🌙❄️🌨️ yomimono 🌨️❄️🌙 utilise witches.town. Vous pouvez læ suivre et interagir si vous possédez un compte quelque part dans le "fediverse".

🌙❄️🌨️ yomimono 🌨️❄️🌙 @yomimono@witches.town

Favourite #34C4 talk so far:

"Humans as software extensions
Will You Be My Plugin?"

by Sebastian Schmieg (@s_schmieg)

for it provides concrete, joyful paths of action to sabotage algorithmic governance by subverting the free labor it is based on...

media.ccc.de/v/34c3-9077-human

<3

Switching to my other computer until this security fiasco is fixed. Bonus: it boots in less than a second. mastodon.social/media/K3kHxSyM

the safest way to use computers remains abstinence

trans women, motherhood, positive Afficher plus

@multijanet lots of other people discovering The Adventure Zone was one of the more benignly weird parts of 2017

2018 resolution: run simpler code in simpler environments.

@qrs Yes, absolutely (and the hypervisor and other guests are vulnerable to meltdown attacks from the unikernel, for that matter).

@Kensan @gentauro Ah, sorry for the noise! I have the Specter paper open in another tab, I'll read it before wading in again :)

OH NO! CARMEN SANDIEGO HAS STOLEN your motivation!

@Angle I don't think you strictly need JS for mastodon in the browser, even. If you're willing to hit a button and wait for a remote page load for each action (including placing sigils and boosting), you could have a very retro web-1.0 browser-based Masto.

@gentauro @Kensan In another significant way they are not affected - since there is no divide between userspace memory and kernel memory, the mitigation which causes the performance hit (evicting all the pages on context switch) is not relevant. So the flaw is absolutely relevant in the context of the hypervisor hosting the unikernel, but not within the unikernel itself (as it would be for a traditional guest VM).

hello fellow human developers i heard the coolest place for us hackers to hang out is the colossal pillar of kernel patches lets go do not bring weapons

The voc-team of #34c3 wants to invite you to media.ccc.de and stay away from youtube google tracking :) twitter.com/c3voc/status/94822

Lots of speculations & discussions about a currently embargoed high-impact CPU security issue:

pythonsweetness.tumblr.com/pos

Looks like speculative execution on Intel CPUs is at the core of the issue. Maybe somebody was successful with the issue described in the following blog post:
cyber.wtf/2017/07/28/negative-

Proposal for standard pattern for n-level-deep React references:

0️⃣ `ref`
1️⃣ `innerRef`
2️⃣ `2ref2furious`
3️⃣ `tokyoRef`

"You've been chosen," the spirit said.
"What?"
"Save the world, make it kinder, cleaner, safer."
"Me?"
"Yes."
"Alone?"
"We chose everyone."
#MicroFiction #tootfic #smallstories