Sorry About Computer

New decade, new nonsense

Mersenne "Untwister": fully-featured seed recovery tool for MT-based PRNGs as commonly used by many scripting languages such as Python and Ruby https://t.co/GFwBSObxib

— Tony "Abolish ICE" Arcieri 🦀🌹 (@bascule) December 18, 2021

Twitter heard “piece of shit men” and was all “oh are we talking about stand up comics?” pic.twitter.com/fJHEa03677

— Niko Stratis (@nikostratis) December 16, 2021

@robinkunde Here’s a SorryAboutComputer moment for you: On a plane and trying to adjust the bass on my Sony headphones but I can’t because it wants me to accept some new terms in the app…which locked the app but can’t download without internet. Fun and good! pic.twitter.com/stlX4qyPsu

— Atomic Hipster (@PunctualHipster) December 16, 2021

Just opened a Google spreadsheet, and was greeted by a popup that said "Introducing people chips!" with a button below that said "show me how!" Someone really didn't think through how this would sound or look (or taste) did they pic.twitter.com/qqFuCnJivI

— Annalee Newitz (@Annaleen) December 15, 2021

Tl;dr the NSO zero-click iMessage exploit leveraged an obscure 90s image compression codec in a FOSS decoder used by Apple to run arbitrary AND/OR/XOR/XNOR logic and bootstrap their own *microarchitecture* to achieve the exploit... Absolutely stunning. https://t.co/YoOqOVvcKt

— josh avant (@joshavant) December 15, 2021

Algorithms are causing human language to reroute around them in real time. I’m listening to this youtuber say things like “the bad guy unalived his minions” because words like “kill” are associated with demonetization

— badidea 🪐 (@0xabad1dea) December 15, 2021

It appears there is a *second* Log4J vulnerability that requires another patch.

First CVE from last week: https://t.co/jqXGSWhhla
New CVE today: https://t.co/F1QDXFkDfw https://t.co/hf7w7KeADD

— Katie Nickels (@likethecoins) December 14, 2021

I was today years old that I learned when you hash a URL in Java it does a DNS lookup to get the IP address associated with the hostname as part of the hash function. https://t.co/XVdZLe7SoV

— Nicholas Weaver (@ncweaver) December 13, 2021

That's not terribly helpful, Slack. pic.twitter.com/ijgqW4xJCD

— Kenn White (@kennwhite) December 13, 2021

Don’t worry, you can play chaotic good as well. This is how you can use the #log4j vuln to patch itself! https://t.co/W91hTWDiXT

— _MG_ (@_MG_) December 11, 2021

<<< previous      next >>>

@robinkunde

JSON feed

Atom feed