Mersenne "Untwister": fully-featured seed recovery tool for MT-based PRNGs as commonly used by many scripting languages such as Python and Ruby https://t.co/GFwBSObxib
— Tony "Abolish ICE" Arcieri š¦š¹ (@bascule) December 18, 2021
Twitter heard āpiece of shit menā and was all āoh are we talking about stand up comics?ā pic.twitter.com/fJHEa03677
— Niko Stratis (@nikostratis) December 16, 2021
@robinkunde Hereās a SorryAboutComputer moment for you: On a plane and trying to adjust the bass on my Sony headphones but I canāt because it wants me to accept some new terms in the appā¦which locked the app but canāt download without internet. Fun and good! pic.twitter.com/stlX4qyPsu
— Atomic Hipster (@PunctualHipster) December 16, 2021
Just opened a Google spreadsheet, and was greeted by a popup that said "Introducing people chips!" with a button below that said "show me how!" Someone really didn't think through how this would sound or look (or taste) did they pic.twitter.com/qqFuCnJivI
— Annalee Newitz (@Annaleen) December 15, 2021
Tl;dr the NSO zero-click iMessage exploit leveraged an obscure 90s image compression codec in a FOSS decoder used by Apple to run arbitrary AND/OR/XOR/XNOR logic and bootstrap their own *microarchitecture* to achieve the exploit... Absolutely stunning. https://t.co/YoOqOVvcKt
— josh avant (@joshavant) December 15, 2021
Algorithms are causing human language to reroute around them in real time. Iām listening to this youtuber say things like āthe bad guy unalived his minionsā because words like ākillā are associated with demonetization
— badidea šŖ (@0xabad1dea) December 15, 2021
It appears there is a *second* Log4J vulnerability that requires another patch.
— Katie Nickels (@likethecoins) December 14, 2021
First CVE from last week: https://t.co/jqXGSWhhla
New CVE today: https://t.co/F1QDXFkDfw https://t.co/hf7w7KeADD
I was today years old that I learned when you hash a URL in Java it does a DNS lookup to get the IP address associated with the hostname as part of the hash function. https://t.co/XVdZLe7SoV
— Nicholas Weaver (@ncweaver) December 13, 2021
That's not terribly helpful, Slack. pic.twitter.com/ijgqW4xJCD
— Kenn White (@kennwhite) December 13, 2021
Donāt worry, you can play chaotic good as well. This is how you can use the #log4j vuln to patch itself! https://t.co/W91hTWDiXT
— _MG_ (@_MG_) December 11, 2021