Posts
3911
Following
728
Followers
1600
"I'm interested in all kinds of astronomy."
repeated
Edited 1 month ago

Hello Mastodon!

Since this is my first post, I thought I'd share some incredibly niche C++ trivia / pedantry:

For an enum whose enumerators all have the value 0, C++ asks us to imagine a hypothetical integer type with minimal width that can represent 0 (https://eel.is/c++draft/dcl.enum#8.sentence-2). This means we must consider the case where the width is 0. For an unsigned integer type, this gives a range of representable values of [0, 0], and that's the type we pick. But before we can determine that that's minimal, we must also consider a signed integer type with a width of 0, for which we get a range of representable values of [-½, -½]! (https://eel.is/c++draft/basic.fundamental#1.sentence-5) Conveniently that range does not include 0, so we discover that we must use an unsigned integer type to determine the range of values of the enumeration. (We also rule out an unsigned integer type of negative width as that would have a range of values 0 to -½ (inclusive) or smaller, which I think we can reasonably conclude is an empty range despite the parenthetical.)

In any case: if you ever wondered whether a zero-bit signed integer type in C++ can represent only the value 0 or only the value -1, now you know: no, it can represent only the value -½. Truly a marvelous compromise.

Follow me for more brilliant insights like this one :)

1
9
0
repeated

TrendAI Zero Day Initiative

Happy Patch Tuesday! The latest security patches from and are here. Thankfully, no bugs are listed as being under attack, but there's still some interesting ones in the mix. Join @dustin_childs as he breaks down the March release. https://www.zerodayinitiative.com/blog/2026/3/10/the-march-2026-security-update-review

0
2
0
repeated

TrendAI Zero Day Initiative

And don't miss our bug of the month! Each patch Tuesday we'll be selecting our very favorite patch to highlight. This month, it CVE-2026-26144 - a Critical-rated info disclosure in Excel that uses the Copilot Agent to exfiltrate data. Neat! https://youtube.com/shorts/r4EjP3JxYRk?feature=share

0
2
0
repeated

TrendAI Zero Day Initiative

Announcing Berlin 2026! We've got 10 categories for targets, including an expanded target list. We have 4 AI categories - including coding agents (looking at you ). More than $1,000,000 in cash & prizes available. Read the details at https://www.zerodayinitiative.com/blog/2026/3/11/announcing-pwn2own-berlin-for-2026

0
4
0
A number of obscenities without extension in your /tmp is a sure sign you should've gone to bed earlier.
0
2
5
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

Tempted to write a post that software development lost the plot a long time ago, and that the recent LLM developments are merely the icing on that cake. Software these days is not the painstaking work by people like @bagder or @hyc or @vitaut who write the best code they possibly can. Over the past decade, "the software world" has been developing in a very different way than that.

3
4
1
Multiple vulnerabilities in AppArmor

https://www.openwall.com/lists/oss-security/2026/03/12/7

Qualys is at it again!
1
15
13
Basshunter totally predicted LLM waifus

https://www.youtube.com/watch?v=1XK5-n4rR7Q
3
2
1
Inside the Russian explosives plot that sent incendiary parcels to the UK

https://www.bbc.com/news/articles/cpd83zwqlvno

Meanwhile, I can't get my handful of battery clips and LED's because DHL customs agents are too dumb to read :P
0
0
2
repeated

Metasploit Pro 5.0 is out now with a fresh UI and tons of improvements! Check out our announcement for details https://www.rapid7.com/blog/post/pt-announcing-metasploit-pro-5-penetration-testing-evolving/

0
3
0
repeated
repeated
repeated

I suspect most people outside of the UK won't have heard about the post office scandal, but it seems highly relevant to learn about now (given *waves* this):

For over 15 years, the software post offices in the UK had to use contained severe bugs, particular in accounting, that everyone at Fujitsu/horizon and the post blissfully ignored. Over 900 (!!!) postmasters were sentenced for alleged theft and fraud, some went to jail, some committed suicide. All because the software was shit and everyone who could do something about it didn't care and swept it under the rug.

Everything, including how it was uncovered, about this seems bizarre and Kafkaesque, but we better prepare for it to happen more often.

https://en.wikipedia.org/wiki/British_Post_Office_scandal

https://types.pl/@pigworker/116211919028571818

7
11
0
Be careful with that thing, it’s a confidential coffee maker

https://devblogs.microsoft.com/oldnewthing/20220426-00/?p=106528

#IBM #dresscode
0
0
1
repeated

CVE-2026-3784 beat a new record. This flaw existed in curl source code for 24.97 years before it was discovered.

Illustrated in the slightly hard-to-read graph below. The average age of a curl vulnerability when reported is eight years.

https://curl.se/docs/CVE-2026-3784.html

3
6
0
repeated

David Chisnall (*Now with 50% more sarcasm!*)

Me? Trolling the other microcontroller vendors? Surely not! Maybe if they had bothered to do something about the most common source of vulnerabilities at some point in the last few decades, the could have been on the other side of the sign...

0
2
0
repeated

Tony “Abolish ICE” Arcieri🌹🦀

RIP Tony Hoare. His obituaries are talking about quicksort, but I think his most notable accomplishments are Communicating Sequential Processes, the Occam programming language, and the Transputer, an early example of a parallel processor

https://blog.computationalcomplexity.org/2026/03/tony-hoare-1934-2026.html?m=1

0
4
0
Show older