i love the culture of alt-texting everything you send here because if i have terrible GSM, having the alt text often means i don’t have to wait for the image to load
20 posts total
i love the culture of alt-texting everything you send here because if i have terrible GSM, having the alt text often means i don’t have to wait for the image to load at which point in the five stages of grief am I when hexpatching binaries is easier and more compelling than fucking around with the build system? your system doesn’t provide __iso_c23_whatever? just hexedit the import table, directly in the final binary still missing functions? just replace them with Second MR with our work on the IPv6 stack for #SerenityOS just landed! This means that on the master branch, you can already IPv6 ping a SerenityOS host, and it will handle a neighbor solicitation (equivalent to ARP) and actual ICMPv6 Echo Request packets :blobcat3c: Next up: refactoring IPv4 sockets to make them generic by @filmroellchen, and then we can add some more glue code for handling TCP/UDP. Really really excited for this :ablobcatbongo: after many weeks of implementing drivers, hunting bugs and debugging hangs:
finally, #SerenityOS on a Chromebook FOSS maintainers don’t owe you anything, even thanklessly maintaining the software forever. Furthermore: It’s okay for software to not be updated with new features, as long as it doesn’t have known security holes. It’s not a bad thing to have something that doesn’t change, even if modern software developers would like you to think that you NEED a constant stream of “feature updates” and “redesigns”. the only takeaway anyone should have from the Crowdstrike incident today is that running a poorly-managed rootkit on all of your machines for “vulnerability management” maaaaaybe isn’t the brightest idea. reading through some printer-adjacent microperl scripts and my brain started autocompleting PSA: Backdoor in latest version of xz: https://openwall.com/lists/oss-security/2024/03/29/4 Downgrade if you’re running one of the latest xz versions, it has been compromised. If you’re using mainstream distros, you may be fine (as they lag with versions a bit behind master). If you’re running Alpine or any other non-gnu or non-systemd distro, you should be fine too (the exploit checks for GNU, and also probably won’t work with distro-unpatched sshd) @domi it looks like Arch narrowly escaped being exploitable: https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/issues/2
there’s something beautifully chaotic about decrypting the iPod firmware by sending it to the iPod, 0x30 bytes at a time, really slowly Witchcraft: I made a Minecraft server in Bash and I survived it blogpost(this is a very technical post, going really in-depth. if that’s not your jam, check out the source code) |