Seasonal Spells for #ToddlerDnD
Toddler's Vicious Snot: This spell initially impacts the member of the party with the lowest HP. It lasts for 2 days. After that it affects all other members of the party, is immune to Healing, and you need a 20+ Con saving throw to recover from it.
Fall Back: This spell interrupts the target's Long Rest one hour too soon. Every time. For about two weeks.
Toddler's Disappearing Accessories: This spell affects hats, gloves, scarves, and boots.
The thing where companies make websites for their own executives, who never visit them, instead of their customers, who are forced to.
This makes me want to scream and pull out my hair.
"Reduce your vocabulary by 10-20% to prove you're a human."
The Apple Security Research blog now has an RSS feed, though it’s not properly advertised.
A vulnerability in the Common Log File System (CLFS) driver allows a local user to gain elevated privileges on Windows 11 https://ssd-disclosure.com/ssd-advisory-common-log-file-system-clfs-driver-pe/
Has anyone attempted to calculate the overall environmental / energy consumption of Electron, vs if the most popular applications using it were rewritten in a more efficient native framework?
It has now been twelve years since the paper "The most dangerous code in the world: validating SSL certificates in non-browser software" was published.
My blog post about it from back then: https://daniel.haxx.se/blog/2012/10/25/libcurl-claimed-to-be-dangerous/
It'd be interesting to know how much HTTPS clients are still skipping cert verification in the wild. I bet it is still widespread.
"Inside the U.S. Government-Bought Tool That Can Track Phones at Abortion Clinics"
An excellent @404mediaco investigation into "Locate X", a tracking tool that uses ad-tracking tech -- specifically, "mobile advertising identifiers" -- to follow people around
https://www.404media.co/email/f4992514-a605-4579-9a75-3d0707758e03/
Today I learned that GNU tar does network connections if you say "foo:bar", it tries to resolve "foo". FFS, wasn't the Unix philosophy to do one thing and do it well? Luckily there's a "--force-local" option to GNU tar to avoid it doing remote connections.
Sorry if you're in trouble now, either reviewing your tar calls in your application and whether they can take user input as filename -- or if this was part of your exfiltration or attack on a system.
VR News To Your Inbox Every Thursday 📰 EC 44 out now ‼️
@reodus_ gives you a virtual memory refresher
SELinux bypasses from @klecko0
@zeroclicksh VirtualBox Escape write-up
A binder bug analysis from @maherazz2
+ jobs and more 👇
Glad this is finally live: https://security.apple.com/documentation/private-cloud-compute
Getting started with the Virtual Research Environment: https://security.apple.com/documentation/private-cloud-compute/virtualresearchenvironment
"The PCC Virtual Research Environment (VRE) requires a Mac with Apple silicon with at least 16GB of unified memory and the latest macOS 15.1 Developer Preview. For optimal VRE performance, we recommend using a Mac with at least 24GB of unified memory.”
Y’all know that CNN has a text-only web interface, right?
If you want to experience how GODDAMN FAST the web can be without the tens of megabytes of adware tracking cruft and hundreds of npm dependencies, try this out:
That brings Day 3 of #Pwn2Own Ireland to a close. We awarded $118,750 today, bringing the total to $993,625. With four more attempts tomorrow, $1 million is right there for the taking. Viettel Cyber Security (@vcslab) maintains their Master of Pwn lead and looks unstoppable.