hey fedi does anyone know much about reverse engineering fpga bitstreams? is that something that is doable? what tools do people use for this?
looking at a xilinx chip specifically, haven't identified the specific model yet, but it's one that's at least 20 years old
Ooops, I just loaded it in IDA :P Because fuck the software licenses :PPPP
first: my newest zine, The Secret Rules of the Terminal!
This has all the gnarly details about the Unix terminal that I wish I knew when I started using it. It's weird and kind of wonderful (I talk about why you can use your mouse in the terminal!)
https://wizardzines.com/zines/terminal/
(2/16)
python, the official language of "well i could just use python"
Colossal blunder on my part this afternoon.
Pulled the drives from an areca raid array and
forgot what order they have to go back in
so now the array isn't recognized and RESCUE doesn't see it.
Has anyone documented the magic parameter sectors that describe this anywhere?
Really big scoop (I don't think @briankrebs knows how big yet) here - he's tracked down somebody who says they are Rey from Lapsus$.
I don't wanna say why yet as I don't have all the pieces of the jigsaw, but I imagine this is going to turn into a long thread over time.
https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/
well strlen() returns the amount of bytes so in this regard multibyte characters are not really an issue per see.
https://gitlab.gnome.org/GNOME/glib/-/blob/f28340ee62c655487972ad3c632d231ee098fb7f/glib/gconvert.c#L1318 defines a char array of acceptable (meaning ASCII) characters.
Then it iterates over the dynamically allocated buffer and keeps track of the amount of "unacceptable" characters.
unacceptable was a gint (https://docs.gtk.org/glib/types.html#gint) which could therefore overflow.
To me it does look like glib could use some refactoring.
https://gitlab.gnome.org/GNOME/glib/-/commit/f28340ee62c655487972ad3c632d231ee098fb7f