> What if success was not privatizing resources but instead contributing to the commons, to make it each day better, richer, stronger?
We should be proud of our EU commons
I love that article from @ploum - https://ploum.net/2026-01-22-why-no-european-google.html
The new AirTags 2 just arrived!
Time to take them apart 🧵
Fuzzing software becomes much more effective if you can generate _valid_ inputs. We have now built the first approach to _statically_ extract complete and precise input grammars from parser code, producing syntactically valid and diverse inputs by construction. Enjoy! https://dl.acm.org/doi/10.1145/3776743
Horrible idea:
Disclose vulns in the speech bubbles of furry porn commissions
They know what's in your house.
They know who your friends are.
They know what you say about people behind their back.
They know what you eat.
They know where you sleep.
They know when you're on your period.
They know when you fart.
They are not the NSA.
They are not the CIA.
They are your child's kindergarden teachers.
Tim Cook Wrote a Memo on the ‘Events in Minneapolis’
https://daringfireball.net/linked/2026/01/28/tim-cook-memo
The VulnCheck research team found an unauth RCE vuln in SmarterMail that at least three other researchers discovered independently. VulnCheck canaries are also detecting in-the-wild exploitation of CVE-2026-24423. Lots of sudden attention on this software from researchers and adversaries.
https://www.vulncheck.com/blog/smartermail-connecttohub-rce-cve-2026-24423
Build systems suck, all of them. They try to solve a real problem but fundamentally the only way to win this game is not to play.
*ducks*
V now has SSA, SSA => x64/arm64 backends, a linker built in V and a code signer.
As the result, a 2000 line test program is compiled in 8ms!
It's work in progress, self hosting is not possible yet. But once it is, it's going to be awesome!
OpenSSL Security Advisory
https://openssl-library.org/news/secadv/20260127.txt
One high, one medium, and 9 low severity issues.
The high severity is a stack buffer overflow in CMS AuthEnvelopedData parsing (CVE-2025-15467): attacker provides an oversized IV, leading to buffer overflow prior to authentication, possibly leading to remote code execution if you're parsing untrusted CMS or PKCS#7 content with AEAD (e.g., AES-GCM).