Mildly amusing: this Aussie dude got fed up with people parking in his driveway so he installed a motion-activated sprinkler.
The swift strict memory safety proposal has been accepted: https://forums.swift.org/t/accepted-se-0458-opt-in-strict-memory-safety-checking/78116
We found out that machines performed 7% better if we trapped them in an endless loop of profound existential anguish
Time spent getting the vulnerable software and deploying it: ~10 hours
Time spent writing the exploit: 14 minutes
“Chrome Browser Exploitation: from zero to heap sandbox escape - Matteo Malvica - NDC Security 2025" https://www.youtube.com/watch?v=RL2po1swXO4
JSON Web Keys have a very peculiar property. It is a cryptographic key serialization format where public and private keys look almost the same. The only difference is that private keys contain more values. This means one can accidentally use a private key instead of a public key. Which works, but isn't very secure.
After my recent presentation at the @owasp_de Day, I was asked to have a look at OpenID Connect keys. Which are, well, in JWK format. I guess you can see where this is going.
https://blog.hboeck.de/archives/909-Mixing-up-Public-and-Private-Keys-in-OpenID-Connect-deployments.html