Alonely0 πŸ¦€ πŸ‡ͺπŸ‡Ί

@Alonely0
113 Followers
264 Following
1.8K Posts

Yet another queer & kinda autistic computer nerd. I mainly code in Rustβ„’, and I consider myself a rustacean. Uni student. I joined Mastodon after the Reddit exodus, let's see how it goes (edit: going great!).

Free Palestine, free Ukraine, trans rights are human rights, antifascist, antiracist, former student union leader, etc; woke mind virus all the way down lol. I just believe we can make the world actually better, what a sad thought not to.

Working on a Linux port for the Surface Pro 11.

GitHubhttps://github.com/Alonely0
TimezoneCET/CEST
Pronounshe/they
Contact4lon3ly0@tutanota.com

Judging by how many #itwasdns shirts I've sold this morning...

Is the Cloudflare outage DNS-related too? https://www.redshirtjeff.com/shop/p/it-was-dns-shirt

Rust in Android: move fast and fix things, https://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html.

Another great post from the Android Security team, presenting how Rust is impacting positively the Android code base. Shorter code reviews, fewer bugs, drastically fewer rollbacks… (compared to C/C++)

> The shift to Rust is different: we are significantly improving security and key development efficiency and product stability metrics.

#RustLang #security #android

Rust in Android: move fast and fix things

Posted by Jeff Vander Stoep, Android Last year, we wrote about why a memory safety strategy that focuses on vulnerability prevention in ...

πŸ¦€ I've improved the implementation behind all the string formatting macros in Rust: println!(), panic!(), format!(), write!(), log::info!(), and so on. (That is, everything based on format_args!().) They will compile a bit faster, use a bit less memory while compiling, result in smaller binaries, and produce more efficient code! πŸŽ‰

'Hello world' compiles 3% faster and a few bigger projects like Ripgrep and Cargo compile 1.5% to 2% faster. And those binaries are roughly 2% smaller. 🎊

This change will be available in Rust Nightly tomorrow, and should ship as part of Rust 1.93.0 in January.

#rustlang

Quick reminder on the likely reason why Valve's New Steam Machine only supports #HDMI 2.0:

""At this time an open source HDMI 2.1 implementation is not possible without running afoul of the HDMI Forum requirements.""

This is what Alex Deucher, the maintainer of the amdgpu #kernel driver, said one and a half years ago here:

https://gitlab.freedesktop.org/drm/amd/-/issues/1417#note_2303163

And from the ticket it looks like the problem remains.

See also Alex's earlier comment from early 2021 in the ticket:

https://gitlab.freedesktop.org/drm/amd/-/issues/1417#note_830547

""HDMI 2.1 is not available on #Linux due to the HDMI Forum.""

#LinuxKernel #Valve #SteamMachine

My app, Typesetter, is now available on Flathub! It's a local-first editor for Typst (a markup language combining the simplicity of Markdown with the power of LaTeX), featuring a minimal interface, live preview, and click-to-jump between source and preview. It's still in early development, but I'd love feedback if you try it out.
Flathub: https://flathub.org/apps/details/net.trowell.typesetter
Codeberg: https://codeberg.org/haydn/typesetter
#Typst #GNOME #GTK #Flatpak #Flathub #Rust
Today I found out that google docs infects html exports with spyware, no scripts, but links in your document are replaced with invisible google tracking redirects. I was using their software because a friend wanted me to work with him on a google doc, he is a pretty big fan of their software, but we were both somehow absolutely shocked that they would go that far.
interviewer: how are you with excel
me: i hate it
interviewer: an experienced user then
Seeing Apple people seething and losing their shit over GM and CarPlay feeds some very dark parts of me.

it's such a joy to build software exclusively for yourself

definitely a form of self-care

Security conference talks fall into two categories
* we designed a distributed entropy siphon to perform a black-box hypervisor side channel escape and chain-load a persistent rootkit into the CPU cache
* we looked behind the sofa and found an entire industry of products/services that have made no attempt at security at all and are therefore vulnerable to the most basic issues that we've been finding in everything for the past 30 years, and no-one else had bothered to look.