

I believe nothing in the podman rm
family worked because the container was already gone - it was just the IP allocation that was left.
I believe nothing in the podman rm
family worked because the container was already gone - it was just the IP allocation that was left.
Google released the stable version of Chrome, and funneled significant resources into marketing it. This was the first stage of their strategy - they focused on firstly making a good product, and the squeeze on users only came later (and is probably only just starting in the scheme of things).
I wonder if this is social engineering along the same vein as the xz takeover? I see a few structural similarities:
My advice to those attacked here is to keep up the good work on Nix and NixOS, and don’t give in to what could be social engineering trying to manipulate you into acting against the community’s interests.
Most of mine are variations of getting confused about what system / device is which:
sudo pm-suspend
on my laptop because I had an important presentation coming up, and wanted to keep my battery charged. I later noticed my laptop was running low on power (so rushed to find power to charge it), and also that I needed a file from home I’d forgotten to grab. Turns out I was actually in a ssh terminal connected to my home computer that I’d accidentally suspended! This sort of thing is so common that there is a package in some distros (e.g. Debian) called molly-guard specifically to prevent that - I highly recommend it and install it now.more is a legitimate program (it reads a file and writes it out one page at a time), if it is the real more
. It is a memory hog in that (unlike the more advanced pager less
) it reads the entire file into memory.
I did an experiment to see if I could get the real more
to show similar fds to you. I piped yes "" | head -n10000 >/tmp/test
, then ran more < /tmp/test 2>/dev/null
. Then I ran ls -l /proc/`pidof more`/fd
.
Results:
lr-x------ 1 andrew andrew 64 Nov 5 14:56 0 -> /tmp/test
lrwx------ 1 andrew andrew 64 Nov 5 14:56 1 -> /dev/pts/2
l-wx------ 1 andrew andrew 64 Nov 5 14:56 2 -> /dev/null
lrwx------ 1 andrew andrew 64 Nov 5 14:56 3 -> 'anon_inode:[signalfd]'
I think this suggests your open files are probably consistent with the real more
when errors are piped to /dev/null
. Most likely, you were running something that called more to output something to you (or someone else logged in on a PTY) that had been written to /tmp/RG3tBlTNF8
. Next time, you could find the parent of the more process, or look up what else is attached to the same PTS
with the fuser
command.
Cloudflare are notorious for shielding cybercrime sites. You can’t even complain about abuse of Cloudflare about them, they’ll just forward on your abuse complaint to the likely dodgy host of the cybercrime site. They don’t even have a channel to complain to them about network abuse of their DNS services.
So they certainly are an enabler of the cybercriminals they purport to protect people from.