Posts
3373
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
repeated

My Unix Archive mirror was slaughtered by LLMs overnight, it is on a 10G link, they were taking over 1Gbps in requests to the same files over and over again.

I have Geo-blocked the whole of the US to stop them (with PF).

This is ridiculous.

3
7
0
repeated

watt-hours per memory corruption bug

2
7
0
repeated
repeated

Spotted a reverse engineering boutique at Zurich main station

2
9
0
repeated
repeated

In programming the hard part isn't solving problems, but deciding what problems to solve.

β€” Paul Graham

0
1
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡ΊπŸ‡ΊπŸ‡¦

The attempts by law enforcement & governments to subvert end-to-end encryption are ongoing. The European Commission is going to spend a year thinking about their new "Roadmap for law enforcement access to data", and they are (genuinely) asking for people to join their expert group to help. Here I urge you to join that group (also because I can't): https://berthub.eu/articles/posts/possible-end-to-end-to-end-come-help/

3
15
0
repeated

this year is, again, fabulous. Highly recommended to attend.

1
3
0
repeated

Are we bleeding out? Enjoy our analysis of CitrixBleed 2, aka CVE-2025-5777 - the "new" Citrix NetScaler Memory Leak vulnerability.

We've been using this mechanism to identify vulnerable systems, and hope it helps the teams that need it.. enjoy!

https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777

0
5
0
repeated

Misroute materials.

0
1
0
repeated

Hello you fine Internet folks,

Today's article is on Nvidia's RTX PRO 6000 Blackwell and diving into the Blackwell architecture generally and more specifically into the GB202 GPU die in the RTX PRO 6000.

Hope y'all enjoy!

https://chipsandcheese.com/p/blackwell-nvidias-massive-gpu

https://old.chipsandcheese.com/2025/06/28/blackwell-nvidias-massive-gpu/

0
2
0
repeated

First, solve the problem. Then, write the code.

β€” John Johnson

0
3
0
repeated

Funny FPU trick I discovered yesterday to detect arm64 or x86_64 architecture at runtime

5
7
0
repeated

There was recently an article about using salvaged Sun Ray thin clients with a modern server. @bcantrill's response to that article on Hacker News mentioned his story about using DTrace to debug a performance problem on a Sun Ray server. He linked to a paper he wrote for Usenix, but I prefer his extended telling in this 2007 talk: https://www.youtube.com/watch?v=TgmA48fILq8&t=35m6s

1
5
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡ΊπŸ‡ΊπŸ‡¦

If you like that kind of thing, my presentation "Save the world, write more efficient code" from @joyofcoding is online now! https://youtu.be/XntLynSlYjI?t=203

1
6
0
repeated

a blog post by my friend eevee which is, y’know, preaching to the choir about exactly what you think, but. yeah. https://eev.ee/blog/2025/07/03/the-rise-of-whatever/

7
11
0
[RSS] CVE-2025-53367: An exploitable out-of-bounds write in DjVuLibre

https://github.blog/security/vulnerability-research/cve-2025-53367-an-exploitable-out-of-bounds-write-in-djvulibre/

CVE-2025-53367
0
1
1
[RSS] Kernel Exploitation Techniques: Turning The (Page) Tables

https://sam4k.com/page-table-kernel-exploitation/
0
3
5
Show older