Posts
3540
Following
721
Followers
1584
"I'm interested in all kinds of astronomy."
I have a successful build and I only had to patch Meson twice!
0
0
1
repeated

@opensource shout-out to @kirschner , for his post about the 500 million euro that the German government spends each year (!) on Microsoft licensing, while asking how much we could have procured and developed with a fraction of that money. During @nlnet 's presentation.

3
6
1
repeated

@soatok

"why are compilers, man?"

So toolchain engineers have a safe space to recover after working on linkers.

( @resistor )

0
2
0
@chrisvest @bagder "there is no bug-bounty no money for vulnerability reports" comma/colon missing?
1
0
3
repeated
repeated

It often feels like the world of tech is nothing but bad actors and bad news these days, it is always refreshing to read about something that is a fundamentally amazing example of technology and human ingenuity. This article about the process and people that sit behind the undersea cables that connect our world (and how they are productively recovered) is an example of that type of story. You should check it out!

https://www.wired.com/story/say-goodbye-to-the-undersea-cable-that-made-the-global-internet-possible/

0
3
0
repeated

Usenix WOOT Conference on Offensive Technologies verified

The Cycle 2 deadline for the USENIX WOOT Conference is in just one week (March 3, 2026).

Full details are available in the Call for Papers:
https://www.usenix.org/conference/woot26/call-for-papers

0
2
0
repeated

IBM crashes because we’re gonna YOLO a replacement for banking and credit-card back-ends, replacing billions of lines of COBOL with vibe code. Uh…

https://www.techbuzz.ai/articles/ibm-crashes-11-as-anthropic-threatens-cobol-empire

10
8
0
repeated
repeated

@da_667 malware born after 1993 can't virus. All they know is be on their phones, run mirai, steal crypto, eat hot chip and lie

1
5
0
After 6 years of waiting we are promised to finally be able to reliably open terminals in Windows VMs:

https://github.com/microsoft/terminal/issues/4750

#progress
0
0
2
repeated

It's a blog post I should have published months ago, but here we finally are.

"CVE-2025-59201 - Network Connection Status Indicator (NCSI) EoP"

Credit goes to t0zhang (on X) for the discovery.

👉 https://itm4n.github.io/cve-2025-59201-ncsi-eop/

I'd like to write more of those but it's so time-consuming. 😔

2
4
0
@raptor No I haven't thanks for the heads up! I think we'll need some coordination between our projects...
0
0
0
repeated

A Meta employee who works on AI safety let an AI agent named OpenClaw loose on her inbox and it deleted all her email. (This tracks; companies like Meta actually don’t care about AI safety and hire accordingly.) https://techcrunch.com/2026/02/23/a-meta-ai-security-researcher-said-an-openclaw-agent-ran-amok-on-her-inbox/

0
3
0
Got reminded of this epic GeoHot talk:

USENIX Enigma 2016 - Timeless Debugging

https://www.youtube.com/watch?v=eGl6kpSajag
0
0
1
repeated
Edited 14 days ago

New blog post 😊

If you replace all the innerHTML with setHTML, you will be free from XSS and other injection attacks. Goodbye innerHTML, Hello setHTML

https://hacks.mozilla.org/2026/02/goodbye-innerhtml-hello-sethtml-stronger-xss-protection-in-firefox-148/

(Kudos to our folks for specifying, building and shipping!)

4
5
0
repeated

Telnetd Vulnerability Report https://www.openwall.com/lists/oss-security/2026/02/24/2
Rediscoveries in InetUtils beyond last month's froot. Incomplete fix of CVE-1999-0073, where the CVE description's example was LD_LIBRARY_PATH, but new LPE PoCs use CREDENTIALS_DIRECTORY and GCONV_PATH. Avoided in Linux NetKit?

0
4
0
repeated

We're hiring! 🚀

We have an open position for the Senior Deception Engineer role at @watchtowrcyber

Looking for someone with deep and deception experience to join my team!

https://careers.watchtowr.com/jobs/7012653-senior-deception-engineer

0
2
0
Show older