lemmy.net.au

55 readers
2 users here now

This instance is hosted in Sydney, Australia and Maintained by Australian administrators.

Feel free to create and/or Join communities for any topics that interest you!

Rules are very simple

Mobile apps

https://join-lemmy.org/apps

What is Lemmy?

Lemmy is a selfhosted social link aggregation and discussion platform. It is completely free and open, and not controlled by any company. This means that there is no advertising, tracking, or secret algorithms. Content is organized into communities, so it is easy to subscribe to topics that you are interested in, and ignore others. Voting is used to bring the most interesting items to the top.

Think of it as an opensource alternative to reddit!

founded 1 year ago
ADMINS
1
5
submitted 1 year ago* (last edited 1 year ago) by hyprn to c/meta
 
 

Welcome to lemmy.net.au: Understanding Lemmy and How to Use It

Hello and welcome to our Lemmy instance! If you're new here, you might be wondering what exactly Lemmy is and how it differs from other social platforms. This guide will help you understand Lemmy's unique structure and how to make the most of your experience here.

What is Lemmy?

Lemmy is a forum-style social media platform (sometimes called a 'link aggregator') similar to Reddit or Hacker News. Here, you can:

  • Share and discuss links, text posts, and images
  • Upvote and downvote content to determine what rises to the top
  • Join communities centered around specific topics or themes
  • Connect with users across the entire "fediverse"

What Makes Lemmy Different: The Federated Approach

The key difference between Lemmy and traditional social platforms is that Lemmy is federated. Here's what that means:

Instead of one central website controlled by a single company, Lemmy consists of multiple independent websites (called "instances") that are all connected to each other. Each instance is run by different organizations or individuals.

Think of it this way: If Reddit is like a single massive shopping centre with one owner setting all the rules, Lemmy is like George Street in Sydney, which has multiple shopping centres, each with their own management but where shoppers can freely move between them.

The Power of Federation

When you join lemmy.net.au, you're not just joining this instance - you're joining the entire Lemmy network. You can:

  • Interact with users from other instances
  • See and participate in communities hosted on other instances
  • Keep all your connections even if you decide to move to a different instance

This means if you don't like how one instance is being managed, you can move to another without losing access to your favorite communities or connections.

How Lemmy Works in Practice

Communities and Usernames

In Lemmy, both communities and usernames include the instance name:

  • Communities are shown as c/CommunityName@instance.org
  • Usernames appear as @username@instance.org

For example, a community on our instance might be c/Australia@lemmy.net.au, while a user might be @JaneDoe@lemmy.net.au.

Accessing Content Across Instances

With your lemmy.net.au account, you can:

  1. Subscribe to communities from any federated instance
  2. Comment on posts from any federated instance
  3. Message users from any federated instance

When you find a community hosted elsewhere (like c/Programming@programming.dev), you can interact with it just as if it were hosted here.

Finding Communities

To discover communities:

  1. Browse popular communities on lemmy.net.au
  2. Use the search function to find specific topics
  3. Try the Lemmyverse.net search engine for more comprehensive results

Reddit to Lemmy: Translation Guide

If you're coming from Reddit, here's a quick reference to help you understand the terminology:

Reddit Term Lemmy Equivalent
Subreddit Community
r/example c/example@instance
u/username @username@instance
Karma Score
Moderator Moderator (same!)
Award Not available (no awards system)
Crosspost No direct equivalent, but you can share links to posts
Sorting by "Hot" Sorting by "Hot" (same!)
Sorting by "New" Sorting by "New" (same!)
Reddit Premium No equivalent (no premium tier)

Finding Communities

There are several ways to discover communities on Lemmy:

  1. Browse popular communities on lemmy.net.au
  2. Use the search function to find specific topics
  3. Visit lemmyverse.net - This is an excellent search engine specifically designed for Lemmy that allows you to search across all federated instances

Lemmyverse.net is particularly useful because:

  • It indexes communities across the entire Lemmy network
  • You can search by keywords, topics, or community names
  • It shows activity levels and subscriber counts
  • It allows you to discover niche communities you might not find otherwise

When you find a community you like on lemmyverse.net, simply copy its full name (including the instance) and search for it on lemmy.net.au to subscribe and participate. You might need to wait a few seconds after you search for the community to show up as the lemmy.net.au instance needs to connect to that instance and pull the information back.

Managing Your Experience

Blocking Content

If you encounter content you don't want to see:

  • You can block individual users
  • You can block entire communities
  • You can even block entire instances

If you believe a community or instance violates our community standards, please use the reporting function to alert the admin team!

Same Name, Different Communities

Sometimes you'll find communities with the same name on different instances (like c/News@lemmy.net.au and c/News@another-instance.org). These are separate communities with different moderators and potentially different rules.

This flexibility allows for diverse moderation styles and community cultures to coexist.

Getting Started

  1. Complete your profile - Add a bio and profile picture
  2. Find communities - Search for topics that interest you
  3. Subscribe - Join communities to see their content in your feed
  4. Participate - Comment, post, and vote to become part of the conversation

Need Help?

If you have questions or need assistance, feel free to comment on this post or message the admins.

Welcome to the fediverse - we're glad you're here!

2
4
submitted 1 year ago by hyprn to c/support
 
 

Post a comment with your creds, looking for some moderators for the site

3
 
 
4
 
 
5
53
submitted 47 minutes ago* (last edited 47 minutes ago) by iamthetot@piefed.ca to c/comicstrips@lemmy.world
 
 
6
7
8
 
 

But they know that. And you do too.

Duplicitous.

A big heyooo to the catholic soldiers out there, doin their thang for Jehovah. You losers are wonderfully corrupt and shortsighted. Makes being a Leftist real easy and alot of fun.

Happy May Day Comrades!

All inspired by this bit of Cath-o-lic propaganda about law and pedorder. I masturbated in the shower for you folks, and came up with the title of this post.

9
22
Monster (lemmy.world)
submitted 34 minutes ago* (last edited 33 minutes ago) by FelixCress@lemmy.world to c/comicstrips@lemmy.world
 
 

Source: https://www.smbc-comics.com/index.php

Credits: Saturday Morning Breakfast Cereal

10
 
 
11
 
 

xkcd #3240: Bottle

Title text:

"I know it seems impossible, but the trick is that I sailed in here when I was very young."

Transcript:

Transcript will show once it’s been added to explainxkcd.com

Source: https://xkcd.com/3240/

explainxkcd for #3240

12
 
 

Republicans in Congress voted to fund the Department of Homeland Security Thursday, effectively ending the 76-day shutdown of the department.

The bill, passed by a voice vote in the House, is a win for Democrats, as it still includes no money for ICE or Border Patrol, and is now headed to President Trump’s desk to be signed into law. House Speaker Mike Johnson reportedly decided to finally support the bill after a private meeting with his fellow Republican leaders earlier in the day, where they agreed that the situation couldn’t continue.

The GOP will still try to fund ICE through the reconciliation process, which takes much longer but only requires a simple majority in both chambers of Congress.

13
14
15
16
 
 

President Donald Trump on Friday signed an executive order broadening U.S. sanctions against the Cuban government, two White House officials told Reuters. He seeks to put more pressure on Havana, following his administration's challenge to Venezuela's leadership. The new sanctions target people, entities and affiliates supporting Cuba's security apparatus, or those complicit in corruption or serious human rights violations, officials said. Government agents, officials or supporters are also included. It was not immediately clear which specific people or entities were impacted by the sanctions under the order, which Reuters first reported. The order authorizes secondary sanctions for conducting or facilitating transactions with those targeted under the order, officials said.

17
18
 
 

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root.

The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori.

"An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root," the vulnerability research team at Xint.io and Theori said.

At its core, the vulnerability stems from a logic flaw in the Linux kernel's cryptographic subsystem, specifically within the algif_aead module. The issue was introduced in a source code commit made in August 2017.

Successful exploitation of the shortcoming could allow a simple 732-byte Python script to edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017, including Amazon Linux, RHEL, SUSE, and Ubuntu. The Python exploit involves four steps -

  • Open an AF_ALG socket and bind to authencesn(hmac(sha256),cbc(aes))
  • Construct the shellcode payload
  • Trigger the write operation to the kernel's cached copy of "/usr/bin/su"
  • Call execve("/usr/bin/su") to load the injected shellcode and run it as root

While the vulnerability is not remotely exploitable in isolation, a local unprivileged user can get root simply by corrupting the page cache of a setuid binary. The same primitive also has cross-container impacts as the page cache is shared across all processes on a system.

19
 
 

cross-posted from: https://lemmy.world/post/46310733

Cybersecurity researchers have disclosed details of a Linux local privilege escalation (LPE) flaw that could allow an unprivileged local user to obtain root.

The high-severity vulnerability tracked as CVE-2026-31431 (CVSS score: 7.8) has been codenamed Copy Fail by Xint.io and Theori.

"An unprivileged local user can write four controlled bytes into the page cache of any readable file on a Linux system, and use that to gain root," the vulnerability research team at Xint.io and Theori said.

At its core, the vulnerability stems from a logic flaw in the Linux kernel's cryptographic subsystem, specifically within the algif_aead module. The issue was introduced in a source code commit made in August 2017.

Successful exploitation of the shortcoming could allow a simple 732-byte Python script to edit a setuid binary and obtain root on essentially all Linux distributions shipped since 2017, including Amazon Linux, RHEL, SUSE, and Ubuntu. The Python exploit involves four steps -

  • Open an AF_ALG socket and bind to authencesn(hmac(sha256),cbc(aes))
  • Construct the shellcode payload
  • Trigger the write operation to the kernel's cached copy of "/usr/bin/su"
  • Call execve("/usr/bin/su") to load the injected shellcode and run it as root

While the vulnerability is not remotely exploitable in isolation, a local unprivileged user can get root simply by corrupting the page cache of a setuid binary. The same primitive also has cross-container impacts as the page cache is shared across all processes on a system.

20
21
 
 

Scumbag Resolve

Is a carpet cleaner

Can't spray downwards

22
23
 
 

Its fans just don't want to let go.

24
 
 
25
view more: next ›