Sorry About Computer

New decade, new nonsense

Mersenne "Untwister": fully-featured seed recovery tool for MT-based PRNGs as commonly used by many scripting languages such as Python and Ruby https://t.co/GFwBSObxib

— Tony "Abolish ICE" Arcieri šŸ¦€šŸŒ¹ (@bascule) December 18, 2021

Twitter heard ā€œpiece of shit menā€ and was all ā€œoh are we talking about stand up comics?ā€ pic.twitter.com/fJHEa03677

— Niko Stratis (@nikostratis) December 16, 2021

@robinkunde Hereā€™s a SorryAboutComputer moment for you: On a plane and trying to adjust the bass on my Sony headphones but I canā€™t because it wants me to accept some new terms in the appā€¦which locked the app but canā€™t download without internet. Fun and good! pic.twitter.com/stlX4qyPsu

— Atomic Hipster (@PunctualHipster) December 16, 2021

Just opened a Google spreadsheet, and was greeted by a popup that said "Introducing people chips!" with a button below that said "show me how!" Someone really didn't think through how this would sound or look (or taste) did they pic.twitter.com/qqFuCnJivI

— Annalee Newitz (@Annaleen) December 15, 2021

Tl;dr the NSO zero-click iMessage exploit leveraged an obscure 90s image compression codec in a FOSS decoder used by Apple to run arbitrary AND/OR/XOR/XNOR logic and bootstrap their own *microarchitecture* to achieve the exploit... Absolutely stunning. https://t.co/YoOqOVvcKt

— josh avant (@joshavant) December 15, 2021

Algorithms are causing human language to reroute around them in real time. Iā€™m listening to this youtuber say things like ā€œthe bad guy unalived his minionsā€ because words like ā€œkillā€ are associated with demonetization

— badidea šŸŖ (@0xabad1dea) December 15, 2021

It appears there is a *second* Log4J vulnerability that requires another patch.

First CVE from last week: https://t.co/jqXGSWhhla
New CVE today: https://t.co/F1QDXFkDfw https://t.co/hf7w7KeADD

— Katie Nickels (@likethecoins) December 14, 2021

I was today years old that I learned when you hash a URL in Java it does a DNS lookup to get the IP address associated with the hostname as part of the hash function. https://t.co/XVdZLe7SoV

— Nicholas Weaver (@ncweaver) December 13, 2021

That's not terribly helpful, Slack. pic.twitter.com/ijgqW4xJCD

— Kenn White (@kennwhite) December 13, 2021

Donā€™t worry, you can play chaotic good as well. This is how you can use the #log4j vuln to patch itself! https://t.co/W91hTWDiXT

— _MG_ (@_MG_) December 11, 2021

<<< previous      next >>>

@robinkunde

JSON feed

Atom feed