Hacker Newsnew | past | comments | ask | show | jobs | submit | mbilker's commentslogin

You should! It would be even better if it can integrate with another disassembler as a plugin if said disassembler allows for this.

What in that act says OpenWrt would be made illegal? If anything, OpenWrt would roll out automated security updates for a supported branched release to comply with these regulations.

Also, if you actually read it, there are exceptions for open source software!


OP claims almost daily that some benign thing is actually illegal but practically never provides any useful proof when asked.

(please prove me wrong, Alex)


WSL 2 runs a full Linux kernel under Hyper-V. There are some out-of-tree or staging drivers included in Microsoft's Linux kernel derivative and they publish their kernel sources at https://github.com/microsoft/WSL2-Linux-Kernel.


i routinely upgrade my WSL2 kernel. Now on 6.6.87.1. Personally, I love WSL2.


There are many card types (notably the Japanese transit cards using the Suica system) that will change their UID when moved between iOS devices.


Yes, it does explain it.

    What makes this card powerful, lies in the way it changes how NFC behaves on your device when it's set as a default transit card:

    Your device stops randomizing the UID on each tap;
    Your device begins responding to all NFC readers as if they were express-transit enabled, just like on Android;
    Also this card does not change its serial number and UID when moving to other devices, unlike most other ones.
https://github.com/kormax/apple-device-as-access-card?tab=re...


That's explaining some specific technical properties of how this particular NFC card works, it not explaining what the implications of that are.


It's explaining what sets this NFC card applet apart from others on iOS and why it is ideal for use in a UID-based access control system.


I guess what I am saying is: it doesn’t explain the problem it is solving very well. It doesn’t say what the default behavior is for other cards set as transit cards do (I would expect it to work the same way-ish) and how transit providers are supposed to match people to tickets, etc. then why this particular card is special. It assumes you know.


That whole "The solution" section does explain this.

"what the default behavior is for other cards set as transit cards" statement is countered by the article "Your device stops randomizing the UID on each tap". Granted, I know this part because in the past Google Pay on Android would randomize the UID on each read and on Apple devices transferring cards between devices would reinitialize the UID but would keep some application-specific (like a Suica card identifier) static, thus making these virtual cards unsuitable for UID-based identification for access control.

"how transit providers are supposed to match people to tickets" is not relevant to the premise of "This repository describes general status on the topic and a possible solution to allow you to use your device as an access card in UID-based access systems." In general, these are stored fare cards so they do not store a ticket and instead store an available balance.


Maybe it was updated then.


If you are using `wg-quick`, then you need `Table = off` to disable adding routes to the system route table automatically. After that, then you can add routes manually.


This is the answer. I too ran into the same issue. Took me awhile to figure this part out.


Upstream OpenWrt does not use `wappd` so it should not be affected.


Interesting. The bulletin lists "OpenWrt 19.07, 21.02 (for MT6890)" as vulnerable, but OpenWRT had indeed no security advisory out for this:

https://openwrt.org/advisory/start

Maybe MediaTek has shipped some modified versions of OpenWRT using this "wappd" thing to their B2B customers (as part of the SDK perhaps?) and are now advertising those as vulnerable.


Yes, I'm assuming that's exactly why OpenWrt is mentioned but it's very misleading.

The OpenWrt folks generally have good enough taste not to ship any drivers or userspace junk from vendor SDKs, though they do have a fair-sized set of backport patches on top of the (somewhat elderly) mainline kernels they do ship.

I'm running up-to-date mainline on my routers, not OpenWrt kernels. The mt76 support in 6.11 (and previously in 6.9 and 6.10) is complete enough that I don't need to carry any patches at all over what's in Linus' tree.


The Hard Drive is a satirical news site like The Onion. They even say they are satire on their about page [1].

[1] https://hard-drive.net/about/


I agree with all of your points here. I also noticed that the iOS notifications got an "upgrade" recently with photo previews and user avatar icons now being present in the notifications.

On the note of mobile, I do know plenty of people I talk to on Discord with Android devices dislike the native Android to React Native update which slowed down Discord to the point where people risk bans by modding the older native Android client to continue working with modern Android.


They are trying to get off or have gotten off their kernel fork called "Prodkernel" for some time now.

https://lwn.net/Articles/871195/ https://events.linuxfoundation.org/wp-content/uploads/2022/0...


And ProdKernel generally lags mainstream by only a few years, as can be seen in the things you linked to.

The change being talked here is moving from merge ~2 years to merge all the time. Saying they're stuck on something from 1999 is ridiculous.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: