What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0
0
0
0
0

While working on , I noticed something about how handles object access. When a remote server requests a followers-only post or DM with a valid HTTP Signatures (draft-cavage) from an authorized actor, Misskey still returns 404 instead of the content. It seems Misskey only checks the visibility field (public/home) without verifying the signature at all.

takes a different approach—when is enabled, it validates the HTTP Signatures and returns the content if the requesting actor has permission. I think it would be beneficial if Misskey could adopt a similar mechanism, since it would better respect the access control semantics that ActivityPub intends. Has anyone else run into this, or are there specific reasons Misskey handles it this way?

0
1
0
0
0
2

Trans people on (non-DIY) HRT:

Do you actually personally look at the numbers that come back from the lab from your blood tests (to the extent of having a vague idea of the levels of T/E2/P4/etc. that are right for you); or do you just trust what your doctor says about the levels without looking at the actual data yourself?

(Boosts appreciated, thanks!)

0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
0

The execution of every single instruction can alter a significant chunk of this enormous amount of state and must do so reliably. But as I mentioned before it's impossible to test all possible combinations and some sequences might lead to inconsistent or corrupted state, which in turn will manifest itself as a software bug. 9/31

Here's a few examples I've encountered: the instruction pointer is fetched from the stack while returning from a function call but it appears wrong, possibly because the wrong instruction pointer was sent to the instruction fetch pipeline: bugzilla.mozilla.org/show_bug. 10/31

0
0

The ICE situation in Minneapolis demonstrates the dangers of database software combined with pattern recognition and meta-data surveillance such as phone data. I'm sad and disgusted that clear danger to democratic society is not recognized by the general public on scale. Palantir is able to convince German federal officials and parliaments to buy their systems. the same technology that is core component of ICE's executive power abuse.

0
0
0
0
0
1
0
0
0
0
0
0
0

이런 것을 볼 때마다 '인간 유전자의 가능한 조합이 얼마나 적은데 차라리 지금 태어나 있는 어린이 중 나와 가장 닮은 사람을 찾는 것이 나을지도' 같은 생각을 합니다.

RE: https://bsky.app/profile/did:plc:uabkr6tn7ru4b4e5e6udleuf/post/3m27jxuaeuk2s

0

@dressupgeekout

MacOS 9: Are you me from the future?

iPhone: No, I'm your replacement. From the future. Now that I think of it, I suppose that part is probably what you were more in awe about.

MacOS 9: You mean I'm dead?

iPhone: <chuckles> Oh yeah. Looong dead. They shoved your remains into your first replacement, then pulled them back out when they got too rotten. Some necromancers revive you from time to time, though. That's actually what's happening now.

MacOS 9: Software needed! 😭😱

0
0

華郵記者 Hannah Natanson 遭聯邦幹員拂曉破門扣押所有個人電子用品,包括手錶,目標是找出她的報導消息來源

這裡無意討論美國司法部的行徑是否合法、合憲或產生寒蟬效應。或許一切都有理有據,況且目前台灣應無政府破門而入搜查記者消息來源的風險

然而,開戰之後呢?我們能信任什麼樣的網路溝通媒介?假如敵軍直接、突然、現在立刻沒收你已解鎖的手機,你能保留多少隱私?

E2EE 確保主機端給人破獲也難以解譯,但出問題的是資訊已解密或尚未加密的,你的手機這端

這就是 Media Confidential 本週討論的話題

podcasts.apple.com/tw/podcast/

0
0
0

諸星大二郎の「妖怪ハンター」を読んでみたんだけど、これ妖怪と戦う話というわけではないのね(ずっとそうだと思っていた)
これは70年代のマンガだけど、昔話や民話を深堀りして古代文明や神話などと合わせて考察する、というスタンスは、最近見かけるマンガやアニメをやたら深堀りするような考察タイプの人にウケそうな気がする(YouTuberとかがやってそう)

0
0
0

While working on , I noticed something about how handles object access. When a remote server requests a followers-only post or DM with a valid HTTP Signatures (draft-cavage) from an authorized actor, Misskey still returns 404 instead of the content. It seems Misskey only checks the visibility field (public/home) without verifying the signature at all.

takes a different approach—when is enabled, it validates the HTTP Signatures and returns the content if the requesting actor has permission. I think it would be beneficial if Misskey could adopt a similar mechanism, since it would better respect the access control semantics that ActivityPub intends. Has anyone else run into this, or are there specific reasons Misskey handles it this way?

0
1
0
1
1