klilled in the first years of its existance by legal fees.
like this
Lifespan of AI Chips: The $300 Billion Question - CITP Blog
cross-posted from: lemmy.world/post/37458697
Found this via a blog post by Cory Doctorow.Fascinating analysis on market structure, future scenarios and use of what is essentially accounting fraud my major players in the "AI" space.
Lifespan of AI Chips: The $300 Billion Question - CITP Blog
There's no question that we are in the midst of making one of the largest industrial infrastructure bets in United States history.Mihir Kshirsagar (CITP Blog)
‘Godfather of Silicon Valley’ Quits Board Over Benioff’s (Salesforce CEO) Backing of Trump
Ron Conway stepped down from the board of Salesforce’s philanthropic arm after the company’s chief executive, Marc Benioff, said he supported President Trump and wanted the National Guard to come to San Francisco.
https://www.nytimes.com/2025/10/16/us/salesforce-resign-benioff-ron-conway.html
Tempo (fork) v3.17.14 android subsonic client
cross-posted from: lemmy.world/post/37454125
Hi All,my first post over here on lemmy. Thought I'd share my forked tempo release.
Some new fixes for October. v3.17.14
What's Changed
fix: General build warning and playback issues fix: persist album sort preference Fix album parse empty date field fix: Include shuffle/repeat controls in f-droid build's media notific… fix: limits image size to prevent widget crash
note
app-tempo*
<- The github release with all the android auto/chromecast features
app-notquitemy*
<- The f-droid release that goes without any of the google stuff.Full Changelog: github.com/eddyizm/tempo/compa…
As usual, any dev contributions appreciated as I am not actually a java/mobile dev, so my progress is significantly slower than those who do this on the daily.
In particular, any android dev is familiar with changing the name/icon in order get this app published in app stores.
Release v3.17.14 · eddyizm/tempo
What's Changed fix: General build warning and playback issues by @le-firehawk in #167 fix: persist album sort preference by @eddyizm in #168 Fix album parse empty date field by @eddyizm in #171 fi...GitHub
[Video] Qassam brigades issues evacuation order to Zionist occupiers of Palestine
PipeWire 1.5.81 (1.6 RC1) released
1.5.81 (1.6 RC1) · PipeWire / pipewire · GitLab
PipeWire 1.5.81 (2025-10-16) This is the first 1.6 release candidate that is API and ABI compatible with previous 1.4.x, 1.2.x and...GitLab
like this
Are they ever going to pay back the billions of dollars the US has given them each year?
They're clearly able to afford it.
How I freed myself from Algorithmic Manipulation and The Clutches of Big Tech
My philosophy:
Modern big tech (Apple, Google, Microsoft), along with mainstream platform is chaotic with manipulative algorithms; all for the purpose of exploiting the user with data collection, pushing ads, wasting the user's time by keeping them constantly engaged. Smartphones most of all are fragile, high maintenance, dopamine slot machines. What I have laid out cuts out all forms of big tech algorithmic manipulation. Suffice to say, my own process actually saved my sanity and I no longer have anxiety as I once did. It's been freeing. And it's like, once you filter out all the time wasting slop, what exactly does the vast majority of the Internet and the mainstream online services even offer? In the end, what I have detailed gave me a lot of clarity on how much people waste their lives online; especially when out in public holding a phone in their face, letting life pass them by.
Tools:
• Linux distros on all desktops and servers
• RSS Guard
• Librewolf/Floorp/Mullvad browsers (With extensions, Ublock, Libredirect, Noscript)
• SearXNG (with blacklist)
• PiHole
• Proton Mail
• Dropped smartphone for an XP3 Plus Flip phone (WIFI and Mobile data disabled; no apps stores, or any Google service present and only used for calling or notes)
• AGPTEK MP3 player
Alternative platforms used (and viewed in RSS Guard's internal MPV player):
• Odysee
• Bitchute
• Peertube instances
• feeds.feedburner.com
• anchor.fm
• feeds.megaphone.fm
• feeds.fireside.fm
Filters lists for PiHole:
• https://v.firebog.net/hosts/Easyprivacy.txt
• https://raw.githubusercontent.com/MajkiIT/polish-ads-filter/master/polish-pihole-filters/ublock_hosts.txt
• https://v.firebog.net/hosts/Prigent-Crypto.txt
• https://v.firebog.net/hosts/AdguardDNS.txt
• https://raw.githubusercontent.com/bigdargon/hostsVN/master/hosts
• https://v.firebog.net/hosts/Easylist.txt
• https://github.com/gieljnssns/Social-media-Blocklists/blob/master/pihole-facebook.txt
• https://github.com/gieljnssns/Social-media-Blocklists/blob/master/pihole-instagram.txt
• https://raw.githubusercontent.com/StevenBlack/hosts/master/alternates/fakenews-gambling-social/hosts
• https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
• https://github.com/jelayeb/pihole/blob/master/pihole-cat/manage/categories/Drugs
• https://raw.githubusercontent.com/laylavish/uBlockOrigin-HUGE-AI-Blocklist/main/noai_hosts.txt
• http://winhelp2002.mvps.org/hosts.txt
• https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt
• https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareHosts.txt
• https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt
• https://raw.githubusercontent.com/HorusTeknoloji/TR-PhishingList/master/url-lists.txt
• https://adaway.org/hosts.txt
• https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt
• https://raw.githubusercontent.com/jdlingyu/ad-wars/master/hosts
• https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=0&mimetype=plaintext
• https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt
• https://raw.githubusercontent.com/anudeepND/blacklist/master/facebook.txt
• https://raw.githubusercontent.com/gieljnssns/Social-media-Blocklists/master/pihole-instagram.txt
• https://raw.githubusercontent.com/gieljnssns/Social-media-Blocklists/master/pihole-tiktok.txt
• https://raw.githubusercontent.com/gieljnssns/Social-media-Blocklists/master/pihole-whatsapp.txt
• https://raw.githubusercontent.com/gieljnssns/Social-media-Blocklists/master/pihole-facebook.txt
• https://raw.githubusercontent.com/JackCuthbert/pihole-twitter/master/pihole-twitter.txt
• https://raw.githubusercontent.com/sfoerster/block-windows-telemetry/master/pihole-windows-block-telemetry-domains.txt
• https://www.github.developerdan.com/hosts/lists/dating-services-extended.txt
• https://www.github.developerdan.com/hosts/lists/facebook-extended.txt
• https://www.github.developerdan.com/hosts/lists/tracking-aggressive-extended.txt
• https://www.github.developerdan.com/hosts/lists/ads-and-tracking-extended.txt
• https://raw.githubusercontent.com/danhorton7/pihole-block-tiktok/main/tiktok.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-discord.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-myspace.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-snapchat.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-ubisoft.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-badoo.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-roblox.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-blizzard.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-ea.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-epicgames.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-rockstargames.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-activision.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-minecraft.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-messenger.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-reddit.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-yy.txt
• https://raw.githubusercontent.com/jelayeb/pihole/master/pihole-cat/manage/categories/Gambling
• https://raw.githubusercontent.com/UncleRoger33/adobe-blocklist/main/AdobeBlocklist.txt
• https://raw.githubusercontent.com/nickspaargaren/no-amazon/master/parsedamazon
• https://raw.githubusercontent.com/crpietschmann/pi-hole-blocklist/main/social-media/blocklist-social-snapchat.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-deviantart.txt
• https://raw.githubusercontent.com/jmdugan/blocklists/master/corporations/microsoft/all
• https://raw.githubusercontent.com/jmdugan/blocklists/master/corporations/apple/all
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-zynga.txt
• https://github.com/nickoppen/pihole-blocklists/raw/master/blocklist-warthunder.txt
• https://raw.githubusercontent.com/nickoppen/pihole-blocklists/master/blocklist-telegram.txt
• https://blocklistproject.github.io/Lists/alt-version/porn-nl.txt
PiHole Regex deny list:
• (^|\.)snapchat\.com$
• (\.|^)tiktok\.com$
• (\.|^)tiktokcdn\.com$
• (\.|^)tiktokv\.com$
• (\.|^)threads\.net$
• (^|\.)apple\.com$
• (^|\.)icloud\.com$
• (^|\.)microsoft\.com$
• (^|\.)live\.com$
• (^|\.)office\.com$
• (^|\.)msn\.com$
• (^|\.)live\.net$
• (^|\.)windowsupdate\.com$
• (^|\.)skype\.com$
• (^|\.)bytedance\.com$
• (^|\.)microsoft365\.com$
• (^|\.)windows\.com$
• (^|\.)hp\.com$
• (^|\.)hpconnected\.com$
• (^|\.)hpsmart\.com$
• (^|\.)samsung\.com$
• (^|\.)canon\.com$
• (^|\.)canon\.ca$
• (^|\.)hp\.ca$
• (^|\.)photoshopessentials.com\.ca$
• (^|\.)adobepress\.com$
• (^|\.)bing\.com$
• (^|\.)azure\.net$
• (^|\.)msftconnecttest\.com$
• (^|\.)msftncsi\.com$
• (^|\.)msedge\.net$
• (^|\.)msauth\.com$
• (^|\.)onedrive\.com$
• (^|\.)sharepoint\.com$
• (^|\.)outlook\.com$
• (^|\.)yammer\.com$
• (^|\.)visualstudio\.com$
• (^|\.)lync\.com$
• (^|\.)windows\.net$
• (^|\.)office365\.com$
• (^|\.)microsoftstore\.com$
• (^|\.)microsoft\.net$
• (^|\.)skypeforbusiness\.com$
• (^|\.)azure\.com$
• (^|\.)wizzapp\.com$
• (^|\.)facebook\.com$
• (^|\.)fbcdn\.net$
• (^|\.)openai\.com$
• (^|\.)spotify\.com$
• (^|\.)scdn\.co$
• (^|\.)adobe\.com$
• (^|\.)lg\.com$
• (^|\.)roku\.com$
• (^|\.)roku\.tv$
• (^|\.)deviantart\.com$
• (^|\.)bethesda\.net$
• (^|\.)bsky\.app$
• (^|\.)bsky\.social$
• (^|\.)deepseek\.com$
• (^|\.)indeed\.[a-z\.]+$
• (^|\.)ziprecruiter\.[a-z\.]+$
• (^|\.)monster\.[a-z\.]+$
• (^|\.)glassdoor\.[a-z\.]+$
• (^|\.)threads\.[a-z\.]+$
• (^|\.)fbcdn\.[a-z\.]+$
• (^|\.)tiktokpangle-b\.[a-z\.]+$
• (^|\.)mellow\.[a-z\.]+$
• (^|\.)mellowtel\.[a-z\.]+$
• (^|\.)tiktokpangle\.[a-z\.]+$
• (^|\.)pangle\.[a-z\.]+$
SearXNG blacklist:
\#Social Media Trash
- '(.*\.)?beams.fm$'
- '(.*\.)?bitmoji.com$'
- '(.*\.)?bsky.app$'
- '(.*\.)?bsky.social$'
- '(.*\.)?byteapp.com$'
- '(.*\.)?byte.co$'
- '(.*\.)?byte.co$'
- '(.*\.)?chingari.io$'
- '(.*\.)?clashapp.*$'
- '(.*\.)?clubhouse.com$'
- '(.*\.)?deviantart.*$'
- '(.*\.)?deviantartsell.*$'
- '(.*\.)?deviantartsupport.*$'
- '(.*\.)?discord.*$'
- '(.*\.)?discordapp.*$'
- '(.*\.)?disqus.com$'
- '(.*\.)?douyin.*$'
- '(.*\.)?dubsmash.com$'
- '(.*\.)?ello.co$'
- '(.*\.)?facebook.*$'
- '(.*\.)?firework.tv$'
- '(.*\.)?friendster.com$'
- '(.*\.)?harmonic.fm$'
- '(^|https?://)(.*\.)?fb\.*(/.*)?'
- '(^|https?://)(.*\.)?t\.co(/.*)?'
- '(^|https?://)(.*\.)?t\.me(/.*)?'
- '(^|https?://)(.*\.)?x\.com(/.*)?'
- '(.*\.)?instagram.*$'
- '(.*\.)?kik.*$'
- '(.*\.)?kikhelpcenter.zendesk.*$'
- '(.*\.)?kuaishou.com$'
- '(.*\.)?kwai.com$'
- '(.*\.)?lemmy.*$'
- '(.*\.)?lemon8-app.*$'
- '(.*\.)?likee.video$'
- '(.*\.)?line.me$'
- '(.*\.)?linkedin.*$'
- '(.*\.)?mastodon.*$'
- '(.*\.)?meetup.*$'
- '(.*\.)?messenger.*$'
- '(.*\.)?messengerkids.*$'
- '(.*\.)?meta.*$'
- '(.*\.)?metacareers.*$'
- '(.*\.)?mewe.com$'
- '(.*\.)?mitron.tv$'
- '(.*\.)?mix.com$'
- '(.*\.)?mocospace.com$'
- '(.*\.)?musical.ly$'
- '(.*\.)?myspace.com$'
- '(.*\.)?nextdoor.com$'
- '(.*\.)?odnoklassniki.ru$'
- '(.*\.)?patreon.*$'
- '(.*\.)?pinterest.*$'
- '(.*\.)?plurk.com$'
- '(.*\.)?poparazzi.com$'
- '(.*\.)?qq.com$'
- '(.*\.)?quora.*$'
- '(.*\.)?reddit.com$'
- '(.*\.)?redditforbusiness.*$'
- '(.*\.)?reddithelp.*$'
- '(.*\.)?reddithelp.com$'
- '(.*\.)?redditinc.*$'
- '(.*\.)?redditstatus.*$'
- '(.*\.)?reels.*$'
- '(.*\.)?rizzle.tv$'
- '(.*\.)?shots.com$'
- '(.*\.)?snackvideo.com$'
- '(.*\.)?snapchat.*$'
- '(.*\.)?snapkit.*$'
- '(.*\.)?snapmaps.com$'
- '(.*\.)?supernova.xyz$'
- '(.*\.)?tagged.com$'
- '(.*\.)?tangi.co$'
- '(.*\.)?telegram.*$'
- '(.*\.)?threads.*$'
- '(.*\.)?tikdecentral.com$'
- '(.*\.)?tiktok.*$'
- '(.*\.)?tiktokshop.*$'
- '(.*\.)?tokchain.net$'
- '(.*\.)?triller.*$'
- '(.*\.)?truthsocial.*$'
- '(.*\.)?tumblr.*$'
- '(.*\.)?twitch.*$'
- '(.*\.)?twitter.*$'
- '(.*\.)?viber.com$'
- '(.*\.)?vine.co$'
- '(.*\.)?vk.com$'
- '(.*\.)?vskit.tv$'
- '(.*\.)?wechat.com$'
- '(.*\.)?weibo.com$'
- '(.*\.)?weixin.com$'
- '(.*\.)?whatsapp.*$'
- '(.*\.)?wizzapp.com$'
- '(.*\.)?yammer.com$'
- '(.*\.)?youtu.*$'
- '(.*\.)?youtube.*$'
- '(.*\.)?zynn.com$'
\#Trash Dating Sites
- '(.*\.)?20.dating$'
- '(.*\.)?29secrets.com$'
- '(.*\.)?agegap.app$'
- '(.*\.)?amateurlocator.com$'
- '(.*\.)?ashleymadison.com$'
- '(.*\.)?asiandate.com$'
- '(.*\.)?badoo.com$'
- '(.*\.)?bearwww.com$'
- '(.*\.)?biggercity.com$'
- '(.*\.)?biggercityapp.com$'
- '(.*\.)?blackdatingforfree.com$'
- '(.*\.)?blackpeoplemeet.com$'
- '(.*\.)?breeze.social$'
- '(.*\.)?bumble.com$'
- '(.*\.)?bumpy.app$'
- '(.*\.)?caffmoscommunity.com$'
- '(.*\.)?cambridgeblog.org$'
- '(.*\.)?chasabl.com$'
- '(.*\.)?christianconnection.com$'
- '(.*\.)?christianmingle.com$'
- '(.*\.)?cloudromance.com$'
- '(.*\.)?clover.co$'
- '(.*\.)?coffeemeetsbagel.com$'
- '(.*\.)?cupid.com$'
- '(.*\.)?datemyage.*$'
- '(.*\.)?dating.com$'
- '(.*\.)?datingnews.com$'
- '(.*\.)?dentalvibe.com$'
- '(.*\.)?doublelist.com$'
- '(.*\.)?eharmony.ca$'
- '(.*\.)?eharmony.com$'
- '(.*\.)?elitesingles.ca$'
- '(.*\.)?elitesingles.com$'
- '(.*\.)?elmaz.com$'
- '(.*\.)?elovedates.com$'
- '(.*\.)?farmersonly.com$'
- '(.*\.)?feeld.co$'
- '(.*\.)?flirt.com$'
- '(.*\.)?freeandsingle.com$'
- '(.*\.)?freemeet.net$'
- '(.*\.)?freshsingle.com$'
- '(.*\.)?gaydar.net$'
- '(.*\.)?gaystryst.com$'
- '(.*\.)?glamour.com$'
- '(.*\.)?grindr.com$'
- '(.*\.)?grommr.com$'
- '(.*\.)?growlrapp.com$'
- '(.*\.)?happn.*$'
- '(.*\.)?heftynet.com$'
- '(.*\.)?hinge.co$'
- '(.*\.)?hornet.com$'
- '(.*\.)?how-to-germany.com$'
- '(.*\.)?iamclinic.org$'
- '(.*\.)?interracialmatch.com$'
- '(.*\.)?jaumo.com$'
- '(.*\.)?jdate.com$'
- '(.*\.)?jewishfriendfinder.com$'
- '(.*\.)?lovearts.com$'
- '(.*\.)?lovoo.com$'
- '(.*\.)?match.com$'
- '(.*\.)?meetme.com$'
- '(.*\.)?meetville.com$'
- '(.*\.)?mingle2.com$'
- '(.*\.)?money.com$'
- '(.*\.)?mysinglefriend.com$'
- '(.*\.)?ncoa.org$'
- '(.*\.)?okcupid.com$'
- '(.*\.)?onlinedating.com$'
- '(.*\.)?onluxy.com$'
- '(.*\.)?onlylads.com$'
- '(.*\.)?ourtime.com$'
- '(.*\.)?parship.com$'
- '(.*\.)?pinaheart.com$'
- '(.*\.)?pof.com$'
- '(.*\.)?quackquack.in$'
- '(.*\.)?romeo.com$'
- '(.*\.)?scruff.com$'
- '(.*\.)?seeking.com$'
- '(.*\.)?silversingles.ca$'
- '(.*\.)?simplegermany.com$'
- '(.*\.)?singleandshy.com$'
- '(.*\.)?smooch.com$'
- '(.*\.)?sniffies.com$'
- '(.*\.)?spaceo.ca$'
- '(.*\.)?squirt.org$'
- '(.*\.)?sugardaddy.ca$'
- '(.*\.)?taimi.com$'
- '(.*\.)?teaforguys.com$'
- '(.*\.)?teaforwomen.com$'
- '(.*\.)?theechelonscene.com$'
- '(.*\.)?theinnercircle.co$'
- '(.*\.)?tinder.com$'
- '(.*\.)?top10.com$'
- '(.*\.)?topface.com$'
- '(.*\.)?u4bear.com$'
- '(.*\.)?urbanette.com$'
- '(.*\.)?urbanette.com$'
- '(.*\.)?vidaselect.com$'
- '(.*\.)?wanderu.com$'
- '(.*\.)?welovedates.com$'
- '(.*\.)?zoosk.ca$'
- '(.*\.)?zoosk.com$'
\#Undesirable Corporations and Organizations
\#Microshit
- '(.*\.)?microsoft.*$'
- '(.*\.)?app.powerbi.com$'
- '(.*\.)?bing.com$'
- '(.*\.)?bingplaces.com$'
- '(.*\.)?live.com$'
- '(.*\.)?microsoft.com$'
- '(.*\.)?microsoft365.com$'
- '(.*\.)?msn.com$'
- '(.*\.)?office.com$'
- '(.*\.)?onenote.com$'
- '(.*\.)?sharepoint.com$'
- '(.*\.)?skype.com$'
- '(.*\.)?visualstudio.com$'
- '(.*\.)?windows.com$'
- '(.*\.)?xbox.com$'
\#CrApple
- '(.*\.)?apple.com$'
- '(.*\.)?icloud.com$'
\#Scroogle
- '(.*\.)?about.google$'
- '(.*\.)?android.com$'
- '(.*\.)?gmail.*$'
- '(.*\.)?google.*$'
- '(.*\.)?googleblog.*$'
- '(.*\.)pki.goog$'
\#Adobe Scamware
- '(.*\.)?adobe.com$'
- '(.*\.)?adobepress.com$'
- '(.*\.)?photoshop.com$'
- '(.*\.)?photoshopessentials.com$'
\#Shit Antivirus Vendors
- '(.*\.)?avast.com$'
- '(.*\.)?avg.com$'
- '(.*\.)?avira.com$'
- '(.*\.)?bitdefender.com$'
- '(.*\.)?comodo.com$'
- '(.*\.)?eset.com$'
- '(.*\.)?kaspersky.com$'
- '(.*\.)?malwarebytes.com$'
- '(.*\.)?mcafee.com$'
- '(.*\.)?norton.com$'
- '(.*\.)?pandasecurity.com$'
- '(.*\.)?sophos.com$'
- '(.*\.)?trendmicro.com$'
- '(.*\.)?webroot.com$'
\#Shit OEMs
- '(.*\.)?alienware.com$'
- '(.*\.)?canon.com$'
- '(.*\.)?dell.com$'
- '(.*\.)?hp.com$'
- '(.*\.)?hpconnected.com$'
- '(.*\.)?hpsmart.com$'
- '(.*\.)?lenovo.com$'
- '(.*\.)?lg.com$'
- '(.*\.)?samsung.com$'
\#Shit Telecommunication.companies
- '(.*\.)?bce.ca$'
- '(.*\.)?bell.ca$'
- '(.*\.)?bell.mobi$'
- '(.*\.)?bellmedia.ca$'
- '(.*\.)?bellmts.ca$'
- '(.*\.)?bellnet.*$'
- '(.*\.)?rogers.com$'
- '(.*\.)?shaw.ca$'
- '(.*\.)?shawbroadcast.com$'
- '(.*\.)?shawdirect.com$'
- '(.*\.)?telus.com$'
- '(.*\.)?telusfund.ca$'
- '(.*\.)?telushealth.com$'
- '(.*\.)?telusinternational.com$'
- '(.*\.)?telussky.com$'
- '(.*\.)?telustvplus.com$'
- '(.*\.)?verizon.com$'
- '(.*\.)?webmail.bell.*$'
\#Shit Streaming Platforms
- '(.*\.)?amazon.*$'
- '(.*\.)?crave.ca$'
- '(.*\.)?crave.com$'
- '(.*\.)?crunchyroll.com$'
- '(.*\.)?discoveryplus.com$'
- '(.*\.)?disneyplus.*$'
- '(.*\.)?disneyplus.com$'
- '(.*\.)?funimation.com$'
- '(.*\.)?hbo.com$'
- '(.*\.)?hbomax.com$'
- '(.*\.)?hulu.com$'
- '(.*\.)?imdb.*$'
- '(.*\.)?netflix.com$'
- '(.*\.)?paramountplus.com$'
- '(.*\.)?peacocktv.com$'
- '(.*\.)?primevideo.*$'
- '(.*\.)?roku.com$'
- '(.*\.)?spotify.com$'
- '(.*\.)?vudu.com$'
\#Other Shit.organizations
- '(.*\.)?aliexpress.com$'
- '(.*\.)?balena.io$'
- '(.*\.)?bytedance.com$'
- '(.*\.)?chewy.com$'
- '(.*\.)?e-bay.*$'
- '(.*\.)?ebay.*$'
- '(.*\.)?ebayadvertising.*$'
- '(.*\.)?ebayclassifieds.com$'
- '(.*\.)?ebayinc.*$'
- '(.*\.)?floatplane.com$'
- '(.*\.)?linusmediagroup.com$'
- '(.*\.)?linustechtips.com$'
- '(.*\.)?lttstore.com$'
- '(.*\.)?mercari.com$'
- '(.*\.)?newegg.*$'
- '(.*\.)?paypal-community.com$'
- '(.*\.)?paypal-community.com$'
- '(.*\.)?paypal-corp.com$'
- '(.*\.)?paypal.com$'
- '(.*\.)?petsmart.com$'
- '(.*\.)?pypl.com$'
- '(.*\.)?shopify.*$'
- '(.*\.)?wish.com$'
- '(.*\.)?yahoo.com$'
- '(.*\.)?yahooinc.com$'
- '(.*\.)?yorku.ca$'
\#Shit Journalism sites/Game Journalism and forum sites
- '(.*\.)?91mobiles.com$'
- '(.*\.)?adventuregamehotspot.com$'
- '(.*\.)?aftermath.site$'
- '(.*\.)?animenewsnetwork.com$'
- '(.*\.)?areajugones.*$'
- '(.*\.)?atomix.vg$'
- '(.*\.)?beebom.com$'
- '(.*\.)?bleacherreport.com$'
- '(.*\.)?bleepingcomputer.com$'
- '(.*\.)?boundingintocomics.com$'
- '(.*\.)?bustle.com$'
- '(.*\.)?butwhytho.net$'
- '(.*\.)?carolequintaine.com$'
- '(.*\.)?cbr.com$'
- '(.*\.)?cgmagonline.com$'
- '(.*\.)?checkpointgaming.net$'
- '(.*\.)?cinelinx.com$'
- '(.*\.)?cnet.com$'
- '(.*\.)?cogconnected.com$'
- '(.*\.)?comicbook.com$'
- '(.*\.)?culturedvultures.com$'
- '(.*\.)?destructoid.com$'
- '(.*\.)?dexerto.com$'
- '(.*\.)?digitalchumps.com$'
- '(.*\.)?digitaltrends.com$'
- '(.*\.)?dualshockers.com$'
- '(.*\.)?empireonline.com$'
- '(.*\.)?engadget.com$'
- '(.*\.)?eurogamer.*$'
- '(.*\.)?fextralife.com$'
- '(.*\.)?fivestargames.*$'
- '(.*\.)?forbes.com$'
- '(.*\.)?frankgamer.com$'
- '(.*\.)?futurefive.co$'
- '(.*\.)?game8.co$'
- '(.*\.)?gamedeveloper.com$'
- '(.*\.)?gamefaqs.gamespot.com$'
- '(.*\.)?gamefile.news$'
- '(.*\.)?gamegrin.com$'
- '(.*\.)?gameinformer.com$'
- '(.*\.)?gameliner.nl$'
- '(.*\.)?gameover.gr$'
- '(.*\.)?gamepro.*$'
- '(.*\.)?gamer.nl$'
- '(.*\.)?gamerant.com$'
- '(.*\.)?gamereactor.*$'
- '(.*\.)?gamerescape.com$'
- '(.*\.)?gamerguides.com$'
- '(.*\.)?gamesfinest.*$'
- '(.*\.)?gameshub.com$'
- '(.*\.)?gamesindustry.biz$'
- '(.*\.)?gamespew.com$'
- '(.*\.)?gamespot.com$'
- '(.*\.)?gamesradar.com$'
- '(.*\.)?gamestar.de$'
- '(.*\.)?gamestop.*$'
- '(.*\.)?gametyrant.com$'
- '(.*\.)?gameworld.gr$'
- '(.*\.)?gamezone.com$'
- '(.*\.)?gamingbible.com$'
- '(.*\.)?gamingbolt.com$'
- '(.*\.)?gamingboulevard.com$'
- '(.*\.)?gamingnexus.com$'
- '(.*\.)?gamingrespawn.com$'
- '(.*\.)?gamingtrend.com$'
- '(.*\.)?gbatemp.net$'
- '(.*\.)?gizmodo.com$'
- '(.*\.)?godisageek.com$'
- '(.*\.)?hardwarezone.com.sg$'
- '(.*\.)?heypoorplayer.com$'
- '(.*\.)?hobbyconsolas.com$'
- '(.*\.)?icon-era.com$'
- '(.*\.)?ign.com$'
- '(.*\.)?iis.net$'
- '(.*\.)?impulsegamer.com$'
- '(.*\.)?independent.ie$'
- '(.*\.)?indiatimes.com$'
- '(.*\.)?infobae.com$'
- '(.*\.)?intelligentrelations.com$'
- '(.*\.)?inverse.com$'
- '(.*\.)?itvision.altervista.org$'
- '(.*\.)?jeuxactu.com$'
- '(.*\.)?junkee.com$'
- '(.*\.)?kakuchopurei.com$'
- '(.*\.)?kotaku.com$'
- '(.*\.)?kwtx.com$'
- '(.*\.)?laptopmag.com$'
- '(.*\.)?lifehacker.com$'
- '(.*\.)?lootpots.com$'
- '(.*\.)?mashable.com$'
- '(.*\.)?meridiem-games.com$'
- '(.*\.)?metacritic.com$'
- '(.*\.)?mmorpg.com$'
- '(.*\.)?monstervine.com$'
- '(.*\.)?muckrack.com$'
- '(.*\.)?mynockmanor.com$'
- '(.*\.)?n4g.com$'
- '(.*\.)?nag.co.*$'
- '(.*\.)?neogaf.com$'
- '(.*\.)?newgamenetwork.com$'
- '(.*\.)?nichegamer.com$'
- '(.*\.)?noisypixel.net$'
- '(.*\.)?onlycomicuniverse.com$'
- '(.*\.)?opencritic.com$'
- '(.*\.)?pcgamer.com$'
- '(.*\.)?pcgames.de$'
- '(.*\.)?pcgamesn.com$'
- '(.*\.)?pcinvasion.com$'
- '(.*\.)?pcmag.com$'
- '(.*\.)?pfangirl.com$'
- '(.*\.)?phenixxgaming.com$'
- '(.*\.)?pixelbandits.org$'
- '(.*\.)?play-verse.com$'
- '(.*\.)?playstationbit.com$'
- '(.*\.)?playstationtrophies.org$'
- '(.*\.)?polygon.com$'
- '(.*\.)?press-start.com.*$'
- '(.*\.)?psu.com$'
- '(.*\.)?psxbrasil.com.*$'
- '(.*\.)?pu.nl$'
- '(.*\.)?pushsquare.com$'
- '(.*\.)?quora.com$'
- '(.*\.)?radiotimes.com$'
- '(.*\.)?resetera.com$'
- '(.*\.)?restart.run$'
- '(.*\.)?rgj.com$'
- '(.*\.)?rockpapershotgun.com$'
- '(.*\.)?rollingstone.com$'
- '(.*\.)?rpgamer.com$'
- '(.*\.)?rpgfan.com$'
- '(.*\.)?rpgsite.net$'
- '(.*\.)?salon.com$'
- '(.*\.)?screengeek.net$'
- '(.*\.)?screenrant.com$'
- '(.*\.)?seasonedgaming.com$'
- '(.*\.)?shacknews.com$'
- '(.*\.)?si.com$'
- '(.*\.)?siliconera.com$'
- '(.*\.)?slate.com$'
- '(.*\.)?society-reviews.com$'
- '(.*\.)?soundspheremag.com$'
- '(.*\.)?sportskeeda.com$'
- '(.*\.)?stackup.org$'
- '(.*\.)?steamdeckhq.com$'
- '(.*\.)?stuff.co.nz$'
- '(.*\.)?substack.com$'
- '(.*\.)?techcrunch.com$'
- '(.*\.)?techraptor.net$'
- '(.*\.)?thefpsreview.com$'
- '(.*\.)?thegamer.com$'
- '(.*\.)?thehindu.com$'
- '(.*\.)?thejimquisition.com$'
- '(.*\.)?thekoalition.com$'
- '(.*\.)?theouterhaven.net$'
- '(.*\.)?thesixthaxis.com$'
- '(.*\.)?thesixthaxis.com$'
- '(.*\.)?theverge.com$'
- '(.*\.)?tierragamer.com$'
- '(.*\.)?tomsguide.com$'
- '(.*\.)?tomshardware.com$'
- '(.*\.)?topgear.com$'
- '(.*\.)?torontoguardian.com$'
- '(.*\.)?trueachievements.com$'
- '(.*\.)?twinfinite.net$'
- '(.*\.)?twinfinite.net$'
- '(.*\.)?ungeek.ph$'
- '(.*\.)?upthrust.co$'
- '(.*\.)?useapotion.com$'
- '(.*\.)?userbenchmark.com$'
- '(.*\.)?venturebeat.com$'
- '(.*\.)?vg247.com$'
- '(.*\.)?vice.com$'
- '(.*\.)?videogameschronicle.com$'
- '(.*\.)?wccftech.com$'
- '(.*\.)?windowscentral.com$'
- '(.*\.)?windowslatest.com$'
- '(.*\.)?wired.com$'
- '(.*\.)?xboxera.com$'
- '(.*\.)?xboxtavern.com$'
- '(.*\.)?xgn.*$'
# Dumbass celeb bullshit
- '(.*\.)?awardsdaily.com$'
- '(.*\.)?buzzfeed.com$'
- '(.*\.)?capitalfm.com$'
- '(.*\.)?celebuzz.com$'
- '(.*\.)?cinemablend.com$'
- '(.*\.)?clickhole.com$'
- '(.*\.)?collider.com$'
- '(.*\.)?comicbookmovie.com$'
- '(.*\.)?cosmopolitan.com$'
- '(.*\.)?dailybeast.com$'
- '(.*\.)?dailymail.co.uk$'
- '(.*\.)?deadline.com$'
- '(.*\.)?eonline.com$'
- '(.*\.)?famousbirthdays.com$'
- '(.*\.)?fandango.com$'
- '(.*\.)?hollywoodlife.com$'
- '(.*\.)?huffpost.com$'
- '(.*\.)?indiewire.com$'
- '(.*\.)?lifeandstylemag.com$'
- '(.*\.)?lofficielusa.com$'
- '(.*\.)?moodmagazine.co$'
- '(.*\.)?mtv.com$'
- '(.*\.)?numeromag.nl$'
- '(.*\.)?okmagazine.com$'
- '(.*\.)?out.com$'
- '(.*\.)?people.com$'
- '(.*\.)?perezhilton.com$'
- '(.*\.)?popcrush.com$'
- '(.*\.)?radaronline.com$'
- '(.*\.)?schonmagazine.com$'
- '(.*\.)?starcasm.net$'
- '(.*\.)?teenvogue.com$'
- '(.*\.)?them.us$'
- '(.*\.)?theonion.com$'
- '(.*\.)?thepinknews.com$'
- '(.*\.)?thesun.co.uk$'
- '(.*\.)?thethings.com$'
- '(.*\.)?tmz.com$'
- '(.*\.)?tvinsider.com$'
- '(.*\.)?usmagazine.com$'
- '(.*\.)?variety.com$'
- '(.*\.)?viecc.com$'
- '(.*\.)?wwd.com$'
# American/UK/Other news site BS
- '(.*\.)?abc.com$'
- '(.*\.)?abcnews.go.com$'
- '(.*\.)?aljazeera.com$'
- '(.*\.)?aol.com$'
- '(.*\.)?apnews.com$'
- '(.*\.)?axios.com$'
- '(.*\.)?bbc.com$'
- '(.*\.)?bloomberg.com$'
- '(.*\.)?bostonglobe.com$'
- '(.*\.)?cbsnews.com$'
- '(.*\.)?chicagotribune.com$'
- '(.*\.)?cnbc.com$'
- '(.*\.)?cnn.com$'
- '(.*\.)?contentmode.com$'
- '(.*\.)?dallasnews.com$'
- '(.*\.)?denverpost.com$'
- '(.*\.)?foxnews.com$'
- '(.*\.)?houstonchronicle.com$'
- '(.*\.)?latimes.com$'
- '(.*\.)?legit.ng$'
- '(.*\.)?miamiherald.com$'
- '(.*\.)?msnbc.com$'
- '(.*\.)?nbcnews.com$'
- '(.*\.)?newsbreak.com$'
- '(.*\.)?newsweek.com$'
- '(.*\.)?newyorker.com$'
- '(.*\.)?nottinghampost.com$'
- '(.*\.)?nypost.com$'
- '(.*\.)?nytimes.com$'
- '(.*\.)?reuters.com$'
- '(.*\.)?sfchronicle.com$'
- '(.*\.)?sky.com$'
- '(.*\.)?talkbusiness.net$'
- '(.*\.)?theatlantic.com$'
- '(.*\.)?theguardian.com$'
- '(.*\.)?thehill.com$'
- '(.*\.)?time.com$'
- '(.*\.)?usatoday.com$'
- '(.*\.)?usnews.com$'
- '(.*\.)?voanews.com$'
- '(.*\.)?vox.com$'
- '(.*\.)?washingtonpost.com$'
- '(.*\.)?wsj.com$'
# Shit job search sites
- '(.*\.)?angel.co$'
- '(.*\.)?careerarc.com$'
- '(.*\.)?careerbuilder.com$'
- '(.*\.)?civicjobs.ca$'
- '(.*\.)?durham.ca$'
- '(.*\.)?durhamworkforceauthority.ca$'
- '(.*\.)?eluta.ca$'
- '(.*\.)?employmenthamilton.com$'
- '(.*\.)?fiverr.com$'
- '(.*\.)?flexjobs.com$'
- '(.*\.)?freelancer.com$'
- '(.*\.)?getwork.com$'
- '(.*\.)?gigster.com$'
- '(.*\.)?glassdoor.ca$'
- '(.*\.)?glassdoor.com$'
- '(.*\.)?hired.com$'
- '(.*\.)?indeed.com$'
- '(.*\.)?jobboom.com$'
- '(.*\.)?jobcase.com$'
- '(.*\.)?jobhat.com$'
- '(.*\.)?jobillico.com$'
- '(.*\.)?jobisjob.com$'
- '(.*\.)?jobrapido.com$'
- '(.*\.)?joinhandshake.com$'
- '(.*\.)?jooble.org$'
- '(.*\.)?knighthunter.com$'
- '(.*\.)?linkedin.com$'
- '(.*\.)?markham.ca$'
- '(.*\.)?monster.ca$'
- '(.*\.)?monster.com$'
- '(.*\.)?montreal.ca$'
- '(.*\.)?payscale.com$'
- '(.*\.)?recruit.net$'
- '(.*\.)?simplyhired.ca$'
- '(.*\.)?simplyhired.com$'
- '(.*\.)?snagajob.com$'
- '(.*\.)?talent.com$'
- '(.*\.)?taskrabbit.com$'
- '(.*\.)?theladders.com$'
- '(.*\.)?upwork.com$'
- '(.*\.)?usajobs.gov$'
- '(.*\.)?wayup.com$'
- '(.*\.)?workopolis.com$'
- '(.*\.)?wowjobs.ca$'
- '(.*\.)?yesmontreal.ca$'
- '(.*\.)?ziprecruiter.com$'
# Shit game studios/game companies
- '(.*\.)?activision.com$'
- '(.*\.)?activisionblizzard.com$'
- '(.*\.)?battle.net$'
- '(.*\.)?bethesda.net$'
- '(.*\.)?bethesdagamestudios.*$'
- '(.*\.)?bioware.com$'
- '(.*\.)?blizzard.com$'
- '(.*\.)?blizzard.gamespress.com$'
- '(.*\.)?bsn.boards.net$'
- '(.*\.)?bungie.net$'
- '(.*\.)?callofduty.com$'
- '(.*\.)?epicgames.*$'
- '(.*\.)?fortnite.*$'
- '(.*\.)?forums.ea.com$'
- '(.*\.)?genshin.hoyoverse.com$'
- '(.*\.)?humblebundle.com$'
- '(.*\.)?leagueoflegends.com$'
- '(.*\.)?nintendo.*$'
- '(.*\.)?playstation.com$'
- '(.*\.)?playvalorant.com$'
- '(.*\.)?pro.sony$'
- '(.*\.)?pubg.com$'
- '(.*\.)?pubgmobile.com$'
- '(.*\.)?redthreadgames.com$'
- '(.*\.)?research.sony$'
- '(.*\.)?riotgames.com$'
- '(.*\.)?roblox.com$'
- '(.*\.)?rockstargames.com$'
- '(.*\.)?sony.*$'
- '(.*\.)?sonyinteractive.com$'
- '(.*\.)?sonyjobs.*$'
- '(.*\.)?sonymusic.ca$'
- '(.*\.)?sonypictures.*$'
- '(.*\.)?sonypremiumhome.*$'
- '(.*\.)?thesonyshop.*$'
- '(.*\.)?ubi.com$'
- '(.*\.)?ubisoft.com$'
- '(.*\.)?ubisoftconnect.com$'
- '(.*\.)?warthunder.com$'
- '(.*\.)?www.ea.com$'
# AI Bullshit
- '(.*\.)?ai.google$'
- '(.*\.)?animeai.app$'
- '(.*\.)?artbreeder.com$'
- '(.*\.)?artstation.com$'
- '(.*\.)?assemblyai.com$'
- '(.*\.)?canva.com$'
- '(.*\.)?canva.com$'
- '(.*\.)?chatgpt.*$'
- '(.*\.)?craiyon.com$'
- '(.*\.)?craiyon.com$'
- '(.*\.)?creator.nightcafe.studio$'
- '(.*\.)?dall-efree.com$'
- '(.*\.)?deepai.org$'
- '(.*\.)?deepdreamgenerator.com$'
- '(.*\.)?deepseek.com$'
- '(.*\.)?etsy.*$'
- '(.*\.)?fiverr.com$'
- '(.*\.)?flickr.*$'
- '(.*\.)?fotor.*$'
- '(.*\.)?hiwaifu.com$'
- '(.*\.)?huggingface.*$'
- '(.*\.)?huggingface.co$'
- '(.*\.)?img2go.com$'
- '(.*\.)?kawaiiai.com$'
- '(.*\.)?magicstudio.com$'
- '(.*\.)?mellow.*$'
- '(.*\.)?mellowtel.*$'
- '(.*\.)?midjourney.com$'
- '(.*\.)?openai.com$'
- '(.*\.)?perchance.org$'
- '(.*\.)?pictorem.*$'
- '(.*\.)?runwayml.com$'
- '(.*\.)?social-ai.*$'
- '(.*\.)?socialai.*$'
- '(.*\.)?stable-diffusion.*$'
- '(.*\.)?stabledifffusion.*$'
- '(.*\.)?stablediffusion.*$'
- '(.*\.)?stablediffusionweb.com$'
- '(.*\.)?stablediffusionxl.com$'
- '(.*\.)?starryai.com$'
- '(.*\.)?waifulabs.com$'
# Shitty porn sites
- '(.*\.)?anyporn.*$'
- '(.*\.)?boy18tube.*$'
- '(.*\.)?boyfriendtv.*$'
- '(.*\.)?brutalgays.*$'
- '(.*\.)?chaturbate.*$'
- '(.*\.)?eporner.*$'
- '(.*\.)?faphouse.*$'
- '(.*\.)?findgaytube.*$'
- '(.*\.)?fuq.*$'
- '(.*\.)?gayfuckporn.*$'
- '(.*\.)?gayfuror.*$'
- '(.*\.)?gaymaletube.*$'
- '(.*\.)?gaymenring.*$'
- '(.*\.)?gayporn.*$'
- '(.*\.)?gayporno.*$'
- '(.*\.)?gold-gay.*$'
- '(.*\.)?hdgaytube.*$'
- '(.*\.)?heavy-r.*$'
- '(.*\.)?icegay.*$'
- '(.*\.)?machotube.*$'
- '(.*\.)?mrdeepfakes.*$'
- '(.*\.)?mygaysites.*$'
- '(.*\.)?myvidster.*$'
- '(.*\.)?onlyfans.*$'
- '(.*\.)?porn.*$'
- '(.*\.)?porn300.*$'
- '(.*\.)?pornhub.*$'
- '(.*\.)?pornmd.*$'
- '(.*\.)?pornone.*$'
- '(.*\.)?redtube.*$'
- '(.*\.)?spankbang.*$'
- '(.*\.)?stripchat.com$'
- '(.*\.)?superporn.*$'
- '(.*\.)?theporndude.*$'
- '(.*\.)?thisvid.*$'
- '(.*\.)?thumbzilla.*$'
- '(.*\.)?tik.*$'
- '(.*\.)?tube8.*$'
- '(.*\.)?tube8live.com$'
- '(.*\.)?xgroovy.*$'
- '(.*\.)?xhaccess.*$'
- '(.*\.)?xham.live$'
- '(.*\.)?xhamster.*$'
- '(.*\.)?xhamsterlive.com$'
- '(.*\.)?xhopen.com$'
- '(.*\.)?xnxx.*$'
- '(.*\.)?xnxxvideo.com$'
- '(.*\.)?xvideos.*$'
- '(.*\.)?youporn.*$'
# Removed TLDs
- '.*\.ai$'
- '.*\.art$'
- '.*\.au$'
- '.*\.br$'
- '.*\.ch$'
- '.*\.dating$'
- '.*\.eu$'
- '.*\.google$'
- '.*\.gr$'
- '.*\.nz$'
- '.*\.se$'
- '.*\.uk$'
- '.*\.vg$'
In my system's hosts file:
\#Youtube Block
127.0.0.1 www.youtube.com
127.0.0.1 www.m.youtube.com
127.0.0.1 accounts.youtube.com
127.0.0.1 youtube.com
127.0.0.1 m.youtube.com
127.0.0.1 youtube-nocookie.com
127.0.0.1 www.youtube-nocookie.com
127.0.0.1 img.youtube.com
127.0.0.1 i.ytimg.com
127.0.0.1 yt3.ggpht.com
Invidious filters for Tamper Monkey (Rendering Youtube as not worth looking at anymore):
Invidious Clean View with List View of Thumbnails, and Threshold Control
And this other script takes filtering a step further:
Invidious: Remove ALL CAPS + $ + MrBeast + Keyword + Channel Filter (with exclusions) + Redirect
Invidious Clean View with List View of Thumbnails, and Threshold Control
Clean Invidious: remove short/hashtag videos, shorts links, login/subscribe prompts, with adjustable short video threshold and persistent settings.greasyfork.org
Is There An Active Networking Sub Here On Lemmy
Kind of off topic, but the venn diagrams overlap between networking and privacy. All of the subs here on Lemmy that deal with networking seem abandoned with posts 2 years old and older.
I'm aware of the self hosting sub, and the Linux sub, but after those options, there doesn't seem to be other active avenues. Apparently there was a mass migration that happened to Lemmy about 2 years ago that I'm unaware of.
Anyone have any suggestions. I didn't want to junk up the privacy sub with specific questions about networking.
'presh
Canada | 'Now is the time to talk': Carney rules out hitting the U.S. with retaliatory tariffs
PM told Stellantis he is disappointed in company's decision to move production from Ontario to Illinois
Archived version: archive.is/20251017005701/cbc.…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Pakistan: Military crackdown on pro-Palestine protesters leaves scores dead
A violent crackdown by Pakistan’s military on a mass pro-Palestine protest has left dozens dead and hundreds wounded, according to eyewitnesses and local sources. The massacre occurred near Lahore, as demonstrators attempted to march on the capital to protest Pakistan’s growing ties with Israel.
Archived version: archive.is/newest/middleeastmo…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
copymyjalopy likes this.
Global government debt on course to hit 100% of GDP by 2029, IMF warns
Ratio would be highest since aftermath of second world war, with UK among G20 countries forecast to peak above
Archived version: archive.is/20251015134239/theg…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Cancer Vaccine Blocks Multiple Tumors in Mice For 250 Days
A new vaccine can effectively prevent multiple types of cancer, with up to 88 percent efficacy for some forms of tumor in mouse tests.
Archived version: archive.is/newest/sciencealert…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
copymyjalopy likes this.
Ukrainian strikes have hurt Russia's economy more than sanctions – Ukraine's Intelligence chief
Kyrylo Budanov, Head of Defence Intelligence of Ukraine (DIU), believes that Ukrainian strikes on Russian oil refineries have caused greater damage to Russia's economy than any international sanctions.
Archived version: archive.is/20251017022116/prav…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
copymyjalopy likes this.
Trinidadian Family Says U.S. Military Killed Relative in Boat Attack
For the first time, one of the 27 people killed in U.S. airstrikes on suspected drug vessels has been publicly identified.
Archived version: archive.is/newest/nytimes.com/…
Disclaimer: The article linked is from a single source with a single perspective. Make sure to cross-check information against multiple sources to get a comprehensive view on the situation.
Open source GZDoom community splinters after creator inserts AI-generated code
UZDoom fork promises to fix other top-down leadership problems with the decades-old mod.
Auction giant Sotheby’s says data breach exposed customer information
Major international auction house Sotheby’s is notifying customers of a data breach incident on its systems where threat actors stole sensitive information, including financial details.
US ‘on a trajectory’ toward authoritarian rule, ex-officials warn
The United States is “on a trajectory” toward authoritarian rule, according to a sobering new intelligence-style assessment by former US intelligence and national security officials, who warn that democratic backsliding is accelerating under the Trump administration – and may soon become entrenched without organized resistance.The report, titled Accelerating Authoritarian Dynamics: Assessment of Democratic Decline, was released on Thursday by the Steady State, a network of more than 340 former officers of the CIA, the NSA, the state department and other national security agencies.
To conduct the assessment, the authors applied the same analytic methods used by US intelligence agencies to assess the fragility of democracies abroad but turned them inward for what the group called a “first-of-its-kind” analysis of domestic democratic decline.
“We wrote it because the same tools we once used to assess foreign risks now show unmistakable warning signs at home,” the group said in a statement upon its release.
It's one thing for the plebs to get bent out of shape. When you've got former spooks irritated the the ground is shifting so fast they eventually decided to just release the report while reserving the right to further updates, that's a far more serious situation.
US ‘on a trajectory’ toward authoritarian rule, ex-officials warn
A network of former intelligence and security officers says democratic decline is accelerating under Trump’s ruleLauren Gambino (The Guardian)
adhocfungus likes this.
Have I Been Pwned: Prosper data breach impacts 17.6 million accounts
Hackers stole the personal information of over 17.6 million people after breaching the systems of financial services company Prosper.
Abuse victims still face 'disturbing' retaliation: Vatican commission
Vatican City (AFP) – Victims of clerical sex abuse still face "disturbing" retaliation from Catholic Church leaders for speaking out despite years of efforts to tackle the global scourge, a Vatican commission said Thursday.In its second annual report, the Pontifical Commission for the Protection of Minors set out how local Catholic churches can better help survivors, highlighting "cultural resistance" that hinders action in many countries.
The document was drawn up with the contributions of 40 victims, who shared their personal stories -- and who gave what the commission described as "disturbing accounts of retaliation" by Church leaders after they reported their abuse.
"My brother was a seminarian. The bishop told my family that my complaint could affect his ordination," one recalled.
Another described how a priest in the local church publicly declared their family excommunicated after they reported the abuse.
Yet another recounted that the local bishop said nothing for months after a case was reported, then sent representatives to persuade the victim it did not happen, "saying I was making trouble".
Others cited ongoing cases of abuse in their dioceses.
One person was "aware of other priests engaging in sexual relationships with young girls and nuns", while another said that "cases of forced abortions among religious sisters are ignored by Church authorities."
The co-director of victims' rights group BishopAccountability.org, Anne Barrett Doyle, called the victim testimony "especially sobering", adding that the Church was "still failing to prioritize" the safety of children.
"The commission is to be commended for depicting how little progress the church has made in ending abuse and cover-up," she said in a statement.
The late Pope Francis set up the commission near the beginning of his pontificate in 2014, as the Catholic Church was roiled by sexual abuse scandals around the world.
After years of criticism that it was toothless, Francis integrated the panel -- which includes religious and lay experts in the field of safeguarding -- into the government of the Holy See in 2022, and requested an annual progress report.
Thursday's report emphasised the importance of listening to survivors, offering psychological and financial support, and crucially, of acknowledging and taking public responsibility for what happened.
"The Church bears a moral and spiritual obligation to heal the deep wounds inflicted from sexual violence perpetrated, enabled, mishandled, or covered up by anyone holding a position of authority in the Church," read the 103-page report, which has been shared with Pope Leo XIV.
It added: "The damage to victims'/survivors' relationship to the Church cannot be healed without the Church taking responsibility and making reparations."
Commission President Thibault Verny told AFP that, faced with "persistent systemic shortcomings", the annual report was intended as a "tool" for use across the global Catholic Church, which counts some 1.4 billion followers.
It examined in detail almost 20 countries, and highlighted cultural resistance, taboos and silence over abuse from Malta to Ethiopia, Mozambique and Guinea.
In Italy, which has strong ties to the Vatican, the report noted a "substantial cultural resistance" in addressing abuse, while reproaching its bishops for a resistance to collaborate, as only 81 dioceses responded to the commission's survey out of a total of 226.
"It is a true cry that the victims raise: they do not feel listened to, not supported, sometimes there is no empathetic relationship, nor even respect," said Bishop Luis Manuel Ali Herrera, the commission secretary, during a press conference.
Francis, who was pope from 2013 until his death in April, took numerous measures to tackle abuse, from opening up internal documents to punishing high-ranking clergy, while making it compulsory to report suspicions of sexual assault to Church authorities.
But clergy are still not required to report abuse to civil authorities, unless a country's laws require it, while any revelations made in confession remain private.
Verny said Pope Leo "took up this issue very early on" after his election in May.
However, in an interview published in September, the US pope irritated victims' associations by insisting on the need to protect priests who were falsely accused of abuse, as well as listening to survivors.
"There may be false allegations. It must be said that they are a very, very small proportion," Verny said.
But clergy are still not required to report abuse to civil authorities, unless a country's laws require it, while any revelations made in confession remain private.
Pedophiles protect other pedophiles.
Eugenia
in reply to ssillyssadass • • •How To Install ClamAV on Linux Mint 22
r00t (idroot)Tenderizer78
in reply to Eugenia • • •Zak
in reply to Tenderizer78 • • •No. ClamAV can, for example scan Linux ELF executables and its database contains signatures for malware that could affect desktop Linux. The most common use case is servers that are distributing files, but it can be used to scan local files.
The local use case is fairly rare because malware targeting desktop Linux is rare. That's partly because Linux users tend to have a better understanding of computers on average than Windows users, and partly because the sort of attack vectors that work well against Windows users don't align with Linux workflows (e.g. if you want to execute a file sent as an email attachment, you'll have to save it and set it executable first).
Multiplexer
in reply to ssillyssadass • • •So I installed one to comply. But that's it...
Multiplexer
in reply to Multiplexer • • •So I am also interested in alternatives to still be able to appease my bank.
Eugenia
in reply to Multiplexer • • •Multiplexer
in reply to Eugenia • • •And as I am only interested in installing, and not actually using, CLI-only is also fine!
monovergent
in reply to Multiplexer • • •How would they know?
Multiplexer
in reply to monovergent • • •And I would be able to answer "yes" without lying.
machiavellian
in reply to ssillyssadass • • •DISCLAIMER
I am not a computer security expert, merely a hobbyist having read some blogs from people who sounded smart. It is more than probable that I am mistaken in one or more parts of this post.
Linux is not more secure than Windows. By default, it's actually considerably more vulnerable than Windows. Source
In my opinion an antivirus doesn't really solve your problem. What you actually want is sandboxing, which means restricting user and program privileges. I recommend getting familiar with SELinux (or alternatively AppArmor, although it isn't nearly as effective) and bubblewrap (or alernatively Firejail, which requires root privileges to run and is thus a bigger threat vector than bubblewrap).
Aside from that just disable any service you aren't using (like ssh), use a deny-all-allow-some firewall, and verify what you download. If the link says "100% REAL 1 MILLION FREE ROBUX DOWNLOAD CLICK HERE NOW", then maybe don't click there.
Because even an antivirus won't help you if you download malware, which isn't compiled by skids who lifted the code from some darknet hacker forum. Antivirus isn't some magical tool which makes your computer inherently more secure. Meaning you can't offload your responsibilty to a program running with kernel level privileges. Your computer, your responsibilty.
P.S: If you want a more secure computer, I'd recommend a minimal and/or rolling release distro (openSUSE, Arch, Void, Debian) or FreeBSD/OpenBSD (BSD variants mitigate many of Linux's inherent flaws).
Linux | Madaidan's Insecurities
madaidans-insecurities.github.ioEk-Hou-Van-Braai
in reply to machiavellian • • •The best security is to limit your risk vector.
Like you said Anti-viruses aren't some magic bullet, in university a bunch of us wrote Malware and wrecked each other's lab computers or did things like having the whole Lab's computers CD trays open at 10am every morning.
The AV didn't pick up any of them and we barely knew what we were doing.
Afik, AV's mostly scan for known threats
frongt
in reply to Ek-Hou-Van-Braai • • •Ek-Hou-Van-Braai
in reply to frongt • • •I'd be curious to rewrite some of the malware we made in class and see if AVs would pick it up now.
Most of them didn't make any network calls etc. they would just mess with your files and system
Things like Set background to Justin-Bieber, play Justin-Bieber randomly, we were very mature
utopiah
in reply to Ek-Hou-Van-Braai • • •DeuxChevaux
in reply to ssillyssadass • • •I run ClamAV regularly, and it has not found anything on my several systems in the last 20 years. Good to know we're safe, or are we?
I'm more concerned about rogue browser extensions that may be innocent when you install them, but then change owners, and after an update that you don't even notice are going to do bad things.
monovergent
in reply to DeuxChevaux • • •Exactly why the only extensions on my browser are uBlock Origin and LibRedirect. Was a victim of one user agent switcher extension that went rogue back in the day.
hendrik
in reply to ssillyssadass • • •Linux Antivirus is a very specific niche. It's mostly there to scan for Windows viruses and malware. So your Linux mailserver for example (or storage system) filters those out before they appear on your employee's computers.
What you'd instead do in Linux is harden your webserver and services, keep the webservices you host up to date and have some monitoring so you detect known rootkits or if your DNS server gets abused for a DDoS attack. And keep an eye on supply chain attacks if you're a developer. Because that's how attacks against Linux work. I've been scolded for saying this on Lemmy, but to this date, desktop computer malware isn't really a thing with Linux. Attacks almost exclusively target webservers and Internet of Things devices, routers and so on.
So an Antivirus on a desktop computer isn't going to do much, due to the lack of malware which works that way. And you'd still be vulnerable if someone hands you a malicious bash script to delete your home directory. It could however do something if you run Proton or Wine and run Windows programs in Linux.
If you want to do something for security, learn not to copy-paste stuff into the command line. Don't run executables from random places of the internet. Try to rely on your distribution's package repository. Do automatic updates, and generally do timely updates, especially with the webbrowser and stuff that's reachable from outside. Set strong passwords. And don't neglect your backups. Your harddisk is bound to fail anyway, eventually. I think that's going to get you 99% of the way. Installing an antivirus is only the next 0.2%.
SOULFLY98
in reply to ssillyssadass • • •Install the apparmor profiles and extra profiles packages from the apt repository. They are sensible restrictions on common apps (web browsers) to prevent anything malicious from happening if they are ever hijacked. Make sure apparmor is enabled. This will do more to keep you secure than an antivirus.
If you insist on an AV, install ClamAV and have it scan weekly. It's libre software and works well with Linux.
Günther Unlustig 🍄
in reply to ssillyssadass • • •None at all tbh, at least if you use the PC alone and don't share a lot of stuff with Windows devices. If you do, then maybe scan .exe or other files (e-mail attatchments, etc.) with ClamAV or similar to prevent spreading stuff.
You usually don't need AV software because you install stuff differently than on Windows. You don't hunt .exe-files from random internet sites, thats irresponsible even for Windows.
You install your apps directly from your software center (a frontend for Flatpaks and repo software), where they usually are pretty safe.
Also, sandboxing is a thing. The prefered way for most people (and often default) is via Flatpak, where apps are restricted on what they can access and do. You can lock them down even further if you want.
There are more ways of sandboxing, but those are not so relevant here right now.
Also:
- If you run a script, check it first. I have zero clue in regards of coding, but even I can usually guess what each line is supposed to do.
- Don't add 3rd party repos if you can, use containers instead
- Go for the easiest route, guides for "Linux" aren't noob friendly. In your case, search for "Mint" instead, most stuff is pretty easy there.
Ⓜ3️⃣3️⃣ 🌌
in reply to ssillyssadass • • •PearOfJudes
in reply to ssillyssadass • • •sylver_dragon
in reply to ssillyssadass • • •Ultimately, it's going to be down to your risk profile. What do you have on your machine which would wouldn't want to lose or have released publicly? For many folks, we have things like pictures and personal documents which we would be rather upset about if they ended up ransomed. And sadly, ransomware exists for Linux. Lockbit, for example is known to have a Linux variant. And this is something which does not require root access to do damage. Most of the stuff you care about as a user exists in user space and is therefore susceptible to malware running in a user context.
The upshot is that due care can prevent a lot of malware. Don't download pirated software, don't run random scripts/binaries you find on the internet, watch for scam sites trying to convince you to paste random bash commands into the console (Clickfix is after Linux now). But, people make mistakes and it's entirely possible you'll make one and get nailed. If you feel the need to pull stuff down from the internet regularly, you might want to have something running as a last line of defense.
That said, ClamAV is probably sufficient. It has a real-time scanning daemon and you can run regular, scheduled scans. For most home users, that's enough. It won't catch anything truly novel, but most people don't get hit by the truly novel stuff. It's more likely you'll be browsing for porn/pirated movies and either get served a Clickfix/Fake AV page or you'll get tricked into running a binary you thought was a movie. Most of these will be known attacks and should be caught by A/V. Of course, nothing is perfect. So, have good backups as well.
utopiah
in reply to ssillyssadass • • •Nothing needs an antivirus if you backup your data properly.
PS: I'm getting downvoted for this so I'll explain a bit more : if you backup properly, you can restore your data. Sure your system is fucked... but who cares? In fact if you care for your OS installation then right away it shows you are NOT in a reliable state. You install another OS and start from there. Maybe it's not even due to a virus, maybe your hardware burns in fire, same situation so IMHO a working backup (and by working I mean rolling, like TODAY it's done without your intervention) then you restore. Also please don't tell me about ransomware because even though it is a real threat, if you do your backups properly (as in not overwritting the old ones with the new ones) then you are still safe. It can be as basic as using
rdiff-backup
. It's fundamental to understand the difference between what's digital and what is not digital.ssillyssadass
in reply to utopiah • • •utopiah
in reply to ssillyssadass • • •golden_zealot
in reply to utopiah • • •utopiah
in reply to golden_zealot • • •That doesn't make much sense to me, one backup data, not executables or system. Even if they were to be saved in the backup then they wouldn't get executed back.
Anyway, that's still conceptually interesting but it's so very niche I'd be curious to hear where it's being used, any reference to read on where those exist in the wild?
golden_zealot
in reply to utopiah • • •They usually embed themselves in within the system files and have some scheduled job that basically checks for the criteria - if you are only backing up and restoring user data then it's a non-issue, but if you do a full recovery including the system files/the system scheduler etc, then it can happen, and it is often necessary to backup executable and system files for production environments (true, not so much for individual users and their systems).
When I was working in an IT shop, one of our clients was ransomwared with this method. The saving grace for us in that instance is that our backups were going to a product that allowed you to easily break open and dissect the compressed backups pre-recovery, so we were able to determine where the malicious files were and kill them before pushing the backups. Of course we only noticed that it was in the backups after we had tried to push the backups once already, so it was quite the timely process - I think I worked for something like 18 hours that day.
You can read about such malware if you search for "timebomb malware" or "malware does not execute until date" etc.
The attack is not super common anymore, but still happens.
For example, here is an article discussing time bomb methods on linkedin.
linkedin.com/pulse/time-bombs-…
Another on the knowbe4 blog:
blog.knowbe4.com/ransomware-ca…
Ransomware Can Destroy Backups In Four Ways
Stu Sjouwerman (KnowBe4, Inc.)utopiah
in reply to golden_zealot • • •golden_zealot
in reply to utopiah • • •Oh for sure - I think that this method has more efficacy in production environments ran by small businesses anyway, since best practices are rarely followed in many of them (until something happens that changes their mind on what they budget for haha), and even at that it is still a rare attack to see.
I am unaware of this type of attack ever occurring on a persons personal network, most likely because so few end users make backups, there is no need to go through the trouble of doing this, making this method useful only in highly targeted attacks.
We are definitely in agreement on proper backups still being the best method to recover from the vast majority of problems - even this one, depending on the backup solution.
Majestic
in reply to ssillyssadass • • •I would say there are not any worth recommending and that best practices are avoiding running random scripts you don't understand, keeping software up to date with package managers, and using virtualization tools. Also look into Portmaster perhaps which is an interactive firewall.
::: spoiler Meta rant on this subject
What frustrates me about the answers these questions get is no one ever offers tools comparable to Windows tools, perhaps I think increasingly because they simply don't exist outside of very expensive subscription enterprise offerings that require plunking down no less than a thousand dollars a year. (Certainly none of the major AV vendors offers consumer Linux versions of their software though most offer enterprise endpoint Linux that comes with the caveat of minimum spends of several hundred dollars if not several thousand a year)
ClamAV is primarily a definition AV, the very weakest and most useless kind. Sure it's kind of useful to make sure your file server isn't passing around year old malware but it's basically useless for real time prevention of emerging and unknown threats. For that you needs HIPS, behavior control, conditional/mandatory access control, heuristics, etc. ClamAV has one of the worst detection rates in the industry. It's just laughably bad (often under 60%) so it's really not a front line contender at all.
Compare clam to consumer offerings with complex behavioral control like ESET, Kaspersky, etc that offered "suite" software that featured the aforementioned HIPS, behavioral control, complex heuristics to detect and in real time block malware-like behavior (for example accessing and then seeking to upload your keepass database files or starting to surreptitiously encrypt all your user files using RSA4096) and it just isn't in the same ballpark as anything competently done in the last 20 years.
I haven't used or relied on a traditional AV for definition detections for years. They're worthless, it's impossible to keep up. The AV's I've deployed are for their heuristics, behavior control, HIPS, etc which actually stops new and emerging and unknown threats or at least puts real obstacles in their way. So what Linux needs, what users need is software like that, forget the traditional virus definitions, something with behavior control, HIPS, and some basic heuristics for "gee this sure looks like malware behavior, better ask the user whether they want and intend this".
"Just be smart about what you run" isn't a realistic solution when people say Linux is for everyone including their tech illiterate relatives. Yes, Linux is a lot safer if you just install things from package managers but that isn't bulletproof either as we've seen a number of spectacular impact upstream malware insertions into build repos for huge software projects in recent years.
Just maintain back-ups isn't helpful with smart cryptolocker software which may hide itself for weeks or months and encrypt your files as you back them up. Nor does it protect against account compromise from all your passwords being stolen or a keylogger. Nor does it defend you against persecution after being hit by mercenary/government police-ware and spyware from overreaching governments and makes the bar for them getting evidence you're an illegal gay person or whatever that much lower technically in terms of capabilities.
Back-ups are disaster recovery. Everyone should have them but part of a layered defense is preventing the disaster and inconvenience and invasion of privacy and so on before it happens. Having your identity stolen or accounts taken over isn't as simple as reverting to a back-up, it can result in hours, days of phone calls, emails, stress, hassle, etc that can drag on for weeks or months.
Portmaster is a start for this type of system control and protection as it's a very effective interactive firewall but as far as I know there aren't any consumer available comprehensive behavior control + HIPS type Linux desktop security solutions. There are several vendors of default deny mandatory access control with interactive mode for Windows but none offer solutions for Linux that aren't part of enterprise sized contracts beyond affordability and reason. If anyone knows otherwise I would love to know of these solutions as I want to implement them on my Linux machines as I am not comfortable with just my network IPS and firewall solutions by themselves without comprehensive end-point security.
:::
corsicanguppy
in reply to Majestic • • •When you're not on the car lot, the word is "budgets".
Quazatron
in reply to ssillyssadass • • •I just want to add that you that you can also setup multiple user accounts for different uses. One for banking, one for gaming, one for downloading random crap. It will not protect against privilege escalation attacks but will help against random scripts exfiltrating your personal documents.
Another nice layer is containers and containerized applications (flatpaks, bubblewrap, etc). Each app will be somewhat limited in what damage it can do.
Running pi-hole as your DNS or using some other filtered DNS provider (Mulvad or others) will also protect you from some shady sites.
rozodru
in reply to Quazatron • • •woodsb02
in reply to ssillyssadass • • •Install Lenspect on Linux | Flathub
Flathubnotarobot
in reply to ssillyssadass • • •☂️-
in reply to notarobot • • •TeddE
in reply to ☂️- • • •☂️-
in reply to TeddE • • •CrackedLinuxISO
in reply to ☂️- • • •Wine is not an emulator. It's not sandboxed either. If you can do it as a user, a program running in wine can do it too.
There's nothing stopping a piece of malware from crawling your disk for sensitive information, or encrypting your files for ransom.
JustEnoughDucks
in reply to CrackedLinuxISO • • •CrackedLinuxISO
in reply to JustEnoughDucks • • •I wouldn't think so. Isn't bottles just an easier way to manage wine prefixes? If so, it doesn't do anything to hide your Linux system from the executable.
Wine prefixes are not sandboxes. They are a way to separate the windows-level configuration for different programs (eg env vars, or drivers, etc).
Wine is a translation layer between a compiled windows binary and your Linux syscalls/libraries/device drivers/etc, nothing more.
JustEnoughDucks
in reply to CrackedLinuxISO • • •notarobot
in reply to ☂️- • • •☂️-
in reply to notarobot • • •balance8873
in reply to ☂️- • • •☂️-
in reply to balance8873 • • •agreed. increased linux market share will come with some disadvantages.
nothing we won't be able to surmount, we have already been building solutions.
Krudler
in reply to notarobot • • •TMP_NKcYUEoM7kXg4qYe
in reply to notarobot • • •Brodie Robertson made a video about malware which pretends to be a pdf but is actually just an executable with a
.pdf
file extension. So if you double click it, you get pwnd. I think some desktop environments ask you for confirmation before running such thing but I would not count on it.So we even have an example of Linux specific malware.
KaninchenSpeed
in reply to TMP_NKcYUEoM7kXg4qYe • • •TMP_NKcYUEoM7kXg4qYe
in reply to KaninchenSpeed • • •balance8873
in reply to ssillyssadass • • •I think the security thing is very arguable at this point. Windows and macos are both extremely secure (from threats external to the companies that made them).
Linux still has heavy reliance on running install scripts as root. Flatpak avoids that but has its own issues. Docker has its own suite of issues. Snap is just issues.
redhilsha
in reply to ssillyssadass • • •tiny
in reply to ssillyssadass • • •foremanguy
in reply to ssillyssadass • • •No antivirus is needed if you know what you're doing.
If you don't, don't do it or document yourself on.
Communist
in reply to ssillyssadass • • •Matt
in reply to ssillyssadass • • •