Posts
2466
Following
559
Followers
1265
A drunken debugger

Heretek of Silent Signal
repeated

Looks like Hungary will bring the CSAM reg (“chat control”) — a plan to mass-scan all private messages — back for another vote in the EU Council this Wednesday and Thursday. They’ve picked up support from Italy this time.

3
9
0
repeated
[RSS] From Pwn2Own Automotive: More Autel Maxicharger Vulnerabilities

https://www.thezdi.com/blog/2024/10/2/from-pwn2own-automotive-more-autel-maxicharger-vulnerabilities
0
0
0
repeated

Maybe it's just me, but that is like 10x worse. They're basically admitting they didn't pay an influencer to spread misinformation about public wifi in order to sell VPN products, they just stole her likeness, used her photo, and attributed completely made up quote to her.

If they did that to me, we'd all be discussing my actions at Geneva's next convention.

14
14
1
repeated

Seems has not yet released some updated BMC firmware to fix -2024-36435
since July 2024.
https://nvd.nist.gov/vuln/detail/CVE-2024-36435

1
3
0
repeated

George Takei verified 🏳️‍🌈🖖🏽

Points were made...

0
3
0
[RSS] Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part II

https://devco.re/blog/2024/10/05/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part2-en/
0
0
1
@stf Didn't know that one, very interesting! Thanks!
0
0
1
"- If I were to say to you, 'I am a stranger traveling from the East, seeking that which is lost'...
- Then I would reply that, 'I am a stranger traveling from the West, it is I whom you seek.'"

https://mummy.fandom.com/wiki/Medjai

Is there a technical term for similar "identifier phrases"?

I'm looking for ways for mutual authentication for humans, e.g. over the phone.
1
1
1
repeated
repeated

The rise of Mastodon has made me so much more aware of government services requiring us to use private companies’ systems to communicate with them and access services.

Sitting on a Dutch train just now I was shown on a screen “feeling unsafe in the train? Contact us via WhatsApp”.

What if I don’t use WhatsApp? (I do, but I wish I didn’t have to) I’m forced to share my data with Meta to use it.

Public systems should not require use of private services.

4
39
0
repeated

While trying to properly document Meta's use of public content for LLM training, I discovered they have a new "Privacy Center" that is not plaintext by any means. What's more, the "printable version" does not appear to contain the information related to using your public posts for training data.

Direct link: https://privacycenter.instagram.com/guide/generative-ai/

1
6
0
repeated

What I really want from technology these days is passivity. Physical buttons, and PASSIVITY.

No guessing, no anticipating, no predicting.
No autofill, no autocorrect, no autodrive and PLEASE God no autoplay.

Just be inert until acted upon!

6
14
0
repeated

Good Retry, Bad Retry: an incident story. How exponential backoff isn't enough.

https://medium.com/yandex/good-retry-bad-retry-an-incident-story-648072d3cee6

Archive link: https://archive.ph/H3dIq

0
1
0
repeated

Wrote about representation of control flow and exceptions in the CFGs in my function-graph-overview extension.

https://tamir.dev/posts/cfg-visualization-legend/

0
1
1
repeated

OK, so I have 'prepped' the Seat61 Budapest<>Belgrade page for the launch of direct 200km/h Subotica-Belgrade SOKO trains on 24 November, https://seat61.com/trains-and-routes/budapest-to-belgrade-by-train.htm
Anyone happen to know the planned timetable?

3
2
0
repeated
bash insanity
Show content

So you enabled `set -e` cause yiu thought it will catch failures of intermediate commands that you don't check the result of?

That it's kinda like exceptions or replacing all newlines with an implicit &&?

WRONG

Try this and see how many times it prints "hi"

set -e
foo() {
false
echo "hi"
}

foo || echo "foo failed"
echo "survived 1"
foo
echo "survived 2"

1
2
0
repeated

Here are the slides from my BSides Canberra Keynote @bsidescbr

The Exploit Development Lifecycle: From Concept To Compromise https://drive.google.com/file/d/1jHnVdjAcPGkuVPiakZBAOTp8uzMej6LY/view

1
5
1
[RSS] Exploiting Visual Studio via dump files - CVE-2024-30052

https://ynwarcs.github.io/exploiting-vs-dump-files
0
0
2
Show older