Readit News logoReadit News
mongrelion commented on Tj-actions/changed-files GitHub Action Compromised – used by over 23K repos   stepsecurity.io/blog/hard... · Posted by u/varunsharma07
v1sionSec · 6 months ago
Thank you, unfortunately we have a multiple of repositories with multiple runs that use this action so checking the logs one by one will be hard. Any idea how to get all logs? Thank you
mongrelion · 6 months ago
I think your best bet is to traverse all the pipeline logs that make use of the action using Github's REST API.

It should be easy to do with thr Github CLI tool and some bash scripting.

Not sure how easy it'll be to parse the logs to look for a base64 string but it shouldn't be that complicated either.

mongrelion commented on Ask HN: Cheapest way to run a time-series database in cloud?    · Posted by u/cedws
mongrelion · 7 months ago
Is the cloud a must? What kind of performance are you after? You could repurpose an old desktop computer / server, slap a 4TB HDD on it and have it run at home or in your office.

The longer you use it, the cheaper it gets.

mongrelion commented on The Battery Revolution Is Finally Here   insideevs.com/features/73... · Posted by u/xbmcuser
pmontra · 10 months ago
“The new cell that [Molicel is] coming out with, the X series, boy, they’re claiming they can charge that from zero to 100% in 90 seconds,”

That's great but how do we push all that energy into the battery at home in just 90 seconds? OK, we can push it in maybe 9 hours at home and still be happy so another question: what kind of equipment would back a charging station on a highway to make it able to charge a few of those batteries at the same time?

mongrelion · 10 months ago
> how do we push all that energy into the battery at home in just 90 seconds?

If they are talking about an individual cell with a nominal voltage of 3.7V, then "any" modern fast charger will do.

I don't think they were talking about a full-blown EV power bank.

mongrelion commented on Show HN: OneUptime – open-source Datadog Alternative   github.com/OneUptime/oneu... · Posted by u/devneelpatel
Rapzid · a year ago
Lot of interesting OSS observability products coming out in recent years. One of the more impressive(and curious for many reasons) IMHO is OpenObserve: https://github.com/openobserve/openobserve .

As opposed to just a stack, they are implementing just about the whole backend shebang from scratch.

mongrelion · a year ago
Thanks for sharing this.

Others have mentioned Signoz which I have tried but for my homelab it just feels like too much.

OpenObserve might be the solution that I have been looking for.

mongrelion commented on Nintendo emulator 'Suyu' removed from Gitlab following DMCA request   overkill.wtf/suyu-emulato... · Posted by u/brandrick
yellow_lead · a year ago
Still up here: https://git.suyu.dev/suyu/suyu

Fuck Nintendo

mongrelion · a year ago
Do you know if there is something similar for yuzu? did their code find a new home? forks are meh.
mongrelion commented on Swedish data brokers claim journalists' legal protection to evade EU law   noyb.eu/en/swedish-data-b... · Posted by u/dotcoma
Kiro · a year ago
I don't know how this would actually fix anything. You can get the same information on a person by simply calling the tax authorities since it's public information in Sweden. MrKoll is just publishing it on a website.
mongrelion · a year ago
Perhaps this is more security by obscurity but making it easier on criminals to find your personal information is not necessarily a good thing.

Imagine being a criminal and now you want to find your victim's personal information and you directly call Skatteverket...

Less compelling than going to hitta.se from a public, open wifi network

mongrelion commented on Swedish data brokers claim journalists' legal protection to evade EU law   noyb.eu/en/swedish-data-b... · Posted by u/dotcoma
eesmith · a year ago
> Personal data used by gangs and criminals. One example of what the public sale of data by companies like MrKoll can lead to is illustrated by a “Guardian” report about rival gangs using data brokers to learn the geographical location of their opponents to carry out attacks.

I remember reading that Guardian report when it was linked here on HN, at https://news.ycombinator.com/item?id=39334413.

As I complained then, it gave no evidence that gangs used data brokers to get this information, only writing "Experts say criminals are being greatly helped by a 248-year-old law, forming part of Sweden’s constitution."

Who are those experts? Where is the evidence that the bombers used a data broker to find their target, or that removing this information from the public would have changed anything?

mongrelion · a year ago
I don't know if this is going to help you answer your questions but here is some background information: 1. In Sweden you must be registered at an address for all purposes (taxes, health care, official communications, etc.). 2. On websites like MrKoll's, all you need is a phone number to find someone's home address (you can also find someone's phone number using their home address).

Based on these two facts, all the bomber planning the attack needs is a phone number to find out the address. If the victim is using a burner phone (which, by the way, have become illegal in Sweden since 2023, now all "kontantkort" or anonymous simcards can't be anonymous, they have to be registered to someone's name, and you can only do that with a valid ID), they can otherwise target one of their family members.

> Where is the evidence that the bombers used a data broker to find their target

The writing is on the wall. This is a free service. Why wouldn't they?

> removing this information from the public would have changed anything?

The problem is that these companies (like MrKoll there are others) are abusing the media license they have been granted, not only violating rights that have been well established in the EU (which Sweden is a part of) but also they are making an already vulnerable population even more vulnerable.

Grandmas and Granpas are being targeted by scammers with all sorts of schemes, and where do they get phone numbers and also a quick profile of the target? via these websites.

So yeah, removing this information from the public would change something, perhaps not necessarily to the gang wars, but for sure for the safety of the public in general (gang family members would be harder to find).

mongrelion commented on Power Metal: is it really about dragons? (2018)   notes.atomutek.org/power-... · Posted by u/guardienaveugle
Bahamut · 2 years ago
The trademark dispute was with the Rhapsody streaming service - I don't think it was ever announced, but I suspect the streaming service paid them money to change their name since the band definitely came first.
mongrelion · 2 years ago
I remember when this happened.

I tried googling a bit but I couldn't find quickly enough an article that mentions Rhapsody, the streaming service, as the other party in the trademark dispute.

However, I do remember the whole thing when it happened because I had just discovered the band.

Feels like ages ago

mongrelion commented on Deno in 2023   deno.com/blog/deno-in-202... · Posted by u/spiros
mongrelion · 2 years ago
Slightly off topic but I just came here to show appreciation for the hang glider in the picture.

Shout out to all my fellow hang gliders.

mongrelion commented on The current state of OpenTelemetry   signoz.io/blog/openteleme... · Posted by u/pranay01
CornCobs · 2 years ago
As a relative outsider to the observability space, I have always wondered this:

Is observability/telemetry only about engineering-related issues (performance, downtimes, bottlenecks etc.) or does it include the "phone-home" type of telemetry (user usage statistics, user journeys)? Looking through the websites of most of the observability SaaSes it seems to only talk about the first. Then how do people solve the second? Is it with manual logging to the server from the client?

mongrelion · 2 years ago
I believe right now this type of telemetry data is for whitebox monitoring for backend components

u/mongrelion

KarmaCake day154April 2, 2012
About
[ my public key: https://keybase.io/mongrelion; my proof: https://keybase.io/mongrelion/sigs/7h5VnWa-M5fRQO_fRlwWoSgpfu_fO_Hwxyx4v2FVD8c ]

This is an OpenPGP proof that connects my OpenPGP key to this Hackernews account. For details check out https://keyoxide.org/guides/openpgp-proofs [Verifying my OpenPGP key: openpgp4fpr:E3A878624A8C0A996D1926F2033C1FEBE1ED3881]

View Original