Posts
3146
Following
707
Followers
1555
"I'm interested in all kinds of astronomy."
repeated

Project Zero Bot

New Project Zero issue:

Samsung: libimagecodec.quram.so buffer overflow in WINKJ_YcbcrWriteOutput1to1_YUV422_H1V2_toRGBA8888 during JPEG decoding

https://project-zero.issues.chromium.org/issues/450884207

CVE-2025-58480
0
1
1
repeated

California residents now have a real tool against the data broker industry.

The state has launched DROP, a single portal to demand deletion of your personal data from 500+ registered data brokers in one request, for free.

To start: https://consumer.drop.privacy.ca.gov/


1/2

2
13
0
@addison It's obvious you have a lot to say :) I think the presentation was also very good (using sokoban as a model is spot on!), it's just that internalizing new perspectives takes time, and I think we were better off getting multiple highlights of ideas instead of working through any one of them during the time given - we have the recording, slides, etc. to dig deeper as we like.
0
0
0
@addison Thanks for the great talk, definitely the most thought provoking one for me from this CCC! Have to watch it like 3 more times to get all the details though 😅
1
0
0
repeated

“Move fast and break kings.” I love @pluralistic and his rallying cry: https://pluralistic.net/2026/01/01/39c3/

0
6
0
repeated

Bonne année 2026 à tout le monde !

N'oubliez pas que l'appel à soumission est en ligne et que la date limite pour envoyer vos articles est le 18 janvier.

https://www.sstic.org/2026/cfp/

1
4
0
@hanno As another datapoint, MOTW bypasses worth CVE's at MS (e.g. CVE-2025-24061). It's not the same ofc. as an automatic control is bypassed in such cases, but at the same time users could choose to bypass the control after a warning (which the CVE also bypasses).
0
0
1
@murb @bert_hubert @signalapp Great, that can be a checkbox then! I'm also sure that support/M.W. didn't have to deal with as many angry Europeans if the us-east-1 only affected users over the pond :)
0
0
1
@filippo @freddy @hanno I'll save this thread under "even your vendor doesn't approve CVSS" for future reference
0
0
6
@embedding_shapes @rickoooooo nix-shell works though, leaving you with tasks that are too complex for that but don't justify a container. Now I'm sure that can be a deal-breaker too, but it's worth keeping in mind that there is room for ad-hoc tasks.
1
0
1
@rislandr I had an account, forgot the pw, couldn't reregister the last time I tried...
1
0
1
@hanno I'm bringing this up exactly because when CVSS will be assigned it will either show 0.0 or some really weird non-sense. The former would be likely a better, but still misleading scenario,. My bet is on MITRE publishing some non-sense though.
1
0
1
@hanno Not saying it's not a vulnerability but I think you won't be able to score this with CVSS that would make CVE registration weird.
1
0
1
repeated

Now those gpg.fail people made me find similar vulns elsewhere (console control character injection). By "elsewhere" I mean... my own code.
Opinions wanted: should "input can inject console output with ansi and control chars" always be considered a vuln/CVE?
(I'll fix it in any case, I'm just wondering if I should do all the "security release/advisory/request CVE/..." stuff.)

8
4
0
@bert_hubert @signalapp This is exactly why I think sharing some actual unmet requirements would be a good idea.

(FTR I was told they also used GCP as a fallback which apparently didn't work too well)
0
0
4
Edited 12 days ago
Thinking back to last year I remembered the us-east-1 outage, how it affected Signal and how some of the users freaked out that they have to rely on US hyperscalers.

Wouldn't it be useful if @signalapp (and maybe similar providers) published their infra requirements with little crosses and ticks, so alternative providers could aim for "good enough for Signal" service levels?

Related articles by @bert_hubert :

https://berthub.eu/articles/posts/the-european-cloud-ladder/
6
51
62
[RSS] Reverse Engineering the Miele Diagnostic Interface

https://medusalix.github.io/posts/miele-interface/
0
2
1
[RSS] Understanding and mitigating a stack overflow in [Raymond Chen's custom] task sequencer

https://devblogs.microsoft.com/oldnewthing/20251231-00/?p=111950

C++ coroutine debugging
0
0
0
Show older