GenitalHurricane

@GenitalHurricane@lemmy.world
0 Post – 14 Comments
Joined 12 months ago

This loser works cashier at a gas station in a racist town until evidence is provided to counter my obvious facts

7 more...

Not you

So nothing ... Ok

2 more...

Libmanwe-lib.so is a library file in machine language (compiled). A Google search reveals that it is exclusively mentioned in the context of PDD software—all five search results refer to PDD’s apps. According to this discussion on GitHub, “the malicious code of PDD is protected by two sets of VMPs (manwe, nvwa)”. Libmanwe is the library to use manwe.

An anonymous user uploaded a decompiled version of libmanwe-lib to GitHub. It reads like it is a list of methods to encrypt, decrypt or shift integer signals, which fits the above description as a VMP for the sake of hiding a program’s purpose.

In plain words, TEMU’s app employed a PDD proprietary measure to hide malicious code in an opaque bubble within the application’s executables

1 more...

Came to the comments for the 'blame USA' and was not disappointed.

Own your own policy flaws. Own your own nutters.

Surprised I've not seen anyone mention shutup10. Been using it on all new installs for me and family since migrating from 7 to 10 Turn off anything you want, including all that bullshit and the data mining etc. https://www.oo-software.com/en/shutup10

$0.25 a box from our ice cream guy. They'd be powdery from rubbing on each other in the box so you could put one in your mouth and blow out and make a little puff cloud and look cool as fuck

Then we all started smoking

  1. Dynamic compilation using runtime.exec(). A cryptically named function in the source code calls for “package compile”, using runtime.exec(). This means a new program is created by the app itself.—Compiling is the process of creating a computer executable from a human-readable code. The executable created by this function is not visible to security scans before or during installation of the app, or even with elaborate penetration testing. Therefore, TEMU’s app could have passed all the tests for approval into Google’s Play Store, despite having an open door built in for an unbounded use of exploitative methods. The local compilation even allows the software to make use of other data on the device that itself could have been created dynamically and with information from TEMU’s servers.

Ah yes, delete your original incorrect comment instead of continuing the discussion about how wrong and lazy it was to make, nice.

Great timing on this article and a new episode about Tyson from one of my favorite podcasts

https://pca.st/episode/f7d0725d-dcf7-4d63-8db3-269401469e4b

Meanwhile, I can't view a single Google service without ads for Temu being pushed hard all over my shit despite it literally being spyware

I got out of a 7 year retail streak and into technology through support. Many organizations or BPO's see a lot of churn in technical customer support and have on the job training to get your feet wet. Then the ones who stick around and learn the product move up or laterally within the organization. A good org will farm from support. A good org will provide up-skill and training opportunities, subsidies etc to help people progress their career and stay at the company.

Find a local call center or look for remote support jobs if you are tired of retail and then use the company perks to progress.

Source: I left retail for tech support in 2012, 2 years at a BPO, 8 years working with varying tech and progressing titles learning new things and getting free certifications. Now I manage a support team of 14 because I like helping people. Former colleagues from the same BPO are now directing program management, engineering teams, development etc.

1 more...

If you've ever been put on hold or had long moments of silence while dealing with support, large chance the person helping you is dealing with the same issues. Sure beats dealing with shit customers face to face though!