Bug Chain: pre-auth takeover to permanent access. ⌘ Read more
SSRF via PDF Generator? Yes, and It Led to EC2 Metadata Access
👨💻Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/ssrf-via-pdf-generator-yes-and-it-led-to-ec2-metadata-access-39b8e5b41840 … ⌘ Read more
API Key Exposure in NASA GitHub Repository Leads to Unauthorized Access to Academic Data
🔓Free Article Link
[Continue reading on InfoSec Write-ups »](https://infosecwriteu … ⌘ Read more
Raspberry Pi Connect Exits Beta with Version 2.5 Release
Raspberry Pi has officially ended the beta phase of Raspberry Pi Connect, its remote access platform for connecting to Raspberry Pi devices from anywhere. With the release of version 2.5, the service now includes major updates to connection management, significantly reducing data usage and improving responsiveness. Launched in early 2024, Raspberry Pi Connect quickly gained […] ⌘ Read more
SiFive and Kinara Partner to Launch USB-Based X280 RISC-V Vector Development Board
SiFive and Kinara have announced a new partnership to offer developers direct access to the SiFive Intelligence X280 RISC-V vector processor through a compact USB-based enablement board. The HiFive Xara X280 board, based on Kinara’s Ara-2 processor, is designed to allow early-stage evaluation and development of RISC-V vector software, particularly for AI and machine learning […\ … ⌘ Read more
Design system annotations, part 2: Advanced methods of annotating components
How to build custom annotations for your design system components or use Figma’s Code Connect to help capture important accessibility details before development.
The post [Design system annotations, part 2: Advanced methods of annotating components](https://github.blog/engineering/user-experience/design-system-annotations-part-2-advanced-methods-of-annotating-component … ⌘ Read more
Design system annotations, part 1: How accessibility gets left out of components
The Accessibility Design team created a set of annotations to bridge the gaps that design systems alone can’t fix and proactively addresses accessibility issues within Primer components.
The post [Design system annotations, part 1: How accessibility gets left out of components](https://github.blog/engineering/user-experience/design-system-annotations-part-1-how … ⌘ Read more
UUIDs: A False Sense Of Security
Hi Hunters, would you like to learn about a broken access control vulnerability that I discovered recently for a client.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/uuids-a-false-sense-of-security-10467497daae?source=rss—-7b7 … ⌘ Read more
$50,000 Bounty: GitHub Access Token
How a hidden token in a desktop app could have compromised one of the world’s biggest e-commerce platforms
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/50-000-bounty-github-access-token-c29cb6f00182?source=rss—-7b722bf … ⌘ Read more
[$] A FUSE implementation for famfs
The famfs
filesystem is meant to provide a shared-memory filesystem for large data
sets that are accessed for computations by multiple systems. It was
developed by John Groves, who led a combined filesystem and
memory-management session at
the 2025 Linux Storage, Filesystem, Memory
Management, and BPF Summit (LSFMM+BPF) to discuss it. The session was a
follow-up to [the famfs session at last year’s\
summit](https://lwn.net/Articles … ⌘ Read more
HydraLink Offers Open USB-to-Automotive Ethernet Interface for Testing and Diagnostics
HydraLink is now available on CrowdSupply as a compact and open-source USB-to-Automotive Ethernet adapter intended for engineers, researchers, and others working with in-vehicle networks. It supports both 100BASE-T1 and 1000BASE-T1 over single-pair Ethernet, enabling direct access to automotive Ethernet without the need for media converters or additional lab equipment. Hy … ⌘ Read more
[$] Filtering fanotify events with BPF
Linux systems can have large filesystems; trying to keep up with the
stream of
fanotify filesystem-monitoring notifications for them can be a struggle.
Fanotify is one of a few ways to monitor accesses to filesystems provided by the kernel.
Song Liu led a discussion
on how to improve in-kernel filtering of fanotify events to a joint
session of the filesystem and BPF tracks at the 2025 Linux Storage, Filesystem,
Memo … ⌘ Read more
**IDOR Attacks Made Simple: How Hackers Access Unauthorized Data **
IDOR Attacks Made Simple: How Hackers Access Unauthorized Data 🔐
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/idor-attacks-made-simple-h … ⌘ Read more
Signing key change for Kali Linux
The Kali Linux distribution has announced
that software updates will soon start failing for all users:
This is not only you, this is for everyone, and this is entirely
our fault. We lost access to the signing key of the repository, so
we had to create a new one. At the same time, we froze the
repository (you might have noticed that there was no update since
Friday 18th), so nobody was impacted yet. But we’re going to
unfreez … ⌘ Read more
How i Access The Deleted Files of Someone in Google Drive | Bug Bounty ⌘ Read more
**Path Traversal Attack: How I Accessed Admin Secrets **
Path Traversal Attack: How I Accessed Admin Secrets 📂
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/path-traversal-attack-how-i-accessed-admin-secrets-fa5de1865031?source … ⌘ Read more
Unrestricted Access to All User Information | REST API Oversharing ⌘ Read more
Prepare your application landscape for zero trust with Keycloak 26.2
Strong identity and access management is a key component of a zero trust architecture for cloud native applications. Keycloak is well-known for its single-sign-on capabilities based on open standards. It provides you all the building blocks… ⌘ Read more
**404 to 0wnage: How a Broken Link Led Me to Admin Panel Access **
Hey there!😁
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/404-to-0wnage-how-a-broken-link-led-me-to-admin-panel-access-2b58e1fffaa3?source=r … ⌘ Read more
[$] DMA addresses for UIO
The Userspace\
I/O (UIO) subsystem was first added to the kernel by
Hans J. Koch for the 2.6.32 release in 2007. Its purpose is to facilitate
the writing of drivers (mostly) in user space; to that end, it provides
access to a number of resources that user-space code normally cannot touch.
One piece that is missing, though, is DMA addresses. [A proposal to\
fill that gap](https://lwn.net/ml/all/20250410-uio-dma-v … ⌘ Read more
** HTTP Parameter Pollution: The Dirty Little Secret That Gave Me Full Backend Access ️**
Free Link🎈
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.co … ⌘ Read more
good morning friends. i don’t know what i’m gonna do today. perhaps work on my patreon and login wall more personal sites behind authelia that i could offer access to via patreon tier
is it like… ethical to offer access to certain self hosted services as patreon exclusives. like i wanna offer the IRC client/bouncer i hosted which seems ok i think because i’ve seen pico.sh offer their instances of that as paid services. but the other ones i have in mind are alt web frontends for stuff like imgur and pinterest. and i just feel weird about it for some reason. idk i’m trying to think of ways to support my server stuff but every time i come up with something it feels weird
@bender@twtxt.net Exactly. I suspect it was because of sqlitebrowser also accessing the database in parallel to debug the original issue.
So far, I have not found the exact reason why some replies don’t show up. When I do not filter for unread messages and show all, though, I actually see them. So, there’s that.
Banana Pi BPI-RV2 Gateway Board Integrates Siflower SF21H8898 RISC-V SoC
Banana Pi has introduced the BPI-RV2, an open-source gateway platform developed in collaboration with Siflower. The board is based on the SF21H8898 SoC, a quad-core RISC-V processor designed for industrial and enterprise networking applications such as routers, access points, and control gateways. The Siflower SF21H8898 is built using TSMC’s 12nm FFC process and integrates a […] ⌘ Read more
El Salvador denies senator visit with mistakenly deported man: Van Hollen
Sareen Habeshian, Staff Writer - Axios
_Stephan: The utterly incompetent Homeland Security Secretary Kristi Noem, and her $50,000 Rolex, had no problem getting into the El Salvador concentration camp and posing in front of the inmates. But Democrat Maryland Senator Chris Van Hollen, when he went to El Salvador, was denied any access. Dictator Trump’s deal with Dictator Nayib B … ⌘ Read more
$10,000 worth GitHub Access Tokens | Secret Search Operators
Secret but basic GitHub dorks & search operators that can lead to $10k bounty worth Acess Tokens.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/10- … ⌘ Read more
[$] Managing multiple sources of page-hotness data
Knowing how frequently accessed a page of memory is (its “hotness”) is a
key input to many memory-management heuristics. Jonathan Cameron, in a
memory-management track at the 2025 Linux Storage, Filesystem,
Memory-Management, and BPF Summit, pointed out that the number of sources
of that kind of data is growing over time. He wanted to explore the
questions of what commonality exists between data from those sources, and
whether it makes sense to aggregate them all somehow. ⌘ Read more
[$] Preparing DAMON for future memory-management problems
The Data Access\
MONitor (DAMON) subsystem provides access to detailed memory-management
statistics, along with a set of tools for implementing policies based on
those statistics. An update on DAMON by its primary author, SeongJae Park,
has been a fixture of the Linux Storage, Filesystem, Memory-Management, and
BPF Summit for some years. The 2025 Summit was no exception; Park led two
sessions on recent and future DAMON developme … ⌘ Read more
Then I cleaned up my shell history of all of the invocations I ever made of dkv rm ... to make sure I never ever have this so easily accessible in my shell history (^R):
$ awk '
/^#/ { ts = $0; next }
/^dkv rm/ { next }
{ if (ts) print ts; ts=""; print }
' ~/.bash_history > ~/.bash_history.tmp && mv ~/.bash_history.tmp ~/.bash_history && history -r
[$] The state of guest_memfd
A typical cloud-computing host will share some of its memory with each
guest that it runs. The host retains its access to that memory, though,
meaning that it can readily dig through that memory in search of data that
the guest would prefer to keep private. The guest_memfd subsystem removes (most of) the
host’s access to guest memory, making the guest’s data more secure. In the
memory-management track of the 2025 Linux Storage, Filesystem,
Memory-Management, and BPF Su … ⌘ Read more
[$] Approaches to reducing TLB pressure
The CPU’s translation lookaside buffer (TLB) caches the results of
virtual-address translations, significantly speeding memory accesses. TLB
misses are expensive, so a lot of thought goes into using the TLB as
efficiently as possible. Reducing pressure on the TLB was the topic of Rik
van Riel’s memory-management-track session at the 2025 Linux Storage,
Filesystem, Memory-Management, and BPF Summit. Some approaches were
considered, but the session was short on firm conclusions. ⌘ Read more
GitHub found 39M secret leaks in 2024. Here’s what we’re doing to help
Every minute, GitHub blocks several secrets with push protection—but secret leaks still remain one of the most common causes of security incidents. Learn how GitHub is making it easier to protect yourself from exposed secrets, including today’s launches of standalone Secret Protection, org-wide scanning, and better access for teams of all sizes.
The post [GitHub found 39M secret leaks in 2024. H … ⌘ Read more
Cedar: A New Approach to Policy Management for Kubernetes
The challenges organizations face when managing access control and authorization in cloud-native environments continue to grow in complexity. Organizations scaling their Kubernetes deployments, for example, work to balance their security requirements, operational flexibility, and policy manageability…. ⌘ Read more
Bypassing Ubuntu’s user-namespace restrictions
Ubuntu 23.10 and 24.04 LTS introduced a feature using AppArmor to
restrict access to user namespaces. Qualys has reported
three ways to bypass AppArmor’s restrictions and enable local users to
gain full administrative capabilities within a user namespace. Ubuntu
has followed up with a post
that expla … ⌘ Read more
Raspberry Pi PoE+ Injector Leverages Power-Over-Ethernet for Remote Deployments
This month, Raspberry Pi launched a device capable of powering its single-board computers over Power-over-Ethernet. The Raspberry Pi PoE+ Injector enables both power and data to be transmitted through a single Ethernet cable, simplifying network infrastructure for projects deployed in remote or difficult-to-access locations. Compatible with devices conforming to IEEE 802.3af and 802.3at … ⌘ Read more
@kat@yarn.girlonthemoon.xyz Using full-blown Cloud services is good for old people like me who don’t want to do on-call duty when a disk fails. 😂 I like sleep! 😂
Jokes aside, I like IaaS as a middle ground. There are IaaS hosters who allow you to spin up VMs as you wish and connect them in a network as you wish. You get direct access to all those Linux boxes and to a layer 2 network, so you can do all the fun networking stuff like BGP, VRRP, IPSec/Wireguard, whatever. And you never have to worry about failing disks, server racks getting full, cable management, all that. 😅
I’m confident that we will always need people who do bare-bones or “low-level” stuff instead of just click some Cloud service. I guess that smaller companies don’t use Cloud services very often (because it’s way too expensive for them).
@prologic@twtxt.net oh yeah it’s absolutely epic i love how fast it is. it would be extra peak if it sent a message to every bot that it denies access to that just says “get fucked” or something idk
I have applied your comments, and I tried to add you as an editor but couldn’t find your email address. Please request editing access if you wish.
Also, could you elaborate on how you envision migrating with a script? You mean that the client of the file owner could massively update URLs in old twts ?
How to Show QR Code for Wi-Fi on iPhone, Mac, iPad
One very easy and convenient way to share access to a wi-fi router is by generating a QR code for joining that wi-fi router, which can be useful for house guests, offices, waiting rooms, rentals, restaurants, shops, and just about anywhere else with wi-fi that people might want to join. It can also make it … Read More ⌘ Read more
Comet GL-RM1 Enables Remote Control with 2K Video Resolution
Comet (GL-RM1) is a hardware-based remote KVM solution for remote computer access and control. Its open-source design enables hardware-level interaction, making it useful for remote work, IT maintenance, and server management. It allows full control over offline computers, including BIOS access, troubleshooting, and boot failure recovery. The device features a quad-core 1.5GHz processor, 1GB DDR3 […] ⌘ Read more
wahhh i wanna work towards my dream of offering pay as you can web hosting (static & dynamic) but i don’t know how!!!!! i keep drifting towards hosting panels but i don’t exactly have fresh linux servers for those nor do i like the level of access they require. so i’m like ok i can do the static site part with SFTP chroot jails and a front-end like filebrowser or something…. but then what about the dynamic sites!!!!!!! UGH
granted i doubt i’d get much interest in dynamic sites but i’d like to do this old school where i can offer people isolated mySQL databases or something for some project (i’m thinking PHP based fanlistings), which means i could do it the old school way of… people ask me to run it and i do it for them. but i kind of want to let people have access to be able to do it themselves just short of giving them SSH access which isn’t happening
Expose the Kubernetes API and access it anywhere
Accessing the Kubernetes API for your clusters from anywhere or across any network is a powerful lever. It’s even better if you can do so without shipping or extending more messy networks, like VPCs or VPNs…. ⌘ Read more
Emoji Picker Shortcut Not Working in MacOS Sequoia? Let’s Fix It
Some MacOS Sequoia users have discovered the familiar handy Emoji keyboard shortcut to access the Emoji & Symbols panel is no longer working as expected. This can be immensely frustrating, especially if you rely on it for quick access to emojis in messages, emails, documents, and in general. While it might seem like a minor … [Read More](https://osxdaily.com/2025/03/07/emoji-picker-shortcut-not-workin … ⌘ Read more
Announcing the Beta Release of OpenTelemetry Go Auto-Instrumentation using eBPF
The OpenTelemetry community is excited to announce the beta release of the OpenTelemetry Go Auto-Instrumentation project! This milestone brings us closer to our mission of making observability simple, accessible, and effective for Go applications. What is… ⌘ Read more
New Phippy Book Guidelines: Enhancing Community Access & Engagement
Phippy and Friends have long been a beloved part of the cloud native ecosystem, making complex technologies more approachable through storytelling. As interest in these books grows, CNCF is introducing new guidelines to better support, distribute,… ⌘ Read more
I make a Emacs theme with a contrast ready for colour blind or visually impaired people.
https://github.com/tanrax/thankful-eyes-theme.el
Enjoy!
#emacs #accessibility
Walletverse submits CCS proposal to integrate Monero into their ‘community-driven crypto wallet’
The Walletverse 1 team has submitted a CCS proposal2 looking to integrate Monero into their community-driven crypto wallet 3:
This integration will enhance the privacy and functionality of the Walletverse wallet and contribute to the wider adoption of Monero by making it more accessible.
Total funding: 135 XMR.
ETA: 3+ months.
Milestones
- M1: Core Moner … ⌘ Read more
US Probes UK’s Apple Encryption Demand for Possible Treaty Violation
U.S. officials are looking at whether the United Kingdom violated a bilateral agreement by demanding Apple create a “backdoor” to access end-to-end encrypted iCloud data, according to a letter from National Intelligence Director Tulsi Gabbard (via Reuters).
ameriDroid Opens Preorders for VPN Server with WireGuard and DietPi
The VPN Server by ameriDroid is a pre-configured device for secure remote access to home and small office networks. Built on the ODROID-C4, it runs a lightweight Linux-based system with WireGuard for encrypted VPN connections and minimal setup. The device is based on the ODROID-C4, a single-board computer released in early 2020 by Hardkernel, featuring […] ⌘ Read more
Short summary of Project2025 and Trump’s plans for the US:
Abolish the Federal Reserve
Why? To end what is seen as an unelected, centralized body that exerts too much influence over the economy and monetary policy, replacing it with a more transparent, market-driven approach.Implement a national consumption tax
Why? To replace the current federal income tax system, simplify taxation, and increase government revenue through a broader base that includes all consumers.Lower corporate tax rates
Why? To promote business growth, increase investment, and stimulate job creation by reducing the financial burden on companies.Deregulate environmental policies
Why? To reduce government intervention in the economy, particularly in energy and natural resources sectors, and to foster a more business-friendly environment.Restrict abortion access
Why? To align with conservative pro-life values and overturn or limit abortion rights, seeking to restrict the practice at a federal level.Dismantle LGBTQ+ protections
Why? To roll back protections viewed as promoting LGBTQ+ rights in areas like employment and education, in line with traditional family values.Eliminate diversity, equity, and inclusion (DEI) programs
Why? To end policies that are seen as divisive and to promote a merit-based system that prioritizes individual achievements over group identity.Enforce stricter immigration policies, including mass deportations and detentions
Why? To prioritize border security, reduce illegal immigration, and enforce existing laws more aggressively, as part of a broader strategy to safeguard U.S. sovereignty.Eliminate the Department of Education
Why? To reduce federal control over education and shift responsibilities back to local governments and private sectors, arguing that education decisions should be made closer to the community level.Restructure the Department of Justice
Why? To ensure the department aligns more closely with the administration’s priorities, potentially reducing its scope or focus on areas like civil rights in favor of law-and-order policies.Appoint political loyalists to key federal positions
Why? To ensure that government agencies are headed by individuals who are committed to advancing the administration’s policies, and to reduce the influence of career bureaucrats.Develop training programs for appointees to execute reforms effectively
Why? To ensure that political appointees are equipped with the knowledge and skills necessary to implement the proposed changes quickly and effectively.Provide a 180-day transition plan with immediate executive orders
Why? To ensure that the incoming administration can swiftly implement its agenda and make major changes early in its term without delay.
Do y’all agree with any/all/some of these poliices? Hmmm 🤔
(Updated) Spitz Plus GL-X2000 is an Upcoming Wi-Fi 6 and 4G LTE CAT 12 Router
The Spitz Plus GL-X2000 is a 4G LTE Wi-Fi 6 router designed to deliver reliable connectivity for remote work, travel, and rural internet access. It supports advanced network features like Multi-WAN, Failover, and Load Balancing, enhancing connection stability and ensuring dependable performance. The router is powered by a Qualcomm dual-core processor running at 1 GHz, […] ⌘ Read more
Yes, today in France, the price of houses is relatively high in the countryside and difficult to access for a modest family. I bought this house with my wife thirty years ago for a very low price but with a lot of work to do. It took me 20 years to finish everything with little means… it was not always easy, but I would never have returned to the city for anything in the world.. I hope my English is not too bad…
@prologic@twtxt.net I’m speculating, but if I had to guess I’d say it’s probably asking for your user password in order to access some user keyring (or whatever your OS uses to manage user secret credentials) used to safely store your passkeys related data in order to do its passkeys /ME doing air quotes Magic™ … you could try with a different password manager to avoid said scenario.
Also, passkeys UX sucks.
Head of Social Security abruptly resigns after clash with Elon Musk over DOGE’s access to sensitive data
Stephen M. Lepore, Reporter - Daily Mail
_Stephan: The Musk gangsters of “king” Trump are looting your personal information and Michelle King, Acting Commissioner of Social Security had the integrity to resign from her post after she could not stop them. And so the Trumpian coup continues. The American people creat … ⌘ Read more
Spotify Readies Premium Tier With Hi-Fi Audio and AI Features
Spotify users waiting to learn when the service’s long-delayed high-quality premium audio service will materialize may finally have something to chew on. Bloomberg reports that the streaming service hopes to roll out a new “Music Pro” tier later this year.

Accounts on the official Lunduke Journal forum are only available for full subscribers to The Lunduke Journal (that’s you). ⌘ Read more
[LTH] [Bounty] Haveno: Add support for DAI
DAI is useful asset to trade with XMR for access to many liquid and lending markets. CakeWallet supports DAI. This bounty would be complete upon the merge of a pull request, closing these issues.
Links:
- https://bounties.monero.social/posts/175/haveno-add-support-for-dai
- https://github.com/haveno-dex/listing/issues/21
bvcxza (Github) ⌘ Read more
ProcessOne: Join our community: Free Memberships now available
We’re excited to announce a new way to connect with our community at Process-One. As of today, we’ve enabled free memberships on our site, giving you even more ways to stay updated, interact, and engage with our content.
By becoming a member, you get access to specific benefits, including:
- The ability to engage with our content in new ways, such as commenting on posts, participating in discussions like … ⌘ Read more
UK Authorities Demand Back Door Access to iCloud Backups Globally
The British government has demanded that Apple give it blanket access to all user content uploaded to the cloud, reports The Washington Post.
The undisclosed order is said to have been issued last month, and requires that Apple creates a back door that allo … ⌘ Read more
You Can Now Use ChatGPT Search Without Signing In
ChatGPT’s search engine feature can now be accessed by anyone, OpenAI announced on Wednesday. Previously, users needed an account to use ChatGPT search, but the sign-in requirement has now been removed.
ChatGPT Search is available on the ChatGPT website and in the desktop and mobile apps. Searches can be initiated ba … ⌘ Read more
Google Launches New Versions of Gemini, Including ‘Thinking’ Model
Google today announced updates to Gemini, the company’s AI product that competes with OpenAI’s ChatGPT, DeepSeek, and Apple Intelligence.
Starting today, Gemini app users can access Google’s [2.0 Flash Thinking Experim … ⌘ Read more
How to Find Screenshots in Photos App for iOS 18
Ongoing complaints about the Photos app redesign in iOS 18 persist, with users who are frustrated with how difficult it can be to locate certain images or photos that once were easy for them to find. For example, if you take a lot of screenshots on your iPhone you might want quick and easy access … Read More ⌘ Read more
@f1ee6 Hello, for my part, I’m discovering Gopher :-). Really cool to give a little life to old computers. For the moment, I access Gopher from an old Mac G3/OS9, lynx on linux on an I3 laptop and for fun, Gopher from my old Palm PDA with Overbite. Lots of good things to all, friendship from France ;-)
CAN FD Adapter for High-Speed Industrial and Embedded Communication in M.2 and Mini-PCIe Form Factors
The CAN FD Adapter enables high-speed CAN FD connectivity for embedded and industrial applications. Available in M.2 B-key and mini-PCIe form factors, it supports data rates from 12.5 kbit/s to 8 Mbit/s. It integrates with systems used in industrial monitoring, robotics, automation, hardware-in-the-loop testing, remote access, and data loggin … ⌘ Read more
It’s really cool how my local public library’s membership includes digital access to thousands of magazines and newspapers.
‘It’s a coup’: Musk’s DOGE granted access to system that pays out Social Security
Olivia Rosane, Staff Writer - Common Dreams | AlterNet
_Stephan: What amounts to an oligarchical coup of the United States has just happened. The unelected billionaires who bought “emperor” Trump his office now have my, and probably your, complete personal financial data – anything any of us has ever filed with the federal government, as well as any military serv … ⌘ Read more
@sorenpeter@darch.dk It depends on your requirements. If you just want to put your code somewhere for yourself, simply push it over SSH on a server and call it good. That’s what I do with lots of repos. If you want an additional web UI for read access for the public, cgit comes to mind (a mate uses that). Prologic runs Gitea, which offers heaps more functionality like merge requests.
** In reply to: The politics of accessibility – Brian DeConinck **
In reply to: The politics of accessibility – Brian DeConinck
A devastating perfect blog post.
The core concept of digital accessibility is that everyone, including people with disabilities, should be able to access information and accomplish tasks via computer independently.
Continuing later,
This is an intensely political statement, backed by decades of protests and lobbying and litigation. … ⌘ Read more
[ANN] Tor project twitter is compromised
Our X (Twitter) account has been compromised. We are working to regain access. Please do not trust or interact with any posts, DMs, or links from our account until further notice.
Link: https://mastodon.social/@torproject/113918614226738202
@monerobull:matrix.org ⌘ Read more
@lyse@lyse.isobeef.org The one in question is more like the javascript version for unwrapping errors when accessing methods.
const value = some?.deeply?.nested?.object?.value
but for handling errors returned by methods. So if you wanted to chain a bunch of function calls together and if any error return immediately. It would be something like this:
b:= SomeAPIWithErrorsInAllCalls()
b.DoThing1() ?
b.DoThing2() ?
// Though its not in the threads I assume one could do like this to chain.
b.Chain1()?.Chain2()?.End()?
I am however infavor of having a sort of ternary ? in go.
PS. @prologic@twtxt.net for some reason this is eating my response without throwing an error :( I assume it has something to do with the CSRF. Can i not have multiple tabs open with yarn?
@lyse@lyse.isobeef.org The one in question is more like the javascript version for unwrapping errors when accessing methods.
const value = some?.deeply?.nested?.object?.value
but for handling errors returned by methods. So if you wanted to chain a bunch of function calls together and if any error return immediately. It would be something like this:
b:= SomeAPIWithErrorsInAllCalls()
b.DoThing1() ?
b.DoThing2() ?
// Though its not in the threads I assume one could do like this to chain.
b.Chain1()?.Chain2()?.End()?
I am however infavor of having a sort of ternary ? in go.
PS. @prologic@twtxt.net for some reason this is eating my response without throwing an error :( I assume it has something to do with the CSRF. Can i not have multiple tabs open with yarn?
Windows 11 Now Lets You Access Your iPhone from the Start Menu
Microsoft has announced an update to Windows 11 that allows iPhone users to access their devices directly from the Start menu, bringing feature parity with its existing Android phone integration.
The … ⌘ Read more
OpenAI Says It Has Evidence DeepSeek Used Its Model To Train Competitor
OpenAI says it has evidence suggesting Chinese AI startup DeepSeek used its proprietary models to train a competing open-source system through “distillation,” a technique where smaller models learn from larger ones’ outputs.
The San Francisco-based company, along with partner Microsoft, blocked suspected DeepSeek accounts from accessing … ⌘ Read more
WhatsApp Critical Privacy Bug Fixed in Latest iOS Update
WhatsApp has released version 25.2.3 for iOS devices to patch a significant privacy vulnerability that affected its “View Once” feature. The bug allowed users to access photos and videos that were meant to disappear after a single viewing.
The security flaw, which only impacted iPhone users, allowed anyone to view supposedly ephemeral content by navi … ⌘ Read more
Considerations for making a tree view component accessible
A deep dive on the work that went into making the component that powers repository and pull request file trees.
The post Considerations for making a tree view component accessible appeared first on The GitHub Blog. ⌘ Read more
AI-powered image descriptions on my blog
My blog still has a long way to go when it comes to accessibility, but I’m excited about two new plugins I’ve just added to make things better. ⌘ Read more
How to Use “Type to Siri” with Apple Intelligence on iPhone & iPad
Using “Type to Siri” on iPhone and iPad is better than ever thanks to Apple Intelligence, and if you have a new enough iPhone or iPad. Type to Siri with Apple Intelligence includes ChatGPT integration, making it a notably more capable AI assistant, and it’s also much easier to access with the latest devices and … [Read More](https://osxdaily.com/2025/01/23/how-to-use-type-to-siri-with-app … ⌘ Read more
Apple Pressed by India to Pre-Install Government Apps on iPhones
Apple and other smartphone makers are being pressed by India to pre-install government-developed apps on devices before sale, echoing a similar 2021 demand from Russia that Apple ultimately complied with.
The request came during a meeting last month where government officials outlined plans for expanding access to state digital services, accor … ⌘ Read more
@movq, @prologic@twtxt.net when navigating to a Yarn. If the head twt is missing then the whole thread is not accessible. It only returns an error. so i have no way to view any of the replies within the thread other than the end twt.
@movq, @prologic@twtxt.net when navigating to a Yarn. If the head twt is missing then the whole thread is not accessible. It only returns an error. so i have no way to view any of the replies within the thread other than the end twt.
10 Mysterious Military Sites in America
Military sites are located all around America, and even the world. Many of these are easily accessible and can be found with a simple online search. However, some military sites remain very secretive to this day. Many of these secret sites are located well behind barbed-wire fencing or deep underground. It’s tough to locate these […]
The post [10 Mysterious Military Sites in America](https://listverse.com/2025/01/17/10-mysterious-military-sites-in-amer … ⌘ Read more
Securing public AWS Application Load Balancer (ALB) with OpenID Connect (OIDC)
Member post originally published on the Devtron blog by Badal Kumar and Siddhant Khisty TL;DR: Learn how to secure your AWS Application Load Balancer (ALB) with OpenID Connect (OIDC) to enhance authentication, prevent unauthorized access and ensure… ⌘ Read more
On a Mission From God: Inside the Movement to Redirect Billions of Taxpayer Dollars to Private Religious Schools
Alec MacGillis, Reporter - ProPublica
Stephan: This is the best fact-based report I have seen recently describing how the christofascists are trying to get access to your tax dollars in order to fund their christofascist indoctrination programs and further degrade public education.
Reporting Highl … ⌘ Read more
Use “Type to Siri” on Mac Easier Than Ever in Sequoia
Siri has been considerably improved in recent MacOS versions, mostly because it’s now linked to ChatGPT. One of the other recent changes to Siri in modern MacOS versions is that it’s now easier to access the “Type to Siri” feature, no longer being relegated to an Accessibility setting that has to be enabled separately like … Read More ⌘ Read more
I mean bug where jenny don’t know about these id’s and tried to request from twtxt.net (prologic sent access logs)
Project DIGITS Brings Grace Blackwell AI Capabilities to the Desktop
NVIDIA recently announced Project DIGITS, a personal AI supercomputer designed to make advanced AI capabilities accessible to researchers, developers, and students. This system features the new NVIDIA GB10 Superchip, built on the Grace Blackwell architecture, which provides high-performance computing for tasks such as prototyping, fine-tuning, and running large AI models directly from a desktop environment. … ⌘ Read more
Spitz Plus GL-X2000 is an Upcoming Wi-Fi 6 and 4G LTE CAT 12 Router
The Spitz Plus GL-X2000 is a 4G LTE Wi-Fi 6 router designed to deliver reliable connectivity for remote work, travel, and rural internet access. It supports advanced network features like Multi-WAN, Failover, and Load Balancing, enhancing connection stability and ensuring dependable performance. The router is powered by a Qualcomm dual-core processor running at 1 GHz, […] ⌘ Read more
How in da fuq do you actually make these fucking useless AI bots go way?
proxy-1:~# jq '. | select(.request.remote_ip=="4.227.36.76")' /var/log/caddy/access/mills.io.log | jq -s '. | last' | caddy-log-formatter -
4.227.36.76 - [2025-01-05 04:05:43.971 +0000] "GET /external?aff-QNAXWV=&f=mediaonly&f=noreplies&nick=g1n&uri=https%3A%2F%2Fmy-hero-ultra-impact-codes.linegames.org HTTP/2.0" 0 0
proxy-1:~# date
Sun Jan 5 04:05:49 UTC 2025
😱
I just banned 41 bad user agents from accessing any of my services. 😱
@kat@yarn.girlonthemoon.xyz i also like the separation inherent with using dedicated devices. like i have a DAP, a fiio X1 ii from 2019, and it’s still going strong. it’s perfect for on the go music listening and i never have to worry about like going somewhere with no reception and the music drops out. it’s all local AND the battery lasts longer because i’m not using wi-fi or bluetooth or data. also i can directly access the file system and just add files anytime. this goes for my point & shoot and other devices too. i love this shit i’m such a nerd
Binge Watch Apple TV+ This Weekend for Free
If you’d like to start the new year with some binge watching, you can enjoy a free weekend of all-access to Apple TV+ films and shows starting on January 3 and continuing through January 5. The free weekend is available on any device where you can stream Apple TV+, all you will need is an … Read More ⌘ Read more
Once again I glimpsed at my twtxt feed access log. Now I’m wondering: is there a twtxt client named xt out there? Does anyone know? I did not find anything for “xt/0.0.1”.
** The social is predicated on its exclusions **
I’ve been sitting on this post for like 8 months. I’ve written it and rewritten it at least a dozen times. I hsve two or three notes documents worth of research. It has never felt right, though. It still doesn’t. I figured an rss-only debut for it would be fine, and maybe one day I’ll bring it to a normy kinda post.
At my job I try to make big public digital services accessible. Because of this I think a lot about disability, and how some portion of disability is socially c … ⌘ Read more