• 0 Posts
  • 24 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle
  • enjoying personal freedom : not subject to the control or domination of another

    Merriam webster dictionary definition 2D.

    That is a definition people use when discussing libre software. The software is under YOUR control. If adobe says “fuck you, you don’t get the brush tool anymore” thats it for the brush tool. If gimp gets rid of a feature in the main branch, you can say “no fuck you I like this tool” and can just keep the code base that included it still.

    Also you have a rather perscriptive understanding of language, which just simply isn’t how language works. Languages evolve over time. Open up a dictionary and see how many definitions are listed as antiquated. Those are definitions that aren’t used anymore as they fell out of favor.

    Now get off your high horse about how words aren’t the same as they used to be or how words are frozen to definitions.








  • Ye, it’s a real thing. A quick google search for the term “companies that buy software exploits” lead me to the following real companies that will buy exploits you find; zerodium, offensive cyber, and vupen. In fact, zerodium currently has a $400,000 bounty for an exploit for microsoft outlook. It’s very useful for say something like a government to know about these hacks in case say they want to hack someone. For example stuxnet was written by the US to fuck with Iranian centrifuges.

    Pegasus isn’t just a single exploit. It uses many and every patch to an OS doesn’t fix every single exploit so there’s always another way Pegasus can break into the system. Also, do you think that with every update to iOS the developers are rewriting their entire code base? I’ve written lots of updates for my software and I almost never scrap the entire thing when I need to do rewrites.

    Again, Apple, a 2 TRILLION dollar company, can only fix exploits they know exist.


  • Theres literally a functioning business model of “find zero-day exploits for software X and sell that info to the highest bidder”. There is actively many huge bounties for currently working exploits that you, random dude on the internet, can get if you can show that an unknown bug can be used to gain access to some software. Pegasus is one of the groups buying the exploits and then using it.

    It is a perpetual cat and mouse game. Every time that Apple is made aware of an exploit they patch it asap, but that doesn’t mean they’ve fixed every exploit. You can’t fix a bug unless you know it’s there.