captainkangaroo

joined 2 years ago
 

cross-posted from: https://discuss.tchncs.de/post/22423685

EDIT: For those who are too lazy to click the link, this is what it says

Hello,

Sad news for everyone. YouTube/Google has patched the latest workaround that we had in order to restore the video playback functionality.

Right now we have no other solutions/fixes. You may be able to get Invidious working on residential IP addresses (like at home) but on datacenter IP addresses Invidious won't work anymore.

If you are interested to install Invidious at home, we remind you that we have a guide for that here: https://docs.invidious.io/installation/..

This is not the death of this project. We will still try to find new solutions, but this might take time, months probably.

I have updated the public instance list in order to reflect on the working public instances: https://instances.invidious.io. Please don't abuse them since the number is really low.

Feel free to discuss this politely on Matrix or IRC.

367
submitted 10 months ago* (last edited 10 months ago) by captainkangaroo@discuss.tchncs.de to c/degoogle@lemmy.ml
 

EDIT: For those who are too lazy to click the link, this is what it says

Hello,

Sad news for everyone. YouTube/Google has patched the latest workaround that we had in order to restore the video playback functionality.

Right now we have no other solutions/fixes. You may be able to get Invidious working on residential IP addresses (like at home) but on datacenter IP addresses Invidious won't work anymore.

If you are interested to install Invidious at home, we remind you that we have a guide for that here: https://docs.invidious.io/installation/..

This is not the death of this project. We will still try to find new solutions, but this might take time, months probably.

I have updated the public instance list in order to reflect on the working public instances: https://instances.invidious.io. Please don't abuse them since the number is really low.

Feel free to discuss this politely on Matrix or IRC.

 

The research team, led by NHS Blood and Transplant (NHSBT) scientists in South Gloucestershire and supported by the University of Bristol, found a blood group called MAL.

They identified the genetic background of the previously known AnWj blood group antigen, which was discovered in 1972 but unknown until now after this world-first test was developed.

 

cross-posted from: https://discuss.tchncs.de/post/22378382

Following today's launch of the new iPhone 16 models, Apple has shared repair manuals for the iPhone 16, the iPhone 16 Plus, the iPhone 16 Pro, and the iPhone 16 Pro Max. The repair manuals provide technical instructions on replacing genuine Apple parts in the ‌iPhone 16‌ models, and Apple says the information is intended for "individual technicians" that have the "knowledge, experience, and tools" that are necessary to repair electronic devices.

 

Following today's launch of the new iPhone 16 models, Apple has shared repair manuals for the iPhone 16, the iPhone 16 Plus, the iPhone 16 Pro, and the iPhone 16 Pro Max. The repair manuals provide technical instructions on replacing genuine Apple parts in the ‌iPhone 16‌ models, and Apple says the information is intended for "individual technicians" that have the "knowledge, experience, and tools" that are necessary to repair electronic devices.

 

Indent-bars v0.7.4 is now on ELPA

Indent-bars is a fast, configurable indentation guide-bars for Emacs

7
Company 1.0.0 released (company-mode.github.io)
submitted 10 months ago* (last edited 10 months ago) by captainkangaroo@discuss.tchncs.de to c/emacs@lemmy.ml
 

Company is a text completion framework for Emacs. The name stands for "complete anything". It uses pluggable back-ends and front-ends to retrieve and display completion candidates.

It comes with several back-ends such as ElispClangSemanticIspellCMakeBBDBYasnippetDabbrevEtagsGtagsFilesKeywords and a few others.

Change log: https://github.com/company-mode/company-mode/blob/master/NEWS.md#2024-09-21-100

 

The SonicWall Capture Labs threat research team became aware of the threat CVE-2024-20017, assessed its impact and developed mitigation measures for the vulnerability. CVE-2024-20017 is a critical zero-click vulnerability with a CVSS 3.0 score of 9.8, impacting MediaTek Wi-Fi chipsets MT7622/MT7915 and RTxxxx SoftAP driver bundles used in products from various manufacturers, including Ubiquiti, Xiaomi and Netgear. The affected versions include MediaTek SDK versions 7.4.0.1 and earlier, as well as OpenWrt 19.07 and 21.02. This translates to a large variety of vulnerable devices, including routers and smartphones. The flaw allows remote code execution without user interaction due to an out-of-bounds write issue. MediaTek has released patches to mitigate the vulnerability and users should update their devices immediately. While this vulnerability was published and patched back in March, only recently did a public PoC become available making exploitation more likely.

view more: ‹ prev next ›