@cmconseils I can relate to the doubt, because it took long time for me to learn to listen without interrupting. Still, the truth is even more important, so can be hard to balance.
@cmconseils Aha, it was a quote, sorry.
@doingfedtime Mixed feelings, the cult of Rust isn't always pleasant. Thinking of core utils being replaced in Ubuntu.
@cmconseils Try to stay positive, could be worse, at least you have a car.
Axios: Raccoon gets drunk at Ashland ABC store and passes out in bathroom
https://www.axios.com/local/richmond/2025/12/02/drunk-raccoon-virginia-abc-store-break-in
This is blowing up a bit: not trying to scare you all! There is a *gigantic* set of sunspots coming around the limb of the sun, comparable in size to the sunspots sketched by Carrington. They may or may not send some plasma our way. There is also a minor aurora event predicted for 2 days from now due to interactions between an eruption from this sunspot group and previously emitted solar wind/magnetic fields.
ESA has some good info on big solar storms here: https://www.esa.int/Space_Safety/Space_weather/Flying_through_the_biggest_solar_storm_ever_recorded
Venezuela Bombs American Drug Yacht, Wiping Out Entire Sackler Family Cartel: https://theneedling.com/2025/12/01/venezuela-bombs-american-drug-yacht-wiping-out-entire-sackler-family-cartel/
𝗖𝗼𝗽𝘀 𝗞𝗲𝗲𝗽 𝟵𝟬% 𝗼𝗳 𝗪𝗵𝗮𝘁 𝗧𝗵𝗲𝘆 𝗦𝗲𝗶𝘇𝗲 𝗮𝗻𝗱 𝗦𝗽𝗲𝗻𝗱 𝗜𝘁 𝗼𝗻 𝗖𝗹𝗼𝘄𝗻𝘀
(𝗵𝗼𝘄 𝘁𝗵𝗲𝘆 𝗿𝗼𝗯 𝘆𝗼𝘂)
https://www.youtube.com/watch?v=-HGCGivMSUs
Go hack more Cloudflare shit.
https://www.cve.org/CVERecord?id=CVE-2025-13353
\n \nIn gokey versions <0.2.0,\n a flaw in the seed decryption logic resulted in passwords incorrectly \nbeing derived solely from the initial vector and the AES-GCM \nauthentication tag of the key seed.
This issue has been fixed in gokey version 0.2.0. This is a breaking change. The fix has invalidated any passwords/secrets that were derived from the seed file (using the -s option). Even if the input seed file stays the same, version 0.2.0 gokey will generate different secrets.
Impact
\nThis vulnerability impacts generated keys/secrets using a seed file as an entropy input (using the -s option). Keys/secrets generated just from the master password (without the -s\n option) are not impacted. The confidentiality of the seed itself is \nalso not impacted (it is not required to regenerate the seed itself). \nSpecific impact includes:
\nkeys/secrets generated from a seed file may have lower entropy: it \nwas expected that the whole seed would be used to generate keys (240 \nbytes of entropy input), where in vulnerable versions only 28 bytes was \nused
\na malicious entity could have recovered all passwords, generated \nfrom a particular seed, having only the seed file in possession without \nthe knowledge of the seed master password
\n
Patches
\nThe code logic bug has been fixed in gokey version 0.2.0\n and above. Due to the deterministic nature of gokey, fixed versions \nwill produce different passwords/secrets using seed files, as all seed \nentropy will be used now.
System secret rotation guidance
\nIt is advised for users to regenerate passwords/secrets using the patched version of gokey (0.2.0\n and above), and provision/rotate these secrets into respective systems \nin place of the old secret. A specific rotation procedure is \nsystem-dependent, but most common patterns are described below.
Systems that do not require the old password/secret for rotation
\nSuch systems usually have a \"Forgot password\" facility or a\n similar facility allowing users to rotate their password/secrets by \nsending a unique \"magic\" link to the user's email or phone. In such \ncases users are advised to use this facility and input the newly \ngenerated password secret, when prompted by the system.
\nSystems that require the old password/secret for rotation
\nSuch systems usually have a modal password rotation window\n usually in the user settings section requiring the user to input the \nold and the new password sometimes with a confirmation. To \ngenerate/recover the old password in such cases users are advised to:
\n\ntemporarily download gokey version 0.1.3 for their respective operating system to recover the old password
\nuse gokey version 0.2.0 or above to generate the new password
\npopulate the system provided password rotation form
\n
Systems that allow multiple credentials for the same account to be provisioned
\nSuch systems usually require a secret or a cryptographic \nkey as a credential for access, but allow several credentials at the \nsame time. One example is SSH: a particular user may have several \nauthorized public keys configured on the SSH server for access. For such\n systems users are advised to:
\n\ngenerate a new secret/key/credential using gokey version 0.2.0 or above
\nprovision the new secret/key/credential in addition to the existing credential on the system
\nverify that the access or required system operation is still possible with the new secret/key/credential
\nrevoke authorization for the existing/old credential from the system
\n
Credit
\nThis vulnerability was found by Théo Cusnir (@mister_mime) and responsibly disclosed through Cloudflare's bug bounty program.
\n \nC64 SID rendition of Major Tom: https://www.youtube.com/watch?v=g88BPbPlRzI
#C64 #Music
Pocket Acid! A free software tracker for techno acid style music designed to run on linux based gaming handleds https://github.com/boomlinde/pocketacid
Woah, a usable (performance-wise on 68k) modern crypto ssh client for #Amiga (handshake takes 1 minute, interactive session is faster obv) https://franke.ms/git/bebbo/bebbossh
Grab a mini Van De Graff kit In our "Black fly day" sale" 10% off, if you use BLACK FLY DAY code at the checkout.
We don't do #BlackFriday until Dec 1st.
https://extkits.co.uk/product/van-de-graaff-vdg-generator-kit-v2-150mm-40000v-of-sparky-fun/
Hardfloor - "Black Train"
Originaly released in 2014 to celebrate 5 years of the De:tuned label from Belgium on a 5x12" Vinyl Compilation Box-Set.
Now for the first time on to download and re-released on vinyl.
(HF033 Data Mining Vinyl Edition Vol.1)
OpenAI has experienced a data breach. Any user who utilized their API services should assume that personal data, including their name, location, user ID, and other details, is now in the possession of the hacker
Arduino’s new terms of service worries hobbyists ahead of Qualcomm acquisition
“Why is reverse-engineering prohibited... for a company built on openly hackable systems?”
https://arstechnica.com/gadgets/2025/11/arduinos-new-terms-of-service-worries-hobbyists-ahead-of-qualcomm-acquisition/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social
-"When the going gets weird, the weird turn pro..."