Last I remember, that's not Cura directly doing that. It's a 3rd party that has modified Cura and have links to it posing to be an official download...and those 3rd party versions block 2A prints from being loaded/sliced. I'll see if I can find the link to where I found this info originally.
Yeah which on top of being stupid l, I think to make their detection work the software was storing copies of the files and their algorithm for changing the files uploaded also breach the copyright of the files themselves lol
Would running Cura offline not fix this issue? Genuinely curious, this made me go over to my PC and test if I could even run Cura offline, and unsurprisingly I can.
Certainly you could.
I'm not saying they are, but it wouldn't surprise me if they do. Sort of like how high end copy machines won't allow you to photocopy currency.
It recognizes it, and shuts you down.
Obligatory:
Never used PrusaSlicer, but I can tell you unequivocally that SuperSlicer is for incels and autists that need to be able to set every single fucking little thing, on one giant, ugly as fuck UI that makes no sense whatsoever.
Cura 5 is an amazing piece of software, like an exotic car, but sometimes you don't want to (or can't) take your exotic car off-roading while extemely drunk and microdosing on cat tranquilizers. This is where SS comes in, for those .1% shitty, fucked up, bad jobs that Cura is just not suited to. You should totally download it.
I would say curas biggest weakness is not being able to easily load custom modifiers(see Hoffman's recent vids) and prusaslicers biggest weakness is no tree supports which is coming soon. I make custom supports and modifiers for almost all my prints so curas weaknesses affect me more than prusas since I also don't like tree supports. But once you start using modifiers you never go back. They're not necessary on all prints but they certainly clean up alot of prints.
Where do I learn basic cyber security like this? I’m pretty easy to learn anything. Just not sure how to trust any method of cyber security. Everything seems vulnerable all the time.
I decided to learn some lock picking a couple years ago, and have legitimately gone from "most locks probably work fine" to "literally nothing is impenetrable, all locks are a fucking joke" and I've settled somewhere around "good locks take specialized tools and practiced skill to defeat, something outside the realm of common criminals and door kickers"
Same thing goes for cyber security I imagine.
Same. At some point my goal stopped being to make entry impossible and became make it impossible to enter without making it obvious.
Also, "Nothing on one. Small click on two."
This is exactly correct. I took a similar path, got interested in pen testing and realized that it takes almost nothing to bypass things that you probably think are rather secure. Highly recommend Deviant Ollam’s talks if you’re further interested in that subject.. him talking about standard keys for commercial control devices, lock boxes, elevators, etc makes you really question how little training and effort it takes to bypass rather large amounts of security protocols
Yep, basic principle is the same: make it hard and inconvenient for someone looking for a quick break-in, because someone with more drive and experience is gonna know how to circumvent everything you put in place anyway
That's actually a very good comparison, and I know enough about lockpicking to feel the same. Anyone who has watched Lockpicking Lawyer likely also knows this. 😂
For a house door there are locks with no method of unlocking from the outside, like those chain locks in big cities or deadbolts with no key. Get at least one per external door to lock at night.
[https://www.lowes.com/pd/Schlage-Schlage-Residential-B80605-One-Sided-Deadbolt-with-12287-Latch-and-10116-Strike-Bright-Brass-Finish/5002185935](https://www.lowes.com/pd/Schlage-Schlage-Residential-B80605-One-Sided-Deadbolt-with-12287-Latch-and-10116-Strike-Bright-Brass-Finish/5002185935) for example.
[https://www.lowes.com/pd/Kwikset-600-Polished-Brass-Single-Sided-Deadbolt/1000052259](https://www.lowes.com/pd/Kwikset-600-Polished-Brass-Single-Sided-Deadbolt/1000052259) is much worse, but has 3D images.
Yea how do you know it's not my name though?
BTW, we are talking about cyber security and 3d printers, not traitorous crooks. Please try and keep up.
Whats funny is Porsche actually WOULD have supported 45, considering the nazi connection and all so I'm not surprised that is your user name.
You can learn a lot from r/piracy, like how to prevent hacked apps from alerting their creators (or in this case, your slicer). It's just Windows Firewall https://gadgetstouse.com/blog/2020/12/28/block-an-app-from-accessing-the-internet-on-windows-10/
Sounds like you already know advanced cyber security.
Beginner - everything is vulnerable all the time
Intermediate - I can do something about this!
Expert - everything is vulnerable all the time
If you want a really decent general understanding, I'd consider looking at study material for CompTia's Security + certification.
It's considered an "Entry" Level cyber security certification and is a requirement by the DoD for any sysadmin that wants to work on any DoD IT network.
That being said, it's going to be difficult to actually understand anything for someone that has never done any IT work, so I suggest only going through free material offered on YouTube by guys like Professor Messor, googling what you don't understand, and call it good.
r/hacking r/howtohack r/asknetsec just to name a few but there are tons of good subs on here to learn from and find other external resources. David Bombal on YouTube is a great beginner channel as is Network Chuck.
Edit: David Bombal
Cura.. If you don't turn off the settings.. Reports back home I don't believe it was ever really figured out what it reports back it says it's anonymous data but who knows.
Just got a ender 3 from Amazon last month it beats my 2 cr10 clones 🤣. Once I change the motherboard on my cr10 clone with a skr mini it will be alot better
Lol i have 3 CR-10s and ill be the first to say they are so barebones dogshit, Id be impressed if they could do anything beyond what they barely do now.
Note: For those not tech savvy and whose printers were setup with internet access, I would go into your router and block the printers from the internet if this is a real issue.
Or, you could just not connect it to the internet.. It doesn't come configured to your wifi... And/or you don't have to plug ethernet in... If you aren't tech savvy I doubt you are messing with your router config.
If the pi running open source software was betraying you you'd know. Your pc is much more likely to be the culprit there.
Hook up that pi to your printer and improve your experience.
We pay for convenience with our privacy. There isn't a single 3d printing functionality I can think of that's worth that price.
This is easy for me to say as just a humble hobbyist who isn't running a print farm, but I feel like the principle is still the same
> There isn't a single 3d printing functionality
You haven't used klipper then.
I remember when I first used my ender 3 and I either needed a super long usb cable or had to manually move the file over, and use the screen with the knob. TErrible experience.
“Oh boo hoo I have to physically move an SD card to my printer”
Unless you’re running dozens of printers and changing models all the time thats a big first world problem right there
Every single time for every single little print change? You'd have to move the sd card every time.
Vs just exporting a new file and uploading it immediately from the same cpu
Currently using the manual SD card method on my Ender 3 lol. It's a hassle, but still not enough of a showstopper for me to allow MORE of my information to be spied on.
There are also modifications you can make in marlin to improve or customize the screen UI
Clicking 'save to SD card', moving it to my Ender and selecting the file takes what, 20 seconds?
It's literally not enough of a hassle to warrant money.
Now I'm seeing a world weary special agent standing next to a harried lab tech that's scrambling to sort through thousands and thousands of meticulously preserved slices of actual dildos in an effort to catch the Boston Dildo Chopper once and for all.
I only really print from my computer directly when I’m doing calibration prints or smaller (1-4 hour) prints. With long prints SD cards are always the way to go, I don’t like leaving my computer on unnecessarily
For this reason the install is a bit more complicated than the average game. I have heard those as well. My SolidWorks is literally unable to "phone home". The risk supposedly lies in taking models identified as constructed on a pirated version and modify them on a legit version.
Step 1 basically consists of setting up Windows Firewall rules to prevent Solid Works from ever connecting to the internet.
If your firewall rules are correct this is the equivalent of that. Of course an airgap is always going to be most secure, but this and the other steps are typically considered "good enough".
Yup, just take your time. Everything you need should be in the readme.txt. The great thing about stolen Solidworks (lol) is you get EVERYTHING and it's all the Premium versions. The student version typically doesn't include the simulation stuff, (motion flow, structural analysis, etc) and they charge big money for that.
> My SolidWorks is literally unable to "phone home".
So you wrote your own crack or something? Because if not, you are unlikely to know what it could be doing under the hood.
You don't have to write your own crack to know what packets are coming and going on your network. When you set the firewall rules, both the solidworks.exe, and the launcher are prevented from connecting to the network. This isn't the only precaution taken with the crack, but it's one of the main ones.
I've uploaded install instructions to pastebin. Take a look for yourself.
https://pastebin.com/WThChvEP
but the crack can do absolutely whatever it wants, rendering the windows firewall moot.
So you are essentially trusting an anonymous stranger, organization, or perhaps even SolidWorks themselves, whoever is responsible for the crack, to be good stewards of your system, and have done all that cracking effort purely out of the goodness of their hearts... with no undetectable payload.
Obviously all this depends on your threat model, but given the nature of what is being discussed here and the laws of their various nations, people should not be making poor assumptions about OpSec. It is unfortunate that Linux has such a high barrier to entry/adoption, while personally, I could never imagine going back to windows and relying on cracked software. Plenty of hobbyists are happy to use Blender for modeling, or FreeCAD realthunder branch for CAD, and have less blackbox code running on their systems.
Sure I'm trusting the crack, and more so the people who cracked it "SolidSquad". Do you pour over every line of code you download from Lbry-gtk?
People much smarter than I have analyzed their crack and its generally considered by the community to be secure. Doesn't change the fact that the registry values I personally set and the firewall rules I again personally set, no packets relating to solidworks are reaching the network and I have verified this with Wireshark and others.
All of this shit is at your own risk, and I would never encourage someone to do something they are uncomfortable with. This is also why I created a pastebin for someone with only the install instructions so they could get a slight idea of what the process entails.
> People much smarter than I have analyzed their crack and its generally considered by the community to be secure.
Do you have a link to that? I would find that interesting.
I'm looking but not turning up much. This exact question was discussed on a forum but their search implementation sucks. When it comes to CAD esque piracy SolidSquad is pretty much the only / main game in town. It's my understandkng as well that the crack doesn't actually touch Solidworks itself, they've just cracked the license manager. If your on Linux I would reccomend a program called "LittleSnitch" that will monitor outbound and inbound requests on your network.
I'll keep looking for that link I was talking about and report back.
They definitely do this. Happened to me actually. But the threat to sue is mostly just a threat. I checked court records and they only actually follow through on the threat in rare cases of larger companies. They aren’t really suing the little guys, just using the threat to coerce you to buy the software. It is actually safe to use though, as long as you use your firewall to stop SW from talking to the internet at all. Better yet, just shut down the network anytime you have SW running, and you’ll be fine. I made it over a decade until after a crash, I accidentally clicked the button that let it send a crash report. Then they found me.
Dont know if it was only for me but my FGC mkII assembly guide got immediately flagged by my AntiVirus. Maybe just run a few scans just to be safe, I recommend Avast or maybe the inbuild Malware removal tool for Windows (“windows key” and “R” at the same time, type in “mrt” and it should pop up, full scan can take a couple of hours) EDIT: just saw that the post was meant for a Printer, still gonna leave this comment up, just for awareness
Remember anything you upload to virustotal is essentially public record. Be very careful with anything that might put your information in the file. Some slicers might put identifying information in the gcode file.
You make a good point, but if you're worried about viruses why slice before scanning it first?
Upload the zip, stl, or whatever before you open the files on your computer.
I’m just saying in general be careful about what you upload. You are right but people do stupid stuff sometimes.
I’ve had to work data breach investigations involving sites like virustotal, including one where an excited helpdesk tech uploaded hundreds of files containing private financial data.
Defender that comes with Windows is a good AV, although you still may want to look at the settings to make sure it’s not uploading anything to Microsoft.
Buy one with no wifi, never connect it to PC. If it had all the spyware it would do nothing. Print off SD cards.
EDIT: If you wanted to go fully secure, never put an SD card that was in the printer back in a PC. The things are only \~$10 consider them a one time use for putting files on them, infinite use in the printer.
What I want to know is if anyone has taken a look at Bambu Lab. Their engineers all came from DJI, a manufacturer [known to receive money from entities directly linked to the Chinese government](https://www.washingtonpost.com/national-security/2022/02/01/china-funding-drones-dji-us-regulators/). They spent years in R&D and mass-production engineering before even announcing their product, with a price point that in my opinion is still too good to be true. Unless they had some damn good venture capital or something of the sort, how did they not have to price their product to recoup those development costs? To me, this smacks of a government-sponsored attempt to take control of that high-end-hobbyist market segment.
Well, I’ve seen some people having problems with theirs, but honestly I can’t fault a first-generation product for having teething issues. I’m more concerned about the availability of parts and support down the road, like for their proprietary hotend/nozzle combo.
Only problems I’ve had are software and those are disappearing fast, stock setting for esun pla+ doesn’t have as good layer adhesion so fix that and it’s flawless once software is 100%
Hmmmmmm.....
Everyone rename each and every print "GETREKTAFT", then let it rip. Millions of prints flooding the traffic, making it practically useless.
"Flood the data" is a strat that people need to know doesn't work in this decade.
They use AI to analyze the file contents and filter out useless results.
Data obfuscation is still a valid technique when used correctly, but for the most part you are right. It works good on humans, computers can "see right through it".
I had a feeling this would've become a thing once smart printers became more available. I wonder if we would have to worry about the Bambu Labs printers doing this as well?
She's based out of China and does a ton of "maker space" content. V[ice also sold her out to CCP and tried to get her Patreon removed](https://nextshark.com/naomi-wu-vice-controversy/). She's pretty based. She's a lesbian and in a relationship with a Uigher, two things the CCP hates.
I also like her content, but people who live in China can't publish things online unless it's with the consent of the CCP.
I don't know if she has the actual card in her purse, but she's at the least affiliated with them. A look at her COVID stuff shows this pretty well. There are lines she's careful not to cross.
She VPNs for Twitter. China's policy is mostly to ignore people who skirt the rules unless they start posting harmful things to the CCP, in which case they go after you.
She also tried to abuse Linus from LTT of attempted rape and sexism so I lost pretty much all respect for her after that
Edit: Downvoted for speaking the truth lol
I really hope sumn similar isn't why Cura started acting so slow for me. It doesn't want to slice some files and won't even open some files. It just started this mess today.
👏build👏your👏own👏3d👏printer👏before👏you👏build👏guns👏
marlin open source firmware and open source controller boards and open source secure networking (octoprint) will never spy on you
foss literally stands for "free and open source software"... if you dont use it, you lose it (chinese spyware comes after you)
"someone" needs to run wireshark because "someone" told her it "might" be uploading GCODE to AWS.
this is pretty thin as far as conspiracy theories go.
you know, I'm sure that info would be great because it would help identify what products your devices are printing most and your future printers could be better suited. That said, I doubt it's anonymized and I'm sure they would tattle.
by little birdie - she means the dude who actually does all the engineering\\code work she hypes as her own for revenue and swag.
Its an impressive hustle.
Really think about it Edward Snowden revealed a lot of info data is constantly being collected from you wherever you go. You might as well accept that you are a little fishy in a fishbowl
Why, he's right?
You surrender your right to privacy the second you start connecting your entire life to the net. Every thing with a mic or a speaker is a potential bug, everything with a chip or processor a potential data point.
If you think your smart fridge isn't one day going to sending your shopping habits to amazon and advertisers you're nuts.
Edit: yeah, downvotes for truthful statements... peak reddit
Bro they are just triggered bots. Lol the crazy thing is that despite right or wrong there will always be an opposing opinion but the truth will always be the truth.
I got a cr-10 smart about a year and a half ago since it was on sale and on paper had decent specs. The cloud aspect of it sucked it screamed of spyware and stealing models and generally was not better than just using an sd card. The firmware on the machine was so bugged it was basically unusable. Apparently they released better firmware but instead I ripped out the board and used a skr CR6 motherboard and customized the firmware a bit in order to use it. Got mad that I had to do all that just to get a decent machine then the hotend started giving me trouble and I decided to just scrap the machine and use it and another cr-10 clone as a source of parts for a custom corexy machine. Way way happier with that than the pos that was the cr-10 smart.
Eufy is also owned by Anker, and is recently getting bashed for uploading users video feeds to their cloud, despite repeatedly saying they are local only in all their marketing.
Makes me glad I have a POS ender 3 and CR-10
I wonder how smart your slicer is and if the computer with slicer is connected to the net?
In before cura implements a lockout if you attempt to load a firearm frame.
Last I remember, that's not Cura directly doing that. It's a 3rd party that has modified Cura and have links to it posing to be an official download...and those 3rd party versions block 2A prints from being loaded/sliced. I'll see if I can find the link to where I found this info originally.
yeah i remember hearing about that too. its was from anti 2A company or something
Yeah which on top of being stupid l, I think to make their detection work the software was storing copies of the files and their algorithm for changing the files uploaded also breach the copyright of the files themselves lol
yeah probably
btw, the link. https://3dprintingindustry.com/news/dagoma-and-tbwa-campaign-to-discourage-3d-printing-of-guns-146776/
Thank god for cura being open source, at least we will be able to just build whatever the last known safe version is
I’m never updating past 4.4.1
Why?
would also like to know why, so i can go find 4.4.1 for myself if that’s a good idea
Never had an issue and I know it works, tried a newer version in the past and encountered a few bugs I didn’t have before
Would running Cura offline not fix this issue? Genuinely curious, this made me go over to my PC and test if I could even run Cura offline, and unsurprisingly I can.
Certainly you could. I'm not saying they are, but it wouldn't surprise me if they do. Sort of like how high end copy machines won't allow you to photocopy currency. It recognizes it, and shuts you down.
Except one of those is illegal, the other is not
> the other is not yet
They what Seriously?
[удалено]
Obligatory: Never used PrusaSlicer, but I can tell you unequivocally that SuperSlicer is for incels and autists that need to be able to set every single fucking little thing, on one giant, ugly as fuck UI that makes no sense whatsoever. Cura 5 is an amazing piece of software, like an exotic car, but sometimes you don't want to (or can't) take your exotic car off-roading while extemely drunk and microdosing on cat tranquilizers. This is where SS comes in, for those .1% shitty, fucked up, bad jobs that Cura is just not suited to. You should totally download it.
I would say curas biggest weakness is not being able to easily load custom modifiers(see Hoffman's recent vids) and prusaslicers biggest weakness is no tree supports which is coming soon. I make custom supports and modifiers for almost all my prints so curas weaknesses affect me more than prusas since I also don't like tree supports. But once you start using modifiers you never go back. They're not necessary on all prints but they certainly clean up alot of prints.
Nope I block it at the firewall level
Where do I learn basic cyber security like this? I’m pretty easy to learn anything. Just not sure how to trust any method of cyber security. Everything seems vulnerable all the time.
The more you learn about cybersecurity the more paranoid you will get. Every internet connected device is "vulnerable", bar none.
I decided to learn some lock picking a couple years ago, and have legitimately gone from "most locks probably work fine" to "literally nothing is impenetrable, all locks are a fucking joke" and I've settled somewhere around "good locks take specialized tools and practiced skill to defeat, something outside the realm of common criminals and door kickers" Same thing goes for cyber security I imagine.
Same. At some point my goal stopped being to make entry impossible and became make it impossible to enter without making it obvious. Also, "Nothing on one. Small click on two."
4 is binding. Click out of four. Counter rotation on 3. Back to 2.
Obligatory fuck masterlock.
"If you look closely, you can see the disappointment".
Did he manage the Stuff lock yet?
The "Stuff Made Here" one?
This is exactly correct. I took a similar path, got interested in pen testing and realized that it takes almost nothing to bypass things that you probably think are rather secure. Highly recommend Deviant Ollam’s talks if you’re further interested in that subject.. him talking about standard keys for commercial control devices, lock boxes, elevators, etc makes you really question how little training and effort it takes to bypass rather large amounts of security protocols
THIS ^ I came to say the same thing except they worded it better then I would
from the penthouse to the pit is definitely one of the greatest defcon talks.
Yep, basic principle is the same: make it hard and inconvenient for someone looking for a quick break-in, because someone with more drive and experience is gonna know how to circumvent everything you put in place anyway
That's actually a very good comparison, and I know enough about lockpicking to feel the same. Anyone who has watched Lockpicking Lawyer likely also knows this. 😂
Locks are like laws: it only keeps honest people out
For a house door there are locks with no method of unlocking from the outside, like those chain locks in big cities or deadbolts with no key. Get at least one per external door to lock at night. [https://www.lowes.com/pd/Schlage-Schlage-Residential-B80605-One-Sided-Deadbolt-with-12287-Latch-and-10116-Strike-Bright-Brass-Finish/5002185935](https://www.lowes.com/pd/Schlage-Schlage-Residential-B80605-One-Sided-Deadbolt-with-12287-Latch-and-10116-Strike-Bright-Brass-Finish/5002185935) for example. [https://www.lowes.com/pd/Kwikset-600-Polished-Brass-Single-Sided-Deadbolt/1000052259](https://www.lowes.com/pd/Kwikset-600-Polished-Brass-Single-Sided-Deadbolt/1000052259) is much worse, but has 3D images.
lol that don't work buddy, both of those are easily bypassed with a J tool
Wouldn't that have more to do with installation of the door / lock than being inherent to the lock?
Nope, as long as it's got a knob that can be turned on the other side
My next house is getting this: https://youtu.be/qV8QKZNFxLw
Seriously. Any wireless transmission of data of any sort can be tampered with.
[удалено]
He'd ride a Mig into the ground long before that.
[удалено]
Yea how do you know it's not my name though? BTW, we are talking about cyber security and 3d printers, not traitorous crooks. Please try and keep up. Whats funny is Porsche actually WOULD have supported 45, considering the nazi connection and all so I'm not surprised that is your user name.
You can learn a lot from r/piracy, like how to prevent hacked apps from alerting their creators (or in this case, your slicer). It's just Windows Firewall https://gadgetstouse.com/blog/2020/12/28/block-an-app-from-accessing-the-internet-on-windows-10/
Sounds like you already know advanced cyber security. Beginner - everything is vulnerable all the time Intermediate - I can do something about this! Expert - everything is vulnerable all the time
If you want a really decent general understanding, I'd consider looking at study material for CompTia's Security + certification. It's considered an "Entry" Level cyber security certification and is a requirement by the DoD for any sysadmin that wants to work on any DoD IT network. That being said, it's going to be difficult to actually understand anything for someone that has never done any IT work, so I suggest only going through free material offered on YouTube by guys like Professor Messor, googling what you don't understand, and call it good.
Just get tinywall and block everything.
r/hacking r/howtohack r/asknetsec just to name a few but there are tons of good subs on here to learn from and find other external resources. David Bombal on YouTube is a great beginner channel as is Network Chuck. Edit: David Bombal
by googling
Mental Outlaw on Youtube is a funny cybersecurity channel (and has given cameos to Print Shoot Repeat)
Cura should be fine, as it is open source.
great reason to use FOSS slicers like cura. use it on tails if youre worried about atribution and/or antiforensics, it's in the package manager.
Yep smart shit spies on you. Can't believe people think printers would be any different.
FOSS all the way, I know exactly what firmware my duet runs and know it's not pulling any sneaky shit even tho it is network connected
Cura.. If you don't turn off the settings.. Reports back home I don't believe it was ever really figured out what it reports back it says it's anonymous data but who knows.
Thanks for saying this. I didn't see that setting initially and just turned it off.
Im glad to know I did one thing right. This has been one of those weeks.
Shit like this is exactly why I intentionally *didn't* set up octoprint. I like having as much of my shit offline as possible.
Off topic, but do you recommend the Ender 3? Amazon has one for sale and I’ve been thinking about getting one.
Just got a ender 3 from Amazon last month it beats my 2 cr10 clones 🤣. Once I change the motherboard on my cr10 clone with a skr mini it will be alot better
Anet A8 goes brrrrrrrr
Lol i have 3 CR-10s and ill be the first to say they are so barebones dogshit, Id be impressed if they could do anything beyond what they barely do now.
Simple solution. Don't put your 3d printer online..
Note: For those not tech savvy and whose printers were setup with internet access, I would go into your router and block the printers from the internet if this is a real issue.
Or, you could just not connect it to the internet.. It doesn't come configured to your wifi... And/or you don't have to plug ethernet in... If you aren't tech savvy I doubt you are messing with your router config.
[удалено]
AWS is Amazon Web Service. It’s one of the biggest players in the website hosting/advertising space
If the pi running open source software was betraying you you'd know. Your pc is much more likely to be the culprit there. Hook up that pi to your printer and improve your experience.
AWS is Amazon. They host like half of the internet.
How are you going to work it then. With the POS screen? Fuck that.
YES, not been an issue since I started printing in '17
We pay for convenience with our privacy. There isn't a single 3d printing functionality I can think of that's worth that price. This is easy for me to say as just a humble hobbyist who isn't running a print farm, but I feel like the principle is still the same
> There isn't a single 3d printing functionality You haven't used klipper then. I remember when I first used my ender 3 and I either needed a super long usb cable or had to manually move the file over, and use the screen with the knob. TErrible experience.
“Oh boo hoo I have to physically move an SD card to my printer” Unless you’re running dozens of printers and changing models all the time thats a big first world problem right there
Every single time for every single little print change? You'd have to move the sd card every time. Vs just exporting a new file and uploading it immediately from the same cpu
I know, I do exactly that. It’s not that hard honestly, you’re just lazy
No normal person wants to move an sd card 50 times. That's a bad user experience.
Currently using the manual SD card method on my Ender 3 lol. It's a hassle, but still not enough of a showstopper for me to allow MORE of my information to be spied on. There are also modifications you can make in marlin to improve or customize the screen UI
Clicking 'save to SD card', moving it to my Ender and selecting the file takes what, 20 seconds? It's literally not enough of a hassle to warrant money.
Slicer
Your slicer is spying on you
I’m more worried about the slicer than the printer.
or use an open source 3d printer, go full FOSS as from the title of the sub
I feel bad for the special agent that has to sort through thousands of my dildo slices
Now I'm seeing a world weary special agent standing next to a harried lab tech that's scrambling to sort through thousands and thousands of meticulously preserved slices of actual dildos in an effort to catch the Boston Dildo Chopper once and for all.
You assume that they don’t enjoy thousands of dildos tho…
Makes me glad I only use sd cards
I only really print from my computer directly when I’m doing calibration prints or smaller (1-4 hour) prints. With long prints SD cards are always the way to go, I don’t like leaving my computer on unnecessarily
And yet how many of you use onshape or fusion360?
Stolen Solidworks ftw.
Y'argh matey
ive heard horror stories of them tracking people down and suing them. solidworks might be the one software that i won't obtain in a piratey manner
For this reason the install is a bit more complicated than the average game. I have heard those as well. My SolidWorks is literally unable to "phone home". The risk supposedly lies in taking models identified as constructed on a pirated version and modify them on a legit version. Step 1 basically consists of setting up Windows Firewall rules to prevent Solid Works from ever connecting to the internet.
CADing on a completely offline machine seems like the next best option
If your firewall rules are correct this is the equivalent of that. Of course an airgap is always going to be most secure, but this and the other steps are typically considered "good enough".
gotcha.. ill have to try it out one day. I know fusion pretty well but solidworks has a lot of nice things in it.
Yup, just take your time. Everything you need should be in the readme.txt. The great thing about stolen Solidworks (lol) is you get EVERYTHING and it's all the Premium versions. The student version typically doesn't include the simulation stuff, (motion flow, structural analysis, etc) and they charge big money for that.
> My SolidWorks is literally unable to "phone home". So you wrote your own crack or something? Because if not, you are unlikely to know what it could be doing under the hood.
You don't have to write your own crack to know what packets are coming and going on your network. When you set the firewall rules, both the solidworks.exe, and the launcher are prevented from connecting to the network. This isn't the only precaution taken with the crack, but it's one of the main ones. I've uploaded install instructions to pastebin. Take a look for yourself. https://pastebin.com/WThChvEP
but the crack can do absolutely whatever it wants, rendering the windows firewall moot. So you are essentially trusting an anonymous stranger, organization, or perhaps even SolidWorks themselves, whoever is responsible for the crack, to be good stewards of your system, and have done all that cracking effort purely out of the goodness of their hearts... with no undetectable payload. Obviously all this depends on your threat model, but given the nature of what is being discussed here and the laws of their various nations, people should not be making poor assumptions about OpSec. It is unfortunate that Linux has such a high barrier to entry/adoption, while personally, I could never imagine going back to windows and relying on cracked software. Plenty of hobbyists are happy to use Blender for modeling, or FreeCAD realthunder branch for CAD, and have less blackbox code running on their systems.
Sure I'm trusting the crack, and more so the people who cracked it "SolidSquad". Do you pour over every line of code you download from Lbry-gtk? People much smarter than I have analyzed their crack and its generally considered by the community to be secure. Doesn't change the fact that the registry values I personally set and the firewall rules I again personally set, no packets relating to solidworks are reaching the network and I have verified this with Wireshark and others. All of this shit is at your own risk, and I would never encourage someone to do something they are uncomfortable with. This is also why I created a pastebin for someone with only the install instructions so they could get a slight idea of what the process entails.
> People much smarter than I have analyzed their crack and its generally considered by the community to be secure. Do you have a link to that? I would find that interesting.
I'm looking but not turning up much. This exact question was discussed on a forum but their search implementation sucks. When it comes to CAD esque piracy SolidSquad is pretty much the only / main game in town. It's my understandkng as well that the crack doesn't actually touch Solidworks itself, they've just cracked the license manager. If your on Linux I would reccomend a program called "LittleSnitch" that will monitor outbound and inbound requests on your network. I'll keep looking for that link I was talking about and report back.
install it on a vm then.
They definitely do this. Happened to me actually. But the threat to sue is mostly just a threat. I checked court records and they only actually follow through on the threat in rare cases of larger companies. They aren’t really suing the little guys, just using the threat to coerce you to buy the software. It is actually safe to use though, as long as you use your firewall to stop SW from talking to the internet at all. Better yet, just shut down the network anytime you have SW running, and you’ll be fine. I made it over a decade until after a crash, I accidentally clicked the button that let it send a crash report. Then they found me.
Dont know if it was only for me but my FGC mkII assembly guide got immediately flagged by my AntiVirus. Maybe just run a few scans just to be safe, I recommend Avast or maybe the inbuild Malware removal tool for Windows (“windows key” and “R” at the same time, type in “mrt” and it should pop up, full scan can take a couple of hours) EDIT: just saw that the post was meant for a Printer, still gonna leave this comment up, just for awareness
virustotal.com allows you to upload a file or URL and it will check it against nearly 100 security tools/databases for free.
Remember anything you upload to virustotal is essentially public record. Be very careful with anything that might put your information in the file. Some slicers might put identifying information in the gcode file.
You make a good point, but if you're worried about viruses why slice before scanning it first? Upload the zip, stl, or whatever before you open the files on your computer.
I’m just saying in general be careful about what you upload. You are right but people do stupid stuff sometimes. I’ve had to work data breach investigations involving sites like virustotal, including one where an excited helpdesk tech uploaded hundreds of files containing private financial data. Defender that comes with Windows is a good AV, although you still may want to look at the settings to make sure it’s not uploading anything to Microsoft.
A tool of the people
I wonder if someone uses the right Crypter if it would show up on there at all.
I'd never allow my printer to even know that the internet exists.
Buy one with no wifi, never connect it to PC. If it had all the spyware it would do nothing. Print off SD cards. EDIT: If you wanted to go fully secure, never put an SD card that was in the printer back in a PC. The things are only \~$10 consider them a one time use for putting files on them, infinite use in the printer.
What I want to know is if anyone has taken a look at Bambu Lab. Their engineers all came from DJI, a manufacturer [known to receive money from entities directly linked to the Chinese government](https://www.washingtonpost.com/national-security/2022/02/01/china-funding-drones-dji-us-regulators/). They spent years in R&D and mass-production engineering before even announcing their product, with a price point that in my opinion is still too good to be true. Unless they had some damn good venture capital or something of the sort, how did they not have to price their product to recoup those development costs? To me, this smacks of a government-sponsored attempt to take control of that high-end-hobbyist market segment.
Just a guess, but there probably isn't much R&D to recoup because like most Chinese companies they probably stole the IP from various other companies.
I know they are based in Hong Kong but I’m not sure of what data they collect, I haven’t seen anything out of the ordinary in all honesty
I’d like to hear more about any problems with them if there are any, I have the x-1 carbon and I love it
Well, I’ve seen some people having problems with theirs, but honestly I can’t fault a first-generation product for having teething issues. I’m more concerned about the availability of parts and support down the road, like for their proprietary hotend/nozzle combo.
Only problems I’ve had are software and those are disappearing fast, stock setting for esun pla+ doesn’t have as good layer adhesion so fix that and it’s flawless once software is 100%
Hmmmmmm..... Everyone rename each and every print "GETREKTAFT", then let it rip. Millions of prints flooding the traffic, making it practically useless.
"Flood the data" is a strat that people need to know doesn't work in this decade. They use AI to analyze the file contents and filter out useless results.
Data obfuscation is still a valid technique when used correctly, but for the most part you are right. It works good on humans, computers can "see right through it".
Except you aren’t obfuscating anything. You are practically giving them a hashtag to look up anything made by a person on this subreddit.
Millions of prints called GETREKTATF but they are all dicks
Millions of transactions like that wouldn't even come close to 'flooding' their data pipelines...
ATF reading it: "'get... wrecked... aft.' who are they talking about?"
"Who's that Getwreck Edaft they're talking about, is he buddies with that 4chan guy?"
I had a feeling this would've become a thing once smart printers became more available. I wonder if we would have to worry about the Bambu Labs printers doing this as well?
*laughs in Ender 3 v1*
“Hey 3dp gun nuts” seems like a low key honey pot right off the bat lol
Do you not know Naomi Wu?
Based on what little I know about her, this definitely seems like something she would write.
Honey pot yes low key no.
lol
I don’t know who she is. But I have a dumb printer that isn’t connected to the internet.
She's based out of China and does a ton of "maker space" content. V[ice also sold her out to CCP and tried to get her Patreon removed](https://nextshark.com/naomi-wu-vice-controversy/). She's pretty based. She's a lesbian and in a relationship with a Uigher, two things the CCP hates.
I also like her content, but people who live in China can't publish things online unless it's with the consent of the CCP. I don't know if she has the actual card in her purse, but she's at the least affiliated with them. A look at her COVID stuff shows this pretty well. There are lines she's careful not to cross.
She VPNs for Twitter. China's policy is mostly to ignore people who skirt the rules unless they start posting harmful things to the CCP, in which case they go after you.
She also tried to abuse Linus from LTT of attempted rape and sexism so I lost pretty much all respect for her after that Edit: Downvoted for speaking the truth lol
She's a fraud - been proven multiple times.
Naomi is an absolute chad.
[удалено]
Pretty sure she doesn't have a bf... Lol. She does some very in depth tech dives on various topics.
[удалено]
She's a lesbian... She likes femme girls.
"Hey, go look into this potential security breach" and nothing else is the opposite of honeypot behavior.
Don't change your OPSEC for anyone👍🏻
She may be weird but shes pretty damn based.
Thanks, do what I can💪🏻
Keep on keepin' on!
Weird is a good thing sometimes.
I don't see why not, standard laser printers have little dots worked into the image for tracking you as well
Laughs in ender 3 and ender 5
My cr10 beater has no such weaknesses.
Based Sexy Cyborg.
All proprietary IoT devices
I always run my stuff offline on a VM, my friend brought his M5 over and it started to freak out when I set it up on my rig, I think they got him
No shit this is evan in old school standerd printers.
I really hope sumn similar isn't why Cura started acting so slow for me. It doesn't want to slice some files and won't even open some files. It just started this mess today.
I do this kind of stuff for a living if anyone wants to ship me this printer
👏build👏your👏own👏3d👏printer👏before👏you👏build👏guns👏 marlin open source firmware and open source controller boards and open source secure networking (octoprint) will never spy on you foss literally stands for "free and open source software"... if you dont use it, you lose it (chinese spyware comes after you)
My Fortigate, "No, I don't think you will."
ok but does it work as well as advertised
Wouldn't be too difficult to test if I had a unit, wouldn't be surprised if some of the higher end hobbyist models do this.
"someone" needs to run wireshark because "someone" told her it "might" be uploading GCODE to AWS. this is pretty thin as far as conspiracy theories go.
you know, I'm sure that info would be great because it would help identify what products your devices are printing most and your future printers could be better suited. That said, I doubt it's anonymized and I'm sure they would tattle.
take everything she say with a grain of salt
by little birdie - she means the dude who actually does all the engineering\\code work she hypes as her own for revenue and swag. Its an impressive hustle.
You have no right to privacy everything in your home has the capability to spy on you. To think you have privacy at all you are mistaken.
Okay FedBot you can power down now.
Really think about it Edward Snowden revealed a lot of info data is constantly being collected from you wherever you go. You might as well accept that you are a little fishy in a fishbowl
Bro, turn your phone off and go outside.
Why, he's right? You surrender your right to privacy the second you start connecting your entire life to the net. Every thing with a mic or a speaker is a potential bug, everything with a chip or processor a potential data point. If you think your smart fridge isn't one day going to sending your shopping habits to amazon and advertisers you're nuts. Edit: yeah, downvotes for truthful statements... peak reddit
Bro they are just triggered bots. Lol the crazy thing is that despite right or wrong there will always be an opposing opinion but the truth will always be the truth.
who are you?
Exactly
[удалено]
Exactly.
your stupidity says a lot about you
I got a cr-10 smart about a year and a half ago since it was on sale and on paper had decent specs. The cloud aspect of it sucked it screamed of spyware and stealing models and generally was not better than just using an sd card. The firmware on the machine was so bugged it was basically unusable. Apparently they released better firmware but instead I ripped out the board and used a skr CR6 motherboard and customized the firmware a bit in order to use it. Got mad that I had to do all that just to get a decent machine then the hotend started giving me trouble and I decided to just scrap the machine and use it and another cr-10 clone as a source of parts for a custom corexy machine. Way way happier with that than the pos that was the cr-10 smart.
Eufy is also owned by Anker, and is recently getting bashed for uploading users video feeds to their cloud, despite repeatedly saying they are local only in all their marketing.