Favourite #34C4 talk so far:
"Humans as software extensions
Will You Be My Plugin?"
by Sebastian Schmieg (@s_schmieg)
for it provides concrete, joyful paths of action to sabotage algorithmic governance by subverting the free labor it is based on...
https://media.ccc.de/v/34c3-9077-humans_as_software_extensions
<3
Switching to my other computer until this security fiasco is fixed. Bonus: it boots in less than a second. https://mastodon.social/media/K3kHxSyMdbA0vyOZniI
the safest way to use computers remains abstinence
trans women, motherhood, positive Afficher plus
ah yes, the two genders
@multijanet lots of other people discovering The Adventure Zone was one of the more benignly weird parts of 2017
2018 resolution: run simpler code in simpler environments.
@qrs Yes, absolutely (and the hypervisor and other guests are vulnerable to meltdown attacks from the unikernel, for that matter).
OH NO! CARMEN SANDIEGO HAS STOLEN your motivation!
@Angle I don't think you strictly need JS for mastodon in the browser, even. If you're willing to hit a button and wait for a remote page load for each action (including placing sigils and boosting), you could have a very retro web-1.0 browser-based Masto.
@gentauro @Kensan In another significant way they are not affected - since there is no divide between userspace memory and kernel memory, the mitigation which causes the performance hit (evicting all the pages on context switch) is not relevant. So the flaw is absolutely relevant in the context of the hypervisor hosting the unikernel, but not within the unikernel itself (as it would be for a traditional guest VM).
hello fellow human developers i heard the coolest place for us hackers to hang out is the colossal pillar of kernel patches lets go do not bring weapons
The voc-team of #34c3 wants to invite you to media.ccc.de and stay away from youtube google tracking :) https://twitter.com/c3voc/status/948224480182259712
Lots of speculations & discussions about a currently embargoed high-impact CPU security issue:
http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
Looks like speculative execution on Intel CPUs is at the core of the issue. Maybe somebody was successful with the issue described in the following blog post:
https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/
Proposal for standard pattern for n-level-deep React references:
0️⃣ `ref`
1️⃣ `innerRef`
2️⃣ `2ref2furious`
3️⃣ `tokyoRef`
My temperature cross stitch is done
"You've been chosen," the spirit said.
"What?"
"Save the world, make it kinder, cleaner, safer."
"Me?"
"Yes."
"Alone?"
"We chose everyone."
#MicroFiction #tootfic #smallstories
If you’re using the auto-fill functionality of a password manager it’s time to turn it off
https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research