Posts
2521
Following
646
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

📣 Exciting opportunity in our iOS team for a Senior Vulnerability Researcher with experience in Apple platforms.

Remote or office based.

https://jobs.gohire.io/interrupt-labs-zcocopee/senior-ios-vulnerability-researcher-237538/

0
2
0
@mwichary I don't want to argue about your perception, you do you. Still find the topic worthy of discussion!
1
0
0
@mwichary @darkphoenix It's strange you call one commenter a "know-it-all" while acknowledging others bringing up the same issue (maybe Fedi is playing me?). I think the topic of "effortless markup" you brought up is really interesting and becomes even more interesting if we take into account other layouts. My quick idea: does every layout have "." without modifier?

(slightly related: I recently learned that C syntax differs so wildly from Pascal, because the former was designed by US keyboard users while the latter was from EU)
2
0
0
repeated

Now curious exactly why SGML chose angle brackets! Would love to see a written statement. This is the closest I got to an answer, but it’s not really an answer.

https://www.xml.com/pub/a/w3j/s3.connolly.html

5
1
0
repeated

Do you know of examples of a software library's test suite catching a bug in its upstream dependencies? I've seen a few of these over the years, and I'd like to put together a small list. Things like:

- A programming language implementation's test suite uncovering a bug in other implementations
- A library's test suite uncovering a bug in the language implementation itself
- A framework addon's / extension's test suite uncovering a bug in the framework

4
3
0
repeated

Some pictures of KICKI a DEC PDP-10 model KI10 sn 522 currently in preservation.

Would you like to support us? Visit: https://icm.museum

0
3
0
repeated

You've been asking for the slides from my x33fcon talk this year - here they are!

I covered most modern anti-phishing protections and how to evade them, with a particular focus on how URL rewriting can be used to bypass Google Safe Browsing.

Enjoy! 🪝🐟

🔗👇

0
2
0
repeated

@whitequark @azonenberg @gsuberland The culture of extensive reverse engineering and binary patching to extend proprietary dev tools on Windows has always made me smile. This is one of the crazier examples: https://gitlab.com/VC6Ultimate/VC6Ultimate

1
7
0
repeated

Newsletter: Issue 86 – State power sponsored by Coinbase

Coinbase’s sponsorship of Trump’s military parade angered some in the crypto world, who described the move as “deeply disturbing” and “an insult to everything our industry stands for”. But this is only the latest example of crypto companies aligning with state power.

Earlier this month, the cryptocurrency firm Ripple made a $9.4 million contribution to the San Francisco Police Department to fund a surveillance center outfitted with drones. “We’re going to be covering the entire city with drones,” enthused a SFPD Captain about the donation.

https://www.citationneeded.news/issue-86/

1
6
0
[RSS] Sleepless Strings - Template Injection in Insomnia

https://tantosec.com/blog/2025/06/insomnia-api-client-template-injection/
0
1
1
@sawaba Or _maybe_ this is a subtle message to some _other_ companies that make LLMs write unsubstantiated content about their/competitor products??
0
0
0
👷 After 15 years of entrepreneurship and a few months of sabbatical I'm looking for a regular old job.

My ideal role would be primarily technical, aimed to dissect software to uncover vulnerabilities. Beyond bug mining I'd love to learn to mine better and make new kinds of pickaxes.

My public works and contact info are on my homepage:

https://scrapco.de

Get in touch if you want to know more!

Boosts are appreciated! #FediHire
5
57
10
The latest #IBMi LPE bulletins are now correctly attributed to @silentsignal :

https://www.ibm.com/support/pages/node/7236663 - CVE-2025-33108

https://www.ibm.com/support/pages/node/7237040 - CVE-2025-33122
0
0
4
@sawaba "We can re-prompt when our research question about a security product or technology doesn’t yield the answer we wanted." why do they ask the question if they already know what answer they want? Also "wanting" a particular answer sounds very stupid to me...
1
0
1
repeated
repeated

2014 August 23

The Spectre of Veszprem
* Image Credit & Copyright: Tamas Ladanyi (TWAN)
https://www.asztrotajkep.hu/

Explanation:
The city of Veszprem, Hungary was only briefly haunted by this mysterious spectre. On the morning of August 11, its monstrous form hovered in the mist above municipal buildings near the town center. A clue to its true identity is offered by the photographer, though, who reports he took the picture from the top of a twenty story building with the rising Sun directly at his back. That special geometry suggests this is an example of an atmospheric phenomenon called the Glory or sometimes "the Spectre of the Brocken". Also seen from mountain tops and airplanes when looking opposite the Sun, the dramatic apparition is the observer's shadow on clouds or fog, the small droplets of water scattering light back towards the Sun through complex internal reflections. Careful night sky watchers can also encounter this spectre's analog in astronomy, a brightening of zodiacal light opposite the Sun known as the gegenschein.

https://apod.nasa.gov/apod/ap140823.html

1
1
0
repeated

If anyone has any adb based root exploits for Android 8.1, that would be nice. Link below as an example of something i'm looking for.

https://github.com/j0nk0/GetRoot-Android-DirtyCow

no .exe files in the releases section though /s

0
2
0
repeated

@cR0w @malwareminigun @crow This shirt, but with cR0w

1
2
0
Show older