Posts
3037
Following
703
Followers
1550
"I'm interested in all kinds of astronomy."
repeated

There's a researcher, Jiang Yuancheng, who's doing a great work finding CPython crashes and memory leaks: https://github.com/python/cpython/issues?q=is%3Aissue%20author%3AYuanchengJiang

They've come up with a very clever idea for a new way of fuzzing, made a fine tool out of it, and are reaping great results.

Fuzzing can be a diminishing returns endeavor: you only have so many bugs to find. Their approach has shown itself to cover different areas and kinds of issues well, as shown by their track record.

3
3
0
repeated

now at @link@js.meowingwo.men

5
21
1
repeated
repeated

CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center https://cymulate.com/blog/cve-2025-64669-windows-admin-center/

0
3
0
repeated

Bellingcat’s Kolina Koltai uncovers the Hungarian national behind two deepfake porn websites. The key figure rakes in profits and vacations in luxury hotels in Dubai and Bali, whilst website visitors create sexually explicit images and videos.
Find out how we uncovered the administrator behind the deepfakes by reading the full investigation here: https://www.bellingcat.com/news/2025/12/15/mark-resan-reface-deepfake-porn/?utm_source=mastodon

0
6
0
repeated

For those of you who remember ScreamingGoat, they're currently looking for a new role. Ideally something in the threat Intelligence space and DC local. Y'all know how he is with emerging vulnerabilities. Let me know what you've got and I'll make sure it makes it to them.

1
7
0
repeated
Edited 16 days ago

just released liboprf-0.9.3

liboprf is a library implementing the OPRF from https://www.rfc-editor.org/rfc/rfc9497.html and in addition it also provides a threshold variant (tOPRF) and a distributed key generation (DKG) protocol for the tOPRF shared secret, as well as a key update protocol for the tOPRF shared secret. it comes with a high level python frontend that supports servers on TLS, USB and Bluetooth LE

see: https://github.com/stef/liboprf

0
1
0
repeated

We need to normalize declaring software as finished. Not everything needs continouos updates to function. In fact, a minority of software needs this. Most software works as it is written. The code does not run out of date. I want more projects that are actually just finished, without the need to be continuously mutated and complexified ad infinitum.

11
17
2
repeated
repeated

Microsoft will pay bug bounties even for 3rd party components:

https://www.theregister.com/2025/12/12/microsoft_more_bug_payouts

1
1
0
repeated

Does anyone have a copy of the following paper:

https://doi.org/10.1016/0167-4048(82)90003-7

Robert H. Courtney, Jr., "A systematic approach to data security", in Computers & Security Volume 1, Issue 2, June 1982 (pgs. 99-112)

I have tried Sci-Hub and Anna's but no luck flan_sad

(it is paywalled at https://www.sciencedirect.com/science/article/abs/pii/0167404882900037 for $30 which seems criminal)

2
1
0
repeated

The World Is Not A Desktop - Mark Weiser

https://dl.acm.org/doi/10.1145/174800.174801

0
5
0
repeated
This is beautiful. I've been looking at this for 5 hours now.
63
726
1045
repeated

absolutely losing it. My mom received a spam call that got picked up by Google call screening on her phone, and it ended up responding with one of the more unhinged Asterisk voice recordings before hanging up LMAO

2
11
1
repeated

Thorsten Leemhuis (acct. 1/4)

Analyzing CVE-2025-2296 [Un-verified bypass mechanism in direct boot mode]

https://www.kraxel.org/blog/2025/12/analyzing-cve-2025-2296/

Gerd Hoffmann aka kraxel writes: ""[…] So, if secure boot is enabled attempts to boot via 'EFI stub' will fail, the firmware rejects the binary due to the signature check failing. OVMF will fallback to the legacy 'EFI handover protocol' loader. The legacy loader does not do secure boot verification, which is the core of CVE-2025-2296. And this was essentially unfixable (in the firmware alone) because there simply is no valid secure boot signature due to the patching qemu is doing. Nevertheless there are some use cases which expect direct kernel boot with secure boot enabled to work. Catch 22. […]

Secure boot bypass sounds scary, but is it really? […] So, the actual impact is quite limited. […]""

0
3
0
I'm a huge fan of writing and trying to type on a fucking TV remote got me thinking how much touch-screen keyboards may constrain our thinking...

#ShowerThought
0
0
3
repeated
Show older