Posts
3035
Following
701
Followers
1550
"I'm interested in all kinds of astronomy."
repeated

If you're interested in obscure details of the microcode in the Intel 8087 floating-point chip, I have a new blog post...
https://www.righto.com/2025/12/8087-microcode-conditions.html

1
7
0
repeated
I just got reminded that when you start a brand new smartphone the default screen autolock time is around 30s.

This is the attention span vendors are expecting from you.
0
0
3
[RSS] Why are we worried about memory access semantics? Full barriers should be enough for anybody

https://devblogs.microsoft.com/oldnewthing/20251226-00/?p=111919
0
0
0
repeated

Today I saw this UNIX v4 PDP11 emulator (running simh in the browser) and decided to write an IO plugin for radare2 to load tapes. Here's the source in case you are curious about how tapes are structured and how to extend r2 with new features like IO backends. https://github.com/radareorg/radare2/commit/aeeccc1d23d3b75edcd6e0013f1372830a6af134

0
3
0
repeated

Gentle Reminder for Newcomers mastodon :

Boosting posts keeps Mastodon alive!

Boost what you love! 💚
Boost freely! boost_ok

0
7
0
repeated
repeated

LMAO.

https://www.cve.org/CVERecord?id=CVE-2025-68120

To prevent unexpected untrusted code execution, the Visual Studio Code Go extension is now disabled in Restricted Mode.

5
4
0
repeated

Learn why some vulnerabilities resist to fuzzing and persist in long-enrolled OSS-Fuzz projects, and how you can find them!

https://github.blog/security/vulnerability-research/bugs-that-survive-the-heat-of-continuous-fuzzing/

0
4
0
repeated

Project Zero Bot

New Project Zero issue:

Samsung: QuramDng FixBadPixelList opcode out-of-bounds read/write

https://project-zero.issues.chromium.org/issues/448241955

CVE-2025-58479
0
1
0
repeated

Project Zero Bot

New Project Zero issue:

Samsung: QuramDng opcodes ignore PixelType, leading to out-of-bounds read/writes

https://project-zero.issues.chromium.org/issues/447479300

CVE-2025-58478
0
2
1
[RSS] Blind trust: what is hidden behind the process of creating your PDF file?

https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/
0
2
1
Checking my YT history, there are videos again I never even clicked, but I guess this is an easy way to rip off advertisers a bit more.

#AdTech
2
1
3
repeated

Glitches in games, especially used for speedrunning, are one of the most fun aspects of hacking to watch!

As an example, check out this video "How Speedrunners BEAT Hollow Knight Silksong In 10 Minutes!" by Abyssoft

https://www.youtube.com/watch?v=M6Jnj-y0G9w

0
2
0
repeated

The “opposite” of a GPU is kinda weird.

Graphcore has a strange chip (IPU) that loves tiny batches...but is also massively parallel.

It used to cost ~$100k. Now you can get one on Ebay for $160 bucks.

The catch is it's almost impossible to use.

3
1
0
repeated

Time to promote this one in 1h. This was an incredible research project, and having seen the talk before at WHY, it's really well explained despite how technical it is.

Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities
dimarts, 30 de desembre del 2025 0:15 CET (Europe/Berlin), Zero

https://events.ccc.de/congress/2025/hub/event/detail/spectre-in-the-real-world-leaking-your-private-data-from-the-cloud-with-cpu-vulnerabilities

0
6
0
#music #deathmetal #clarinet
Show content
Things you didn't know you need in your life: clarinet cover of Fermented Offal Discharge

https://www.youtube.com/watch?v=50vL1uAXn7s
0
3
6
From Silicon to Darude Sand-storm: breaking famous synthesizer DSPs

https://media.ccc.de/v/39c3-from-silicon-to-darude-sand-storm-breaking-famous-synthesizer-dsps

I love CCC talks because you get to hear "pretty easy" and things like "special microscope lenses" in the same sentence :)
0
2
3
Demo video of moving types and symbols from #IDA to #Ghidra with REshare:

https://video.infosec.exchange/w/7VRDzwthgrSzeAHwHvkPtt

#ReverseEngineering
0
2
3
Show older