![](/static/253f0d9b/assets/icons/icon-96x96.png)
![](https://feddit.uk/pictrs/image/628ede8e-54d9-4c64-8a37-9a98a20bb5c0.png)
If it was still nationalised, that would be the case. When they’re a private entity with a directive to enrich their shareholders while doing the bare minimum in terms of service, it is not.
If it was still nationalised, that would be the case. When they’re a private entity with a directive to enrich their shareholders while doing the bare minimum in terms of service, it is not.
Apologies if i wasnt clear there, but the point I intended to convey was indeed that you should only use an OS that you yourself have installed, to ensure that it hasnt been shipped with any bloatware or backdoors.
Hardware manufacturers have been doing it for years with modified windows installs, and I see no reason to beleieve they aren’t trying the same thing with Linux installs.
Never trust the OS that ships with a device. Wipe it, format the disk, and pray that they don’t have a backdoor at the bios level.
But it’s not a tarxz, it’s an xz containing a tar, and you perform operations from right to left until you arrive back at the original files with whatever extensions they use.
If I compress an exe into a zip, would you expect that to be an exezip? No, you expect it to be file.exe.zip, informing you(and your system) that this file should first be unzipped, and then should be executed.
Can you share the torrents in question? I’d like to take a stab at merging them from hex dumps as explained in my other comment. Maybe develop a tool to automate it for other broken torrents.
Haha, my bad
I believe in that case you may be able to merge the two files by dumping a hex of each, then running a diff on the two hexes and substituting valid hexes into any zero blocks.
I’m actually kind of curious about writing a script to handle this now that I’m presented with it. Can you link the two torrents for me so I can take a crack?
I would add to this, disable icmp response on any internet facing server that does not aboluetly require it, it make it whitelisted to your know IPs when it is. If your server does not appear online then you will only really be vulernable to targeted attacks where your ip is already known.
I had two jetsons that i was using for a project, had one on my desk and one in another office. Started back into some gpio stuff that I’d been working on the last few days and found that i was getting nothing, after about an hour of fucking with configuration trying to determine what had happened, i realised that i had sshed into the wrong one.
Now i make sure to give descriptive hostnames to every device on my network.