Posts
2521
Following
646
Followers
1460
"I'm interested in all kinds of astronomy."
repeated
repeated

Hey Andy, you should build that AI workforce _before_ you alienate the rest of your real worksforce. https://www.aboutamazon.com/news/company-news/amazon-ceo-andy-jassy-on-generative-ai

0
1
1
repeated

Todays Advice from Archive Andy

Check your DVD-Rs**

Don’t leave em laying about in random places

This is the only copy of a Wedding Video. Or, it was the only copy. Its got severe Disc Rot. Might be hard to see but it’s gone dark & is now unplayable

*also +R, -RW, +RW
Get the data off quick

0
6
0
@cthos Sure all those GPU's Nvidia sold in the recent years are just sitting idle in some basement...
0
0
3
repeated

New report for the month of May: https://rust-gcc.github.io/2025/06/04/2025-05-monthly-report.html

We are making good progress on core and plan on begin testing the Rust code in the kernel at the end of the summer!

0
2
0
repeated

At Akamai, we're launching a blog post series on various topics relating to post-quantum cryptography. The first post is by @rsalz, discussing some related IETF initiatives, including the two drafts he co-authored:

https://www.akamai.com/blog/trends/building-quantum-safe-internet-ietf-plan-tls

0
1
0
Hungarian urbexer sneaks into an operating power plant and orders pizza o.O #OT #urbex

https://www.youtube.com/watch?v=_YtzaU9d-1M
0
1
3
repeated

Looks like today's theme is

8
18
1
[RSS] NHook - Minimal Inline Hooking Library for Windows x64

https://github.com/woldann/NHook
0
0
2
[RSS] Introduction to Kmemdump

https://www.linaro.org/blog/introduction-to-kmemdump/

"A smarter way to Capture Crash Data on Embedded Linux Devices"
0
0
3
repeated

Exploring fault injection on ESP32 V3!

Inspired by Delvaux work, we tested voltage as an attack vector. With advanced triggers & GDB, we achieved a ~1.5% success rate. is becoming more practical!

https://security.humanativaspa.it/fault-injection-follow-the-white-rabbit/

0
3
0
repeated

@inecas @Axolotl1 @davidgerard In Gulliver's Travels, the Laputans had a machine called The Engine that put words together randomly, with scribes writing down any meaningful phrases that happened to be formed.

"Every one knew how laborious the usual method is of attaining to arts and sciences; whereas, by his contrivance, the most ignorant person, at a reasonable charge, and with a little bodily labour, might write books in philosophy, poetry, politics, laws, mathematics, and theology, without the least assistance from genius or study.”

The Wikipedia page for The Engine currently says "See also Large Language Model".

https://en.wikipedia.org/wiki/The_Engine

0
5
0
repeated
Edited 18 days ago

Oh WhatsApp, you changed. Meta got the best out of you.

"No one wakes up excited to see more advertising, no one goes to sleep thinking about the ads they'll see tomorrow.”

"Advertising isn't just the disruption of aesthetics, the insults to your intelligence and the interruption of your train of thought.β€œ

~ WhatsApp Blog, June 18th 2012
https://blog.whatsapp.com/why-we-don-t-sell-ads

9
9
0
@offby1 https://radicale.org/v3.html works so well I had to log in to my server to remember its name.
0
0
0
repeated

A quick-and-dirty late night blog post on discovering an nday variant in Zyxel NWA50AX Pro devices

https://frycos.github.io/vulns4free/2025/06/17/zyxel-nday-variant.html

0
6
0
New Qualys reports to read while sipping your morning coffee:

https://www.openwall.com/lists/oss-security/2025/06/17/4

CVE-2025-6018: LPE from unprivileged to allow_active in *SUSE 15's PAM
CVE-2025-6019: LPE from allow_active to root in libblockdev via udisks
0
3
7
So glad someone properly called out kWh!

https://www.youtube.com/watch?v=kkfIXUjkYqE

#CursedUnits
0
0
3
repeated

🚨 New Rowhammer paper πŸ”¨

Our latest work McSee reveals that Intel & AMD CPUs don't use DDR5's RFM cmds 🚫 and Intel uses pTRR on client CPUs πŸ’₯

Meet McSee, our oscilloscope-based platform that exposes hidden DDR4/5 behaviors 🧐

πŸ‘‰ http://comsec.ethz.ch/mcsee

0
2
0
Show older