Posts
3733
Following
723
Followers
1598
"I'm interested in all kinds of astronomy."
repeated
repeated

Did anyone got that alleged Vim RCE PoC working? MacOS doesn't seem vulnerable, Ubuntu 22/24, Debian 13, the same... Advisory says <9.2.0272 but doesn't seem like it?

Smells like AI slop hype? Yeah, kinda because most distros don't seem to ship vim with +tabpanel feature. HYPEEEEEEEEEEEEEEEEE

1
1
0
@avuko Nah, "with a little bit of extra code, my lib could also do X" is definitely not 0-sum logic. It is true though that people find complexity compelling ("complexity sells better").

Also note that gaining understanding of lib capabilities/limitations/general design *is* valuable (but also can be a prohibiting barrier of entry for small projects).

@david_chisnall
0
0
1
@avuko @david_chisnall IMO part of the problem is that deep in their souls every dev wants to build frameworks that can do many things. You basically miss Quick Start guides that show you how to do $simple_thing. No one wrote that guide because they see value in $complex_things[] their project can do and probably even see $simple_thing distracting from the Real Purpose of the project.

Source: I also tend to write frameworks for everything.
1
0
2
repeated

Instead of using an LLM to write me some boilerplate and basic functionality, frontend etc, why isn’t there a library where I can find all of these?

You know, something structured and shared, again, like a library, for specific purposes, and specific languages, with educational hints from development pros on the best way to do things and maybe some constructive feedback and improvements from other people?

And why were we left to deal with stackexchange instead?

Could this have been, dare I say it: gatekeeping?

1
2
0
repeated
Underrated post
4
8
20
repeated

If someone comes to me today preaching about “post-quantum” security issues, I’ll remind them of the current state of security: the npm ecosystem gets abused daily, CI pipelines run left and right with full access to cloud services, so-called security devices like F5 and Ivanti are exposed (and compromised) to the internet, mailboxes get compromised just to change an IBAN in a PDF, and a simple phone call is still enough to get someone to hand over an MFA code.

But yes, by all means, let’s focus on post-quantum threats while handing AI tools SSH access like it’s a feature, not a confession.

2
9
0
repeated
I skim through a lot of articles daily and in this age of slop my signal/noise decisions are heavily influenced by whether the piece is being hosted on a custom domain (showing that the author cares enough to maintain one).
0
1
6
[RSS] Reverse Engineering Crazy Taxi, Part 2

https://wretched.computer/post/crazytaxi2
0
0
0
repeated

Tom Ptacek posted a great writeup titled "Vulnerability Research Is Cooked", covering the state of vulndev and its rapidly accelerating future:
https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/

2
4
0
"As of March 2026, Alphabet’s market cap is ~$2T while Lockheed Martin’s is ~$120B."

https://martinvol.pe/blog/2026/03/30/how-the-ai-bubble-bursts/
0
0
0
@wolf480pl Gov data can easily come from fake darkweb listings (sold as "threat intelligence"), aka. beware of circular references
0
0
1
@wolf480pl This report looks pure AI slop, but @thezdi does have a matching candidate listed (meaning ZDI accepted the submission as a valid vuln):

https://www.zerodayinitiative.com/advisories/upcoming/

Since that vuln was reported just 4 days ago my educated guess is that 1) the reporter wasn't dumb to trash their ZDI bounty by posting details online 2) someone saw the candidate and generated a slop report about it without any technical ground.

Edit: the reporter also works for ZDI, so I highly doubt they started a darkweb sell...
1
0
1
repeated

Anyone knows anything more about this ?

"CVE-2026-31893 describes a serious Tunnelblick vulnerability.

This vulnerability is present in all versions of all Tunnelblick versions 3.3beta26 through 9.0beta01.

Tunnelblick 8.0.1 and 9.0beta02 contain fixes for the vulnerability.

The CVE is expected to be published and this page updated on or before 2026-03-27."

https://tunnelblick.net/CVE-2026-31893.html

1
1
0
repeated

Micropatches released for Arbitrary Registry Key Delete As Local System With Consolidator Scheduled Task (CVE-2025-59512) https://blog.0patch.com/2026/03/micropatches-released-for-arbitrary.html

1
2
0
repeated

📺 Serial Experiments Lain

🗓️ Season: S01E04
🎥 Episode: Religion
🎬 Directed by: Akihiko Nishiyama
📅 Release Date: July 27, 1998
⏯ Frame: 0191

0
1
0
repeated
Edited 2 days ago

RE: https://social.heise.de/@heiseonlineenglish/116316847500488516

“Oh, we murdered 100 kids? Oh, that's unfortunate.

We just had some stale data in our Palantir Project Maven data lake that was used by our ‘highly accelerated, software-supported targeting process’. We'll clear the cache sometimes.”

2
6
0
Show older