Sam' 🐧

@HorlogeSkynet
198 Followers
484 Following
3.4K Posts

🇫🇷 🇬🇧

🧔

#sysadmin #dev #FOSS
#infosec #privacy #decentralization

#Debian #Android
#PC #gaming

[Opinions are my own AND just because I share something doesn't mean I necessarily fully-agree with it]

✍️ Bloghttps://samuel.forestier.app/about/
🏗️ GitHubhttps://github.com/HorlogeSkynet
🏠 GitHomehttps://git.forestier.app/HorlogeSkynet

I've had several people ask me why we use C instead of Rust or other languages at wolfSSL. One of my colleagues wrote an explanation:

https://www.wolfssl.com/why-c-remains-the-gold-standard-for-cryptographic-software/

Why C Remains the Gold Standard for Cryptographic Software - wolfSSL

For production cryptographic software, memory safety alone does not define security. Real-world crypto must run on every platform, maintain stable assumptions

wolfSSL

FBI Extracts Deleted Signal Messages from iPhone Notification Database

404 Media reports (alternate site):
The FBI was able to forensic... https://www.schneier.com/blog/archives/2026/04/fbi-extracts-deleted-signal-messages-from-iphone-notification-database.html

#Uncategorized #databases #terrorism #iPhone #FBI

FBI Extracts Deleted Signal Messages from iPhone Notification Database - Schneier on Security

404 Media reports (alternate site): The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database…. The news shows how forensic extraction—­when someone has physical access to a device and is able to run specialized software on it—­can yield sensitive data derived from secure messaging apps in unexpected places. Signal already has a setting that blocks message content from displaying in push notifications; the case highlights why such a feature might be important for some users to turn on...

Schneier on Security
Side note, if you want to see how common of a pattern this is, and I can't believe I didn't think of this earlier, go search Github.com for 'deleteduser.com', lots of examples of delete functions from apps there that do this type of thing.

(🇫🇷) La France est entrée en guerre contre l'Iran pour le compte des dictatures du Golfe https://elucid.media/democratie/la-france-est-entree-en-guerre-contre-l-iran-pour-le-compte-des-dictatures-du-golfe

@elucid_media #Élucid

La France est entrée en guerre contre l'Iran pour le compte des dictatures du Golfe

Accords secrets, intérêts industriels, alliances douteuses : comment la France s’est retrouvée en guerre contre l’Iran...

Élucid

Brutal.

When Microsoft acquired GitHub.

Every bank is like “we’re more than just a bank” and all anyone wants is for them to shut the fuck up and be a bank

Google has news on what you will need to do for still being able to sideload apps:

* enable developer options
* confirm that you are not tricked
* restart phone and re-authenticate
* wait one day
* confirm with biometrics that you know what you are doing
* decide if you only want unrestricted installs for 1 week or forever
* confirm that you accept the risks
* enjoy the few apps that still have developers motivated to develop for a user-base willing to put up with this

https://goo.gle/advance-flow

Before becoming a politician, one should complete a mandatory 1.5 years of social service, divided into three-month periods:

— in nursing care
— in a daycare center
— in a school
— in a medium-sized company
— in retail
— on a farm

All unpaid and voluntary, of course.

"human.json is a protocol for humans to assert authorship of their site content and vouch for the humanity of others. It uses URL ownership as identity, and trust propagates through a crawlable web of vouches between sites." I've added it to my website! https://codeberg.org/robida/human.json
human.json

A lightweight protocol for humans to assert authorship of their website content and vouch for the humanity of others.

Codeberg.org