Posts
2502
Following
656
Followers
1476
"I'm interested in all kinds of astronomy."
repeated
repeated

27 Behind the Scenes Polaroid Snapshots From the Making of the 1995 Cult Classic “Hackers”
https://www.vintag.es/2025/07/hackers-polaroids.html

1
3
0
vibe physics

https://www.youtube.com/watch?v=TMoz3gSXBcY

"you are specifically and intentionally refusing to learn anything, which just seems like a problem." <- This!
0
0
0
repeated

Vibecoding can never reach the level of coolness Borland Delphi had

https://oldbytes.space/@gloriouscow/114962468342656021

1
2
0
repeated

I love this kind of , especially when they are features 🤣

: Linear mapping is mapped at the same static virtual address

https://project-zero.issues.chromium.org/issues/434208461

0
2
0
Does anyone have experience with driving a stepper motor found in simple electronic clocks in both directions?

(img source: https://www.explainthatstuff.com/quartzclockwatch.html )

#electronics
3
2
2
repeated

🌪️ TyphoonCon 2026 is set for May 25-29 in Seoul!

Our Call for Papers and Call for Training are now open. Interested in joining our 2026 lineup? Get all the details here:
Call for training: https://typhooncon.com/call-for-training-2026/
Call for papers: https://typhooncon.com/call-for-papers-2026

0
3
0
repeated
repeated
My mom basically told me the she would like to be a senior UAT tester - as in telling clueless kids how old people can't figure out their UI.

We should definitely have that role!
0
1
4
repeated

A fool with a tool is a more dangerous fool.

— u

0
2
0
repeated

David Chisnall (*Now with 50% more sarcasm!*)

The Google Project Zero post from a while ago that showed memory safety bugs were more common in new code continues to annoy me because it’s such a clear example of computer scientists doing social science without understanding how to do it.

The root problem is that they are no counting the number of bugs. There is no ground truth that they are able to use. They are counting the number of bugs found. And how are bugs found? When you have some existing technique (static analysis, fuzzing, code review, whatever) that finds that kind of bug.

So their conclusion is ‘bugs that existing techniques are able to find are less likely to appear in code that has already been subject to those techniques’. To which the correct response is ‘well, duh’.

The original Coverity paper, which introduced a large range of brand new static analysis techniques, found a load of bugs in old code. When we started running existing C and C++ code on CHERI, we saw very little correlation between the bugs that we found and the age of the codebase (we found quite a few bugs that were 20+ years old).

If you remove the sample bias, the results are far less clear cut and there are a load of confounding factors. If a memory-safety bug causes random crashing in one in a million runs of a userspace program based on some non-deterministic factor, it’s unlikely that anyone will debug it. If a sequence of actions reliably crashes a kernel, it will probably be fixed. If an attacker finds it and is actively exploiting it, it will almost certainly be fixed. The symptoms and reproducibility of the bug have a huge impact on whether it will be fixed.

3
8
0
Coolest AI project I've seen so far:

https://www.youtube.com/watch?v=IAuapNwJ2vQ

Praise be the Omnissiah!

#wh40k
1
1
1
repeated
#music
Show content
0
0
0
repeated
#Linux eBPF vulnerabilities incoming (unprivileged eBPF required) + disclosure troubles:

https://www.openwall.com/lists/oss-security/2025/08/03/1
0
3
1
repeated

a 2661 byte program I wrote just won the "Sur Prize" at the International Obfuscated C Code Competition. You can probably guess what it is once I mention that @foone might enjoy it

https://www.youtube.com/watch?v=d2ulsnSTbUQ

4
6
1
[RSS] Exploring possible solutions to the inconsistency in how Windows searches case-insensitively for named resources

https://devblogs.microsoft.com/oldnewthing/20250723-00/?p=111403

Some fun anti-reverse possibilities here :)
0
0
2
Show older