Posts
2437
Following
590
Followers
1308
A drunken debugger

Heretek of Silent Signal
@fj You mean the Rule of Law?

https://en.wikipedia.org/wiki/Rule_of_law

It's so weird to see people (esp. in the US) acting as if humanity didn't have hundreds or even thousands of years of experience about how governance should (not) work.
0
0
3
repeated

In ~1h, we’ll explore the awesome and clever DOOM.PDF!
https://www.youtube.com/live/t17joAiWBkE?si=clV3nvyFZ5DjKQ5e

0
3
0
@algernon Glad you found it useful! Please post updates about how things are going!
1
0
1
[RSS] The case of the crash when trying to erase an element from a std::set

https://devblogs.microsoft.com/oldnewthing/20250117-00/?p=110777

Rust made me see cases like this in a much different light!
0
0
1
repeated
repeated

Just saying this again because the news is so bad at covering basic facts: TikTok is NOT required to shut down in the US

App stores are required to delist the app in the US, but existing users would be allowed to keep using it

TikTok blocking US users is strictly performative

1
4
0
#music #deathmetal
Show content
0
0
0
repeated

For those of you who are also deep into Windows , , and : My first blog post on researching the Windows driver load order and all its quirks is out, beginning with some WinDbg fundamentals: https://colinfinck.de/posts/nt-load-order-part-1/

1
2
0
repeated

The TikTok ban, the Musk Twitter takeover, the Facebook moderation policy changes, the Republicans’ rapidly intensifying crackdowns on speech... let these be the proof you needed to move anything you care about online to a space you control.

Digital sovereignty is more important than ever.

16
37
1
@algernon I'm wondering if it'd be more effective (in terms of impact/service cost) to serve finite trees that update periodically, like a real web site? I guess this way you could make the bot come back (poison it for a longer time) and constrain the expected bandwidth per visit?
1
0
5
repeated

ROFLMAO.

Claude decided to crawl one of the sites on my new server, where known bots are redirected to an iocaine maze. Claude has been in the maze for 13k requests so far, over the course of 30 minutes.

I will need to fine tune the rate limiting, because it didn't hit any rate limits - it scanned using 902 different client IPs. So simply rate limiting by IP doesn't fly. I'll rate limit by (possibly normalized) agent (they all used the same UA).

Over the course of this 30 minutes, it downloaded about ~300 times less data than if I would've let it scrape the real thing, and each request took about the tenth of the time to serve than the real thing would have. So I saved bandwidth, saved processing time, likely saved RAM too, and served garbage to Claude.

Job well done.

21
12
1
repeated

I knew would come for all our jobs eventually, but I really thought that Holocaust denial would be safe for a little while longer.

https://futurism.com/the-byte/ai-anne-frank-blame-holocaust

5
8
0
repeated

Inspirational Skeletor💀

2
4
0
repeated

bert hubert 🇺🇦🇪🇺

Also for your mental health, I recommend never reading the source code for the various implementations of mktime() and strptime(). The authors really try their best, but on reading that, you worry how anything ever works. https://github.com/bminor/glibc/blob/master/time/mktime.c

4
3
0
@nuintari This is not only true for Fortinet. What we can see here is a serious market failure that's been building up for a long while and probably won't go away anytime soon.
1
0
1
repeated

Okay this is wild: I just noticed that changing 'PasswordAuthentication' to 'no' in /etc/ssh/sshd_config is no longer enough to disable password authentication in . That's because Ubuntu Server now by default creates a sshd_config.d/50-cloud-init.conf file which contains 'PasswordAuthentication yes' which takes priority over sshd_config.

I would've unknowingly left password auth on if I hadn't double checked.

Why?

More: https://askubuntu.com/questions/1516262/why-is-50-cloud-init-conf-created

1
6
0
@jerry @gangrif @johntimaeus

"so the decryption of the private key and mail files happens on your own computer (or in your browser). " - this a periodic reminder that browser-based clients download the code required to "securely" handle the user keys from the same entity (in this case Proton) that we want to hide the keys from...
0
0
2
repeated

bert hubert 🇺🇦🇪🇺

So how hard could it be to convert `Fri, 17 Jan 2025 06:07:07` in UTC into a UNIX epoch time_t timestamp, in C or C++? Quite hard. Many things that you'd think would work actually don't. Here I present solutions (with running code), and a little tour through 'struct tm', 'time_t', 'mktime' and 'strptime':

https://berthub.eu/articles/posts/how-to-get-a-unix-epoch-from-a-utc-date-time-string/

7
5
0
@freddy I'm doing a pet project now primarily for learning, and doing things "the rusty way" proved to be enlightening so far. If I wanted to get shit done I would've just done it in Python and be done with it 2 hours ago :D
1
0
1
Show older