Author: ProHoster

Attack of the week: voice calls in LTE (ReVoLTE)

From the translator and TL;DR TL;DR: VoLTE seems to be even worse secure than the first Wi-Fi clients with WEP. An exceptional architectural miscalculation that allows you to XOR traffic a little and restore the key. The attack is possible if you are near the caller and he often makes calls. Thanks for the tip and TL;DR Klukonin Researchers made an application to determine if your operator is vulnerable, more […]

Instagram stored deleted user messages and photos on its servers for over a year

When you delete something from Instagram, you obviously expect it to be gone forever. However, in reality it turned out that this was not the case. IT security researcher Saugat Pokharel managed to obtain copies of his photos and posts that were deleted from Instagram more than a year ago. This indicates that information deleted by users […]

Dieselgate in the US will cost Daimler almost $ 3 billion

German automaker Daimler said Thursday it had reached an agreement to settle investigations by U.S. regulators and lawsuits from vehicle owners. The settlement of the scandal, which arose in connection with the installation of software in cars for the purpose of falsifying diesel engine emissions tests, will cost Daimler almost $3 billion. The settlement […]

Instagram will ask you to verify the identity of the owners of "suspicious" accounts

The social network Instagram continues to increase its efforts to combat bots and accounts that are used to manipulate users of the platform. This time, it was announced that Instagram will ask account holders suspected of “potentially inauthentic behavior” to verify their identity. The new policy, according to Instagram, will not affect the majority of users of the social network, since it […]

Kosmonaut browser engine written in Rust introduced

As part of the Kosmonaut project, a browser engine is being developed, written entirely in the Rust language and using some of the developments of the Servo project. The code is distributed under MPL 2.0 (Mozilla Public License). OpenGL bindings gl-rs in Rust are used for rendering. Window management and OpenGL context creation are implemented using the Glutin library. The html5ever and cssparser components are used to parse HTML and CSS, […]

Firefox Nightly Builds Add Support for WebRTC Acceleration via VAAPI

Nightly builds of Firefox have added support for hardware acceleration of video decoding in sessions based on WebRTC technology, used in web applications for video conferencing. Acceleration is implemented using VA-API (Video Acceleration API) and FFmpegDataDecoder, and is available for both Wayland and X11. The X11 implementation is based on a new backend that uses EGL. To enable acceleration in […]

Paragon Software Releases GPL Implementation of NTFS for Linux Kernel

Konstantin Komarov, founder and head of Paragon Software, published on the Linux kernel mailing list a set of patches with a full implementation of the NTFS file system that supports read-write mode. The code is open under the GPL license. The implementation supports all the features of the current version of NTFS 3.1, including extended file attributes, data compression mode, effective work with empty spaces in files […]

BPF for Linux Monitoring Book

Hello Habrites! The BPF virtual machine is one of the most important components of the Linux kernel. Its competent application will allow system engineers to find failures and solve even the most complex problems. You will learn how to write programs that monitor and modify kernel behavior, how to safely inject code to monitor kernel events, and much more. David Calavera and Lorenzo Fontana will help you discover […]

Monitoring of production equipment: how are things in Russia

Hey Habr! Our team monitors machines and installations all over the country. In fact, we provide the manufacturer with the opportunity not to drive the engineer once again, when “oh, it’s all broken”, but in fact, you need to press one button. Or when it broke not on the equipment, but nearby. The basic problem is the following. Here you are producing an oil cracker, or […]

How to troubleshoot domestic IPsec VPN. Part 1

Situation Output. I drink coffee. The student set up a VPN connection between two points and disappeared. I check: the tunnel really exists, but there is no traffic in the tunnel. The student does not answer calls. I put the kettle on and dive into the troubleshooting S-Terra Gateway. I share my experience and methodology. Initial data Two geographically separated sites are connected by a GRE tunnel. GRE needs to be encrypted: Checking if GRE works […]

Overview of computers with the Elbrus processor. Accessories and tests.

Video blogger Dmitry Bachilo, specializing in computer topics, released a review of two different computers based on Elbrus processors. One is based on Elbrus 1C+, the other is Elbrus 8C. In the videos you can see their insides, admire not only Russian processors, but also the domestic SSD, motherboard and more. The performance tests he conducted showed the following results: Benchmark […]

Towards serverless databases - how and why

Hi all! My name is Golov Nikolay. Previously, I worked at Avito and managed the Data Platform for six years, that is, I was involved in all databases: analytical (Vertica, ClickHouse), streaming and OLTP (Redis, Tarantool, VoltDB, MongoDB, PostgreSQL). During this time, I dealt with a large number of databases - very different and unusual, and with non-standard cases of their use. Now […]