Posts
3178
Following
705
Followers
1561
"I'm interested in all kinds of astronomy."
Decorative Cryptography

https://www.dlp.rip/decorative-cryptography

"All encryption is end-to-end, if you’re not picky about the ends."
0
4
7
@schrotthaufen I certainly argued with very intelligent people about this...
0
0
2
@mdfranz "When API’s go away, and it’s all a federated MCP mesh." This must be one of those people who - despite working in IT - has always thought of APIs as some magical thing beyond human comprehension, but fortunately MCPs will now finally make everything clear and simple!
1
0
0
"The purpose of a system is what it does"

https://en.wikipedia.org/wiki/The_purpose_of_a_system_is_what_it_does

This is exactly what I've been trying to articulate re: cookie banners. The word of the regulation and intent is largely irrelevant to the effect it caused.
1
1
6
... the README says "the most useful feature is X". I try X, absolute garbage. I look at the code of X: the only relevant piece of data is simply not included anywhere in the computation. ffs

(no I won't open an Issue/PR, let them figure out themselves...)
0
1
1
repeated

Kagi's Small Web initiative and why we're committed to it:

0
2
0
repeated
repeated

"Die Zeit" reveals that German foreign intelligence, in a multi-year campaign, intercepted Barack Obama's phone calls while aboard Air Force One because the encryption was flawed. Angela Merkel didn't know about it.

https://www.zeit.de/politik/ausland/2026-01/bnd-barack-obama-air-force-one-angela-merkel

2
5
0
repeated
@troed I guess it's fine for ad-hoc tools, but I'm looking at code with many stars on GH rn. It works. Sometimes it freezes. Everything is redundant, identifiers don't describe actual purpose but something else, functions are prohibitively large. No one will be willing or able to maintain this shit for more than 6 months.
0
0
1
The general code quality of hacking tools has always been shit. Thanks to LLMs now it's somewhat worse.
2
2
4
repeated

This is my every-once-in-awhile post since I’m thinking about it today: if you have a lead on install media, an image of a dev/test system, etc. for the Dynix ILS (from the 1980s/90s), please reach out. No, it’s not on Internet Archive despite some things saying it is.

2
2
0
repeated
[RSS] CVE-2025-38352 (Part 3) - Uncovering Chronomaly

https://faith2dxy.xyz/2026-01-03/cve_2025_38352_analysis_part_3/
0
0
0
[RSS] RCE via ColdFusion ARchive (CAR) Deployment: One Example of an Authenticated Attack Path in CFAdmin (CVE-2025-61808)

https://www.hoyahaxa.com/2026/01/rce-via-coldfusion-archive-car.html
0
0
1
repeated

Trend in Number: Apple Kernel Space CVEs & Vulnerability Reporters
The blue line represents the number of kernel CVEs, and the green line represents the number of vulnerability reporters across the entire Apple platform. Starting in 2022, the number of vulnerability reporters has been increasing, while the number of kernel CVEs has been decreasing.

1
2
0
repeated

Do you have an idle cluster? Can you spare a couple core-years?

Help me bruteforce some test vectors for RSA key generation edge cases!

Here are the instructions, it's just a matter of running a single self-contained cross-compilable Go binary that will report the results autonomously.

https://gist.github.com/FiloSottile/19e7ceb1fdcdaa128f7d3319ad0939fa

7
11
1
repeated

A German hacker known as "Martha Root" dressed as a pink Power Ranger and deleted a white supremacist dating website live onstage

This happened during the recent CCC conference.

Martha had infiltrated the site, ran her own AI chatbot to extract as much information from users as possible, and downloaded every profile. She also uncovered the owner of the site. She has published all of the data.

https://media.ccc.de/v/39c3-the-heartbreak-machine-nazis-in-the-echo-chamber
Leak data:
https://okstupid.lol/

5
27
0
Show older