Posts
2582
Following
668
Followers
1496
"I'm interested in all kinds of astronomy."
repeated

“Rowhammer Attacks on DDR5 ::: PTE Exploit Demo” https://www.youtube.com/watch?v=1emxVQ6__qg

0
4
0
[RSS] R.E.L.I.V.E. -- open-source re-implementation of Oddworld: Abe's Exoddus and Oddworld: Abe's Oddysee

https://aliveteam.github.io/
1
0
2
repeated

I'm only now figuring out that today's npm attack is distinct from yesterday's npm attack.

1
8
0
Edited 28 days ago
Checking on the website of our local #library and found that there is a dedicated status for orders where "all instances of the document *disappeared* and the librarian sees no good chance that they will be found in the foreseeable future".

I mean, you had one job!

Edit: can't wait for my bank to introduce the "sorry bro, we blew that money on coke" status :D
0
0
1
One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens

https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/

"I found the most impactful Entra ID vulnerability that I will probably ever find. This vulnerability could have allowed me to compromise every Entra ID tenant in the world"
0
4
4
repeated

Who could have figured out that automatically downloading half the internet and ten thousand always-changing dependencies every time you build could actually be a weakness?

9
17
0
repeated

it's missing 🔜 eth0 🎃

Took me way too long due to scope creep, but: The Hacker Webring is now up! boost_ok

Members vote for other users. Given enough users, the whole system should work by itself, without administrative intervention.

It’s still somewhat rough around the edges, but functional!

(ctx: https://donotsta.re/notice/Ay1hgCk7m1VgAkUmIq )

1
8
0
repeated

DOMPurify 3.2.7 has been released today, adding several fixes and improvements.

https://github.com/cure53/DOMPurify/releases/tag/3.2.7

Thanks to all folks who contributed 💕

0
3
0
repeated
Edited 28 days ago

added a cheat sheet to the official Git website

(with a lot of help from other folks who work on the website)

https://git-scm.com/cheat-sheet

6
17
0
repeated
repeated
Edited 28 days ago

Drew DeVault writes:

“Perhaps Google and Mozilla, leaders in JavaScript standards and implementations, will start developing a real standard library for JavaScript, which makes micro-dependencies like left-pad a thing of the past.”

There is an interesting logic flaw here. There is in fact String.prototype.padStart built into JavaScript, it has been available for at least eight years. How often did you see that used in production code? Me, having reviewed lots of codebases over the past years – almost never. Meanwhile the cumulative downloads for various string padding libraries on NPM still go into millions per week. It’s not even that many software projects directly depending on them, but way too many projects having complicated dependencies that in some corner of their wide dependency tree aren’t too up to date with these “newfangled” language features.

And if something else is an indicator: I still regularly see jQuery being used in new projects, decades after it became obsolete thanks to browsers improving. No amount of pointing out how harmful it is to sane development patterns helped here.

So I’m not sure that I can see Drew DeVault’s proposed solution to the dependency hell succeeding even if we could get the industry behind it. The inertia behind JavaScript is enormous, and in many areas the usage barely moved beyond JavaScript 1.5. Yet most projects today use a whole array of linters and build tools to aid development, and these are really complicated beasts. Maybe it’s possible to shrink their dependency trees a bit but the complexity isn’t going away.

Maybe the real question is: why does my build process have the potential to compromise my system unless I do some crazy hacks that no sane person would normally bother with? The build result will typically run in some kind of sandbox with very limited damage potential, why doesn’t the build process?

0
2
0
repeated

Open Source Security mailing list

CVE-2025-6965: SQLite: Integer truncation in findOrCreateAggInfoColumn https://www.openwall.com/lists/oss-security/2025/09/06/1
CVE-2025-7709: SQLite: Integer Overflow in FTS5 Extension https://www.openwall.com/lists/oss-security/2025/09/06/2

0
3
0
repeated

Germany's position has been reverted to UNDECIDED.

Despite expressing concerns about breaking end-to-end encryption, Germany refrained from taking a definitive stance on the Chat Control proposal during the September 12th LEWP meeting. A willingness to negotiate and compromise remains.

This is an unfortunate as Germany is crucial to defeating Chat Control.

Please make your voices heard! https://fightchatcontrol.eu/

Source: https://netzpolitik.org/2025/chatkontrolle-noch-haelt-sich-widerstand/

11
22
0
repeated

This is a Dystopian timeline: My wife was let go after 25 years working for the same bank this morning. In an apparent oops, the bank's IT department hard wiped ALL her IOS devices remotely, while she was on the road driving, relying on the GPS function.

The screw you cherry on top? Our apartment building in its infinite wisdom a couple years back switched all building locks to the Latch app.

So she was LOCKED OUT OF OUR HOUSE.

Oh, and the Latch maintained intercom at our front door is out of order.

Thanks for that. Sheesh.

19
21
0
[RSS] 2025 Hackaday Component Abuse Challenge: Let the Games Begin!

https://hackaday.com/2025/09/16/2025-hackaday-component-abuse-challenge-let-the-games-begin/
0
0
1
@lcamtuf mercury arc rectifiers +1
0
0
0
[RSS] Translating the STATUS_STACK_BUFFER_OVERRUN status code into customer-ready text

https://devblogs.microsoft.com/oldnewthing/20250916-00/?p=111602

Nothing to see here, move along!
0
0
1
[RSS] Translating the STATUS_STACK_BUFFER_OVERRUN status code into customer-ready text

https://devblogs.microsoft.com/oldnewthing/20250916-00/?p=111602

"Nothing to see here!"
0
0
2
Show older