What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0
0
0

17:57: Politiet rykket ut til privat adresse etter melding om at en person skal ha knust et vindu. Politiet fikk gode beskrivelser av mistenkte fra melder og søkte i området uten funn. Da vi returnerte til gjerningsadressen for å gjøre åstedsundersøkelse, hadde mistenkte også kommet tilbake og fortsatte å utføre skadeverk. Ble pågrepet og satt i arrest. Anmeldes for forholdet. Siktede er en mann i 40 årene.
0
0
0
0
0
0
0
1
1

After reviewing FEP-5624: Per-object reply control policies and GoToSocial's interaction policy spec, I find myself leaning toward the latter for long-term considerations, though both have merit.

FEP-5624 is admirably focused and simpler to implement, which I appreciate. However, 's approach seems to offer some architectural advantages:

  1. The three-tier permission model (allow/require approval/deny) feels more flexible than binary allow/deny
  2. Separating approval objects from interactions appears more secure against forgery
  3. The explicit handling of edge cases (mentioned users, post authors) provides clearer semantics
  4. The extensible framework allows for handling diverse interaction types, not just replies

I wonder if creating an that extracts GoToSocial's interaction policy design into a standalone standard might be worthwhile. It could potentially serve as a more comprehensive foundation for access control in .

This is merely my initial impression though. I'd be curious to hear other developers' perspectives on these approaches.

4

Support for Windows 10 ends on October 14, 2025. Microsoft wants you to buy a new computer. But what if you could make your current one fast and secure again?

Check out the End of 10 initiative to learn more! If you know anyone else who might find this useful, share it with them!

endof10.org

0
13
0
1
0
0

Really excited to share this image for today. I took this image on my first ever trip to last year. We ventured to the in Northern Italy for some hiking where we were greeted with freshly snow capped mountains. It made for an incredible welcome to our trip to this area.

This image has become one of my favorites from the trip. Hopefully I will return someday.

#

An image of towering mountains from the North Italian Dolomites. The snow covered peaks surround a large cirque like a crown. Blue sky and some light greens from the forest below add color. And heavy clouds sweep into the valley from the sides of the image
0
0
0
1
1
1
1
0
0
0
0
0
0

소소하지만 내 삶의 즐거움이 되는 물건들: 메모리폼 토퍼, 와이드 샤워 헤드 그리고 좋은 비누.

이 셋은 없으면 일단 사고 본다. 비누는 한국에서 산다면 도브 센서티브가 괜찮음. 뽀득한 거 원하면 아이보리.

0

Story index:

Fantasy

SciFi

Contemp

Learn more at ChantingLureTales!

0
0
0
0
0
0
0
0

"1+1=3이라고 말만 했을 뿐인데 이렇게들 우르르 몰려와서 산수도 못하냐고 비난하시면 당황스럽네요... 의견도 말 못하나요? 님들같이 입틀어막는 사람들 있는거 생각해서라도 앞으로는 꼭 3이라고 사실대로 말하고 다닐거에요" 이런 사람들 온오프라인 안 가리고 분야별로 삼억팔천만명 있음

0
0

혹시 겹칠 수 있으니 제가 제보한 걸 밝히자면, - 회원가입할 때, 비밀번호에 <, >, ", ', _ 를 사용할 수 없는 특수문자라고 안내되어있는데 실제로 사용할 수 없는 문자가 이보다 더 많은 점 - 브라우저 창 크기를 조절하면서 상단 메뉴가 오작동할 수 있는 버그 ...입니다.

0
0

This thing works by generating fake vulnerability reports. Here are some of the qualities of the HackerOne report 3125832 sent to :
- It looks convincing at a glance, especially if you're not a subject matter expert.
- It's vague about actual repro steps. It makes it impossible for the victim project to reproduce the issue. For example, it makes up fake patches against non-existent, imaginary code.
- It refers to functions and methods that do not exist (in case someone tries to look for them). When confronted, the attacker refer to some old or new versions of components, using non-existent commit hashes.
- The report makes up some convincing functionality or names that are novel, but don't really exist.

An expert’s look at the report shows the number of discrepancies, but finding them takes time and effort. It requires attention from a subject matter expert, with limited resources.

The real exploit here is that the attacker (evilginx) exploits the fact that the victims (the orgs who paid the attacker money) don't have the capacity to perform thorough analysis and rather just pay up. TL;DR: It's cheaper to pay the bug bounty than hire an expert to perform true analysis.

Why didn't it work against the curl project? The attacker miscalculated badly. Curl project is not a company and has far greater capability in security response than your average org. Also they can smell miles away.

0
0

did you know that GDB includes a bytecode compiler? specifically, it has a private [edit: it's documented] bytecode format used between it and the GDB server, which the latter uses to implement conditional breakpoints with complex expressions and tracepoints

every time it hits a breakpoint/tracepoint it evaluates the bytecode, which has jumps and can read arbitrary target memory, and decides whether it really was hit or not

0
0

가짜뉴스와 선동과 파편화의 시대. 스스로는 순박하고 온건하고 비편향적인 입장을 취한다고 취하지만, 딛고 선 논리가 남들이 파탄내 놓은 구렁텅이인 줄을 모른다. 결국 남들이 해줄 말은 "당신 말이 처음부터 끝까지 다틀렸다" 밖에 없는데 그런 반응에는 상처입고 분노하더라... 당연함. 스스로는 소박한 진실만 말한 것인데 인신공격 수준의 대꾸가 돌아왔다고 여기기 때문임. 그런데 도대체 이 참사를 어째야하나.

0

사람은 정말 온건하고 순하고 조심스러운 태도로도 개쎈혐오가짜뉴스를 말할 수 있는 것이다. 온건하다고 가만 놔 두면 온건하게 동조자가 늘어나고, 그거 아니라고 정색하고 뜯어말리면 당혹하거나 심지어 "공격받았다"며 진심으로 토라지는 사람들을... 대체 어째야 하는가.

1
0
0

I'm excited to announce that registrations are open for my online course, "The Barbarian Kingdoms (376-751)," hosted by @medievalistsMedievalists.net!

What: Six weekly Zoom sessions, starting May 29, where we'll discuss the history and culture of the Franks, Visigoths, Lombards, and others! See the module descriptions below, and feel free to DM with questions!

Where: Zoom
When: Thurs, 1:00-2:30 PM ET

Fee: $149
Registration: medievalstudies.thinkific.com/

@histodonshistodons group @medievodonsMedievodons group @edutootersEduTooters group

0
0
0

가짜뉴스와 선동과 파편화의 시대. 스스로는 순박하고 온건하고 비편향적인 입장을 취한다고 취하지만, 딛고 선 논리가 남들이 파탄내 놓은 구렁텅이인 줄을 모른다. 결국 남들이 해줄 말은 "당신 말이 처음부터 끝까지 다틀렸다" 밖에 없는데 그런 반응에는 상처입고 분노하더라... 당연함. 스스로는 소박한 진실만 말한 것인데 인신공격 수준의 대꾸가 돌아왔다고 여기기 때문임. 그런데 도대체 이 참사를 어째야하나.

0
1
0
0
0
0
0

Der Bundestag hat für den Entschließungsantrag der CDU/CSU gestimmt, um Grenzschließungen für Geflüchtete und Grenzkontrollen dauerhaft durchzusetzen. Während Union, FDP und AfD diesmal gemeinsam dafür und und dagegen gestimmt haben, sollte nicht vergessen werden, dass es erst die Grünen und die SPD waren, die den Nährboden für diese autoritäre Politik geschaffen, gepflegt und gedüngt haben.

Nancy (SPD) hat seit Beginn der Ampel-Regierung versucht, über das ständige Verlängern eines Ausnahmezustandes, Grenzkontrollen permanent durchzusetzen. Grüne und SPD haben mit ihren Beschlüssen zur Bekämpfung von Geflüchteten und mit ihren Vorhaben, bis hin zur geplanten Einführung der biometrischen Massenüberwachung, eine rassistisch-autoritäre Politik der zunehmenden Staatsfaschisierung betrieben und weiter normalisiert. Was Rechtskonservative und Faschos jetzt zu Ende führen möchten, haben selbsternannte linksliberale Parteien und ihre Anhängsel die letzten Jahre eifrig vorangetragen.

tagesschau.de/inland/innenpoli

Der staatliche "Kampf gegen Hass und Hetze" konsequent zu Ende geführt.

Die bayerische führt einen digitalen Kalender. Darin werden alle Veranstaltungen erfasst, die polizeiliche Relevanz haben könnten: größere Gerichtsprozesse oder Kultur- und Sportveranstaltungen ebenso wie politische Kundgebungen und Demonstrationen. Die Veranstaltungen werden jeweils mit Schlagwörtern versehen, um sie recherchierbar zu machen. Das soll der Polizei helfen, mögliche Gefährdungslagen besser einzuschätzen und Einsätze effizienter zu planen.

Vor knapp zwei Wochen wurden nun alle bayerischen Polizisten per Artikel im Intranet der Polizei angewiesen, ab sofort im Bedarfsfall ein neues Schlagwort zu verwenden: "gegen CDU und CSU".

br.de/nachrichten/bayern/gegen

0
0
0