shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

292
active users

#moonbounce

0 posts0 participants0 posts today
IT News<p>Bouncing Signals off of Satellites Other than the Moon - The moon is a popular target for ham radio operators to bounce signals since it’s ... - <a href="https://hackaday.com/2025/01/24/bouncing-signals-off-of-satellites-other-than-the-moon/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/01/24/bounci</span><span class="invisible">ng-signals-off-of-satellites-other-than-the-moon/</span></a> <a href="https://schleuss.online/tags/geostationaryorbit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geostationaryorbit</span></a> <a href="https://schleuss.online/tags/earth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>earth</span></a>-moon-earth <a href="https://schleuss.online/tags/radiotelescope" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radiotelescope</span></a> <a href="https://schleuss.online/tags/radiohacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radiohacks</span></a> <a href="https://schleuss.online/tags/moonbounce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>moonbounce</span></a> <a href="https://schleuss.online/tags/satellite" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>satellite</span></a> <a href="https://schleuss.online/tags/hamradio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hamradio</span></a> <a href="https://schleuss.online/tags/wsjt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wsjt</span></a>-x <a href="https://schleuss.online/tags/radio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radio</span></a></p>
IT News<p>Moonbounce Music - There’s something inspiring about echos. Who among us hasn’t called out or clapped... - <a href="https://hackaday.com/2024/08/11/moonbounce-music/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2024/08/11/moonbo</span><span class="invisible">unce-music/</span></a> <a href="https://schleuss.online/tags/musicalhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>musicalhacks</span></a> <a href="https://schleuss.online/tags/amaturradio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>amaturradio</span></a> <a href="https://schleuss.online/tags/moonbounce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>moonbounce</span></a> <a href="https://schleuss.online/tags/hamradio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hamradio</span></a> <a href="https://schleuss.online/tags/moon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>moon</span></a></p>
IT News<p>LoRa Goes To The Moon - LoRa is a communications method that allows for long range radio contacts to be ma... - <a href="https://hackaday.com/2023/05/03/lora-goes-to-the-moon/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/05/03/lora-g</span><span class="invisible">oes-to-the-moon/</span></a> <a href="https://schleuss.online/tags/earth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>earth</span></a>-moon-earth <a href="https://schleuss.online/tags/longdistance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>longdistance</span></a> <a href="https://schleuss.online/tags/radiohacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radiohacks</span></a> <a href="https://schleuss.online/tags/moonbounce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>moonbounce</span></a> <a href="https://schleuss.online/tags/pathloss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pathloss</span></a> <a href="https://schleuss.online/tags/sdrangel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sdrangel</span></a> <a href="https://schleuss.online/tags/hackrf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackrf</span></a> <a href="https://schleuss.online/tags/radio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radio</span></a> <a href="https://schleuss.online/tags/lora" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lora</span></a> <a href="https://schleuss.online/tags/eme" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eme</span></a> <a href="https://schleuss.online/tags/sdr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sdr</span></a></p>
Chuck Darwin<p>Researchers on Wednesday announced a major <a href="https://c.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> find—the world’s first-known instance of real-world <a href="https://c.im/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> that can hijack a computer’s boot process even when <a href="https://c.im/tags/Secure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Secure</span></a> <a href="https://c.im/tags/Boot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Boot</span></a> and other advanced protections are enabled and running on fully updated versions of <a href="https://c.im/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a>.<br>Dubbed <a href="https://c.im/tags/BlackLotus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlackLotus</span></a>, the malware is what’s known as a UEFI bootkit. These sophisticated pieces of malware target the <a href="https://c.im/tags/UEFI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UEFI</span></a>—short for Unified Extensible Firmware Interface—the low-level and complex chain of firmware responsible for booting up virtually every modern computer. <br>As the mechanism that bridges a PC’s device firmware with its operating system, the UEFI is an OS in its own right. <br>It’s located in an SPI-connected <a href="https://c.im/tags/flash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flash</span></a> storage chip soldered onto the computer motherboard, making it difficult to inspect or patch. <br>Previously discovered bootkits such as <a href="https://c.im/tags/CosmicStrand" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CosmicStrand</span></a>, <a href="https://c.im/tags/MosaicRegressor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MosaicRegressor</span></a>, and <a href="https://c.im/tags/MoonBounce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MoonBounce</span></a> work by targeting the UEFI firmware stored in the flash storage chip. Others, including BlackLotus, target the software stored in the EFI system partition.<br>While researchers have found Secure Boot vulnerabilities in the past, there has been no indication that threat actors have ever been able to bypass the protection in the 12 years it has been in existence. <br>Until now.</p><p><a href="https://arstechnica.com/information-technology/2023/03/unkillable-uefi-malware-bypassing-secure-boot-enabled-by-unpatchable-windows-flaw/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2023/03/unkillable-uefi-malware-bypassing-secure-boot-enabled-by-unpatchable-windows-flaw/</span></a></p>