Samantaz Fox

115 Followers
99 Following
2K Posts

Young Vixen-Panther hybrid, who loves computer stuff and electronics.
Proud #Furry๐ŸฆŠ and #Lesbian ๐Ÿณ๏ธโ€๐ŸŒˆ.
May rant now and then.

My invidious commits are PGP-signed with this key:
A203 12E5 44F7 B9CC 5792 2D40 F428 2105 9186 176E

Previous key was:
6E2D 9DE7 A584 E411 5253 47AD 3DF5 6D7D 1CD8 02E1

PronounsShe/Her (EN) | Elle (FR)
LanguagesFR ๐Ÿ‡ซ๐Ÿ‡ท / EN ๐Ÿ‡ฌ๐Ÿ‡ง
Location1 AU from the Sun
AgeLegally allowed to drink
Websitehttps://samantaz.fr

The open source vulnerability scanner trivy has experienced a *second* security incident: a compromised release (v0.69.4) was published to the trivy repository.

https://www.stepsecurity.io/blog/trivy-compromised-a-second-time---malicious-v0-69-4-release

Trivy Compromised a Second Time - Malicious v0.69.4 Release, aquasecurity/setup-trivy, aquasecurity/trivy-action GitHub Actions Compromised - StepSecurity

On March 19, 2026, trivy โ€” a widely used open source vulnerability scanner maintained by Aqua Security โ€” experienced a second security incident. Three weeks after the hackerbot-claw incident on February 28 that resulted in a repository takeover, a new compromised release (v0.69.4) was published to the trivy repository. The original incident disclosure discussion (#10265) was also deleted during this period, and version tags on the aquasecurity/setup-trivy GitHub Action were removed. Trivy maintainers deleted the v0.69.4 tag and Homebrew downgraded to v0.69.3. The following is a factual account of what we observed through public GitHub data.

Most people think Bluetooth works at about 10 meters.But researchers have already demonstrated Bluetooth attacks ๐—ณ๐—ฟ๐—ผ๐—บ ๐—บ๐—ผ๐—ฟ๐—ฒ ๐˜๐—ต๐—ฎ๐—ป ๐—ฎ ๐—บ๐—ถ๐—น๐—ฒ ๐—ฎ๐˜„๐—ฎ๐˜† using directional antennas and external power amplifiers.

Now a company called Hubble Network has demonstrated Bluetooth connectivity ๐—ฎ๐—น๐—น ๐˜๐—ต๐—ฒ ๐˜„๐—ฎ๐˜† ๐˜๐—ผ ๐˜€๐—ฎ๐˜๐—ฒ๐—น๐—น๐—ถ๐˜๐—ฒ๐˜€ using space-based phased-array receivers. And theyโ€™re building and launching the constellation.

https://novelbits.io/hubble-network-nrf54l15-tutorial/?utm_source=novelbits&utm_medium=email&utm_campaign=no-cellular-no-lora-just-bluetooth-le-to-the-cloud

#bluetooth #lorawan #space #sattelite

Integrate Hubble Network on your nRF54L15 for Global Connectivity

Connect your Bluetooth LE devices to Hubble Network's global IoT infrastructureโ€”90M+ smartphone gateways and satellite connectivityโ€”using Nordic's nRF54L15 reference app.

Novel Bits
Making an account on something today when I came across a novel to me password restriction

This Afroman trial is giving me life.

Cops raided Afroman's house for no reason. They pointed guns at him and his kids, ransacked his house, and tried to disconnect his home security cameras. They didn't disconnect them all, and so were allegedly caught on camera stealing his money.

He then made a series of music videos using footage from his security camerasz and body cam footage. Now the cops are suing him for making the videos. The ACLU is defending him.

https://m.youtube.com/shorts/2m8NpGplUOM

Lawyer Asks Afroman If Heโ€™ll Stop Talking About Cops Who Raided Home

YouTube

This week the European Commission published the draft for a guidance document for the Cyber Resilience Act (CRA). It is 70 pages, but contains some helpful examples and flowcharts, like this one, making it accessible even to Open Source folks with limited time.

Here: Quick guidance for the question if your FOSS component is in scope for the CRA, and if so, wether you're deemed a steward or manufacturer in regards of the component.

#opensource #cra

I saw southern auroras last night!!!! Rakiura! Holy cow that was AMAZING

(View from a bit south of Arthur's Pass, New Zealand)

so!! i am excited!!! to have finally finished the complete reimplementation of the #GlasgowInterfaceExplorer memory-25x applet for managing SPI NOR flashes. it is called memory-25q and it took an enormous amount of effort, because i have decided to Build It Properly

want to jump to the docs (there are a lot of docs, including on the fundamentals of (Q)SPI flashes) or read the code? here we go:

now, why did i do that? two reasons. memory-25x is one of the first applets i made, ~7 years ago, and i had no idea what kind of UI i should be building (yet). to make it worse, i thought that SPI NOR flashes were "easy", you could "just send a few bytes and that's basically it".

nothing could be further from truth. first off, SPI NOR flashes don't really existโ€”there is no spec, no standard organization that can say "no, your thing is not compliant", no order to any of this. every vendor does whatever they want, and then every other year JEDEC writes down all of the unhinged shit they did. here is the list of six incompatible methods to turn a single bit on or off, as a warmup

second, SPI flashes have an absolutely absurd diversity of framings. you cannot even express it without building a meta-framework for abstracting over all the ways people have come up to squeeze 8 bits into 2 or 4 wires. then on top of it you have to manage a bunch of global state that affects framing in subtle or sometimes really fundamental ways, without having any way to find out that you've made an error besides "you compare the actual data with the expected data (or its checksum) and it is not equal"

anyway, the new applet should be excellent at any daily task and at least okay at >90% of the exotic ones. also it's easily generalized for the (completely incompatible on the wire) QSPI NAND 25N series, octal or DTR variants, etc

applet.memory.25q: new applet by whitequark ยท Pull Request #1130 ยท GlasgowEmbedded/glasgow

This is a complete functional replacement for the memory-25q applet and it obsoletes and deprecates the latter. To do: figure out why 1-2-2 and 1-4-4 modes are broken not broken, just crosstalk ...

GitHub
Lol, speaking of cheese and security issues... I promise this was not intentional at all xD

A quick reminder that you really need to have your fortinet firewalls behind a firewall

https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html?m=1

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.

The Hacker News

The end of the release cycle is really the peak. When a full cycle's worth of work and efforts are combined into a fresh tarball that is sent out into the cold harsh real world with the ideal outcome that everything just keeps on working exactly like before, ideally a little better.

The night before a release we believe this is the best we ever did. Every time we think this. Who knows what we will think tomorrow at this time.

Thanks for flying #curl. It's an adventure and honor to pilot this.