mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#sim

1 post1 participant0 posts today

Ya esta disponible @speed_dreams_official 2.4.1.

Esta nueva versión trae cambios muy jugosos:

* Se ha mejorado el gestor de descargas
* Ahora al chocar contra los muros, la vuelta sera invalidada, y así quedara reflejado en el Master Server, sobre todo de cara a los campeonatos
* 4 nuevas categorías
* 4 nuevas pistas
* Ahora disponible en formato AppImage
* Simplificado el código fuente
* etc.

Info: speed-dreams.net/es/blog/relea

Descargas: speed-dreams.net/en/downloads

speed-dreams.netLanzamiento de la versión 2.4.1 | SPEED DREAMSGrav is an easy to use, yet powerful, open source flat-file CMS

#SKTelecom #cyberattack : Free #SIM replacements for 25 million customers

#SouthKorean mobile provider SK Telecom has announced free SIM card replacements to its 25 million mobile customers following a recent #USIM data breach, but only 6 million cards are available through May.

SK Telecom is the country's largest #mobile network operator, serving roughly half of the domestic mobile phone market

bleepingcomputer.com/news/secu

Replied in thread

@dave_andersen @AVincentInSpace personally I consider any "#KYC" a risk-factor, and @signalapp has proven their ability and willingness to restrict functionality (i.e. their #Shitcoin-#Scam #MobileCoin) based off said #PhoneNumbers (Cuban, Russian and North Korean Numbers were excluded) which are in fact #PII (even if one doesn't have to #ID for obtaining a #SIM, they are circumstantial PII)...

  • They have neither "legitimate interest" nor legal mandate to collect said data (or to integrate a scammy Shitcoin for that matter) as the discontinuation of #ChatSecure / #TextSecure has eliminated the "technical necessity" to have those.

Either way they either have to yeet #Hegseth as client and/or stop collecting PII like PhoneNumbers - they gotta have to do something

#ITsec is a different story, but unlike #Signal these do not depend on a #PhoneNumber and work through @torproject / #Tor.

  • And I've been using Tor for almost 15 years daily now...

Para nuestra sorpresa, y después de casi 9 años, hay una nueva versión de #TORCS

Para quien no lo conozca, TORCS (The Open Racing Car Simulator), es un simulador de carreras que empezó en 1997, y del que salieron varios forks, como Speed Dreams.

La lista de cambios es larga: muchas correcciones, actualización de varias dependencias, soporte para mandos actuales, etc.

Descargar:
sourceforge.net/projects/torcs

Lista de cambios: sourceforge.net/p/torcs/code/c

sourceforge.netTORCS - The Open Racing Car Simulator - Browse Files at SourceForge.netTORCS, The Open Racing Car Simulator is a highly portable multi platform car racing simulation. It is used as ordinary car racing game, as AI racing…

// v.02
visitar pagina originaria para apreciar los elementos edición mejor, a lo mejor desde desktop
Inspirado por una consulta de @carikrp a la comunidad.

@howto @tutorial de @freeopensource
Como #deGooglear tu vida y pasarte a #fDroid.

Al menos que quieres transformarte en especialista IT, o tengas buenas razones, y ay un montón, la recomendación inicial no seria familiarizarse con #ADB. Aun así, aquí algunas informaciones, por ejemplo como tener el celular en la pantalla de la computadora usando ADB, #SCRCPY y #KDENlive:
tupambae.org/display/0ac89072-…
Dos enlaces con mas información al respecto en ingles:
tupambae.org/display/0ac89072-…
tupambae.org/display/0ac89072-…

Pasos para acomodar un celular #android de manera sencilla:

  • Guardar todos los datos personales aparte, por ejemplo con cable #USB o con KDEnlive en una computadora.
  • Usar el celular una semana mas como si nada, para darse tiempo de acordarse de todo lo que se pueda complicar reseteando el celular y con ello tu vida digital a cero de fabrica. Una semana mas o menos no hace la diferencia, total la tia HermanoGrande ya sabe mas de ti que tu.


Datos y detalles importantes a tener en cuenta y a guardar:

  • contraseñas, en particular del correo electrónico de gmail
  • 2FA autentificación
    ay opciónes de software libre para esta funcion
  • accesos a sitios y servicios
  • accesos a servicios de pago, bancos, mercadoLibre y todos aquellos
    En particular para dichos servicios de relacion comercial y/o monetaria siempre se debería tener un planB, teniendo acceso desde un desktop, al menos con un pendrive #linux por ejemplo.


Pasoso para resetear el celular a valores de fabrica:

  • Resetear el celular según instrucciones de fabricante o el internet.
  • Reiniciar el celular, sin la #SIM ni accesso #wifi a internet.
  • Responder todas las preguntas iniciales con NO!
    Hay una, quizas dos preguntas que se tienen que afirmar, si no el proceso de iniciar el celular "por primera ves" no funciona. Son las preguntas que aceptan las condiciones de uso del propio android y eventualmente del fabricante.

Ahora tenemos un celular arrancado lo mas limpio posible. Este proceder, ademas de dar tremenda tranquilidad, es mucho mas seguro y mas rápido que ir desinstalando APP's y elementos.

Siguiente paso muy importante es ir a:

.. e ir revisando aplicación por aplicación de google y proveedores de mas, inclusive #chrome (!), y seleccionar en cada APP las opciones "parar" y "desactivar".

Eventualmente conviene dejar #googleMaps, la unica APP justificable debido al servicio que brinda. Por cierto, google maps puede ser reemplazado por #OSM -> open street map.
Importante tener siempre el GPS apagado y decirle a todas las APP's ¡que no significa NO! cuando mencionan #GPS. Las pocas veces que realmente se precisa, por ejemplo con googleMaps, se activa en el momento y se apaga en el momento.
Razón:
Los únicos datos seguros son los que no existen.

Pronto.
Bueno, no del todo.

Siguiente paso importante es instalar f-droid:
f-droid.org
Para ello ahora si se puede activar el WIFI y/o insertar la tarjeta SIM al celular.

F-Droid es el repositorio de #APP's comparable con el #playStore de #google pero del mundo del #softwareLibre.
Todos las APP's son gratuito.
Todas las APP's tienen un apartado que informa, si es que sea preciso:
"Advertencia, puede que partes de esta APP no te gusten".
Es importante leer estos detalles siempre, aunque bien despreocupado, ya que esto son advertencias de puritanos mormones del mundo del software libre, los que por suerte existen, los imprescindibles del mundo de la computación. Leer este apartado enseña los detalles importantes en las APP's que hacen la diferencia y que de a poco nos crean un sentido común al respecto.

Tu vida en tu celular nunca sera como antes.

Tenes prácticamente todas las APP's pero #KISS:
Keep It Simple Stupid! -> mantenlo sencillo, estupido!
.. ya que son gratis y hechas por idealistas.
Nada de propaganda.
Nada de venderte la mas nueva actualización que no aporta nada nuevo pero hace obsoleto la compatibilidad y genera ingreso a "ellos" sin brindar valor agregado real.
Lo que se encuentra en f-droid son simplemente aplicaciones pequeñas para que se pueda hacer lo que en realidad uno pretendía hacer.
En otras palabras, sin #enshittification, como diría @pluralistic.

Ay una APP en el f-droid que se llama #auroraStore. Ella da accesso al playStore de google sin registrarse y se puede instalar prácticamente todas las APP's que se pretende. Cosa que no se recomienda en absoluto, ya que prácticamente todas las aplicaciones del playstore que no están también en f-droid tienen fines comerciales y venden los datos de sus usuarios.

Es común que APP's de soporte para hardware o de servicios solo se encuentran en el playstore, por lo que si es útil tener dicho acceso.

Otra opción para acceder a APP's del playstore es por ejemplo el sitio:
apkpure.com/
Este sitio permite bajar APP's que figuran en el playStore, ademas de la opción mas que interesante de acceder a versiones mas antiguas de una APP.

pronto, listo, ya ✓


ave fun con y en las #redesLibres!

That's Not How A SIM Swap Attack Works

shkspr.mobi/blog/2025/04/thats

There's a disturbing article in The Guardian about a person who was on the receiving end of a successful cybersecurity attack.

EE texted to say they had processed my sim activation request, and the new sim would be active in 24 hours. I was told to contact them if I hadn’t requested this. I hadn’t, so I did so immediately. Twenty-four hours later, my mobile stopped working and money was withdrawn from my bank account.

With their alien sim, the ­fraudster infiltrated my handset and stole details for every account I had. Passwords and logins had been changed for my finance, retail and some social media accounts.

(Emphasis added.)

I realise it is in the consumer rights section of the newspaper, not the technology section, and I dare-say some editorialising has gone on, but that's nonsense.

Here's how a SIM swap works.

  1. Attacker convinces your phone company to reassign your telephone number to a new SIM.
  2. Attacker goes to a website where you have an account, and initiates a password reset.
  3. Website sends a verification code to your phone number, which is now in the hands of the attacker.
  4. Attacker supplies verification code and gets into your account.

Do you notice the missing step there?

At no point does the attacker "infiltrate" your handset. Your handset is still in your possession. The SIM is dead, but that doesn't give the attacker access to the phone itself. There is simply no way for someone to put a new SIM into their phone and automatically get access to your device.

Try it now. Take your SIM out of your phone and put it into a new one. Do all of your apps suddenly appear? Are your usernames and passwords visible to you? No.

There are ways to transfer your data from an iPhone or Android - but they require a lot more work than swapping a SIM.

So how did the attacker know which websites to target and what username to use?

What (Probably) Happened

Let's assume the person in the article didn't have malware on their device and hadn't handed over all their details to a cold caller.

The most obvious answer is that the attacker already knew the victim's email address. Maybe the victim gave out their phone number and email to some dodgy site, or they're listed on their contact page, or something like that.

The attacker now has two routes.

First is "hit and hope". They try the email address on hundreds of popular sites' password reset page until they get a match. That's time-consuming given the vast volume of websites.

Second is targetting your email. If the attacker can get into your email, they can see which sites you use, who your bank is, and where you shop. They can target those specific sites, perform a password reset, and get your details.

I strongly suspect it is the latter which has happened. The swapped SIM was used to reset the victim's email password. Once in the email, all the accounts were easily found. At no point was the handset broken into.

What can I do to protect myself?

It is important to realise that there's nothing you can do to prevent a SIM-swap attack! Your phone company is probably incompetent and their staff can easily be bribed. You do not control your phone number. If you get hit by a SIM swap, it almost certainly isn't your fault.

So here are some practical steps anyone can take to reduce the likelihood and effectiveness of this class of attack:

  • Remember that it's OK to lie to WiFi providers and other people who ask for your details. You don't need to give someone your email for a receipt. You don't need to hand over your real phone number on a survey. This is the most important thing you can do.
  • Try to hack yourself. How easy would it be for an attacker who had stolen your phone number to also steal your email address? Open up a private browser window and try to reset your email password. What do you notice? How could you secure yourself better?
  • Don't use SMS for two-factor authentication. If you are given a choice of 2FA methods, use a dedicated app. If the only option you're given is SMS - contact the company to complain, or leave for a different provider.
  • Don't rely on a setting a PIN for your SIM. The PIN only protects the physical SIM from being moved to a new device; it does nothing to stop your number being ported to a new SIM.
  • Finally, realise that professional criminals only need to be lucky once but you need to be lucky all the time.

Stay safe out there.

A padlock engraved into a circuit board.
Terence Eden’s Blog · That's Not How A SIM Swap Attack Works
More from Terence Eden

🆕 blog! “That's Not How A SIM Swap Attack Works”

There's a disturbing article in The Guardian about a person who was on the receiving end of a successful cybersecurity attack.

EE texted to say they had processed my sim activation request, and the new sim would be active in 24 hours. I was told to contact them if I hadn’t requested this. I hadn’t, so I did …

👀 Read more: shkspr.mobi/blog/2025/04/thats

#2fa #CyberSecurity #MFA #security #sim

A padlock engraved into a circuit board.
Terence Eden’s Blog · That's Not How A SIM Swap Attack Works
More from Terence Eden

If you change your #phone #sim temporarily, i.e. use a new phone number, #Signal keeps working as before. #WhatsApp stops working if you change your sim i.e. phone number. Signal knocks the socks off whatsapp for staying in touch while travelling, when your normal sim and phone number have malfunctioned (my new #telekom cellular provider cancelled my old SIM & provider & sent me their new SIM for new contract: while I was abroad, without asking me if this date suits). Signal rocks. Use signal.