Samantaz Fox

115 Followers
99 Following
2K Posts

Young Vixen-Panther hybrid, who loves computer stuff and electronics.
Proud #Furry🦊 and #Lesbian 🏳️‍🌈.
May rant now and then.

My invidious commits are PGP-signed with this key:
A203 12E5 44F7 B9CC 5792 2D40 F428 2105 9186 176E

Previous key was:
6E2D 9DE7 A584 E411 5253 47AD 3DF5 6D7D 1CD8 02E1

PronounsShe/Her (EN) | Elle (FR)
LanguagesFR 🇫🇷 / EN 🇬🇧
Location1 AU from the Sun
AgeLegally allowed to drink
Websitehttps://samantaz.fr

Since the NextCloud Office maintainers have not taken into account the arguments against their decision to use Microsoft OOXML as the default format, I submitted a pull request with code that sets OpenDocument as the default format:
https://github.com/nextcloud/richdocuments/pull/5516
I strongly encourage you to retweet, upvote, and comment on this PR, which will be harder to ignore than a “resolved” issue.

Ping @tdforg @libreoffice @nextcloud

#NextCloud #RichDocuments #OpenDocument #microsoft #FreeSoftware #LibreOffice #sovereign

fix(format): makes OpenDocument the default format by nojhan · Pull Request #5516 · nextcloud/richdocuments

This reverts commit 8b464b6 by setting "od[fp]" instead of "ooxml" as a default. Following several downvotes and arguments against making the Microsoft-controlled format OOXML a...

GitHub
Self-propagating malware poisons open source software and wipes Iran-based machines
Development houses: It's time to check your networks for infections.
https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social
If you have an iPhone, today is a good day to make sure you are running the latest software. https://techcrunch.com/2026/03/23/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones/
Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch

Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.

TechCrunch

The open source vulnerability scanner trivy has experienced a *second* security incident: a compromised release (v0.69.4) was published to the trivy repository.

https://www.stepsecurity.io/blog/trivy-compromised-a-second-time---malicious-v0-69-4-release

Trivy Compromised a Second Time - Malicious v0.69.4 Release, aquasecurity/setup-trivy, aquasecurity/trivy-action GitHub Actions Compromised - StepSecurity

On March 19, 2026, trivy — a widely used open source vulnerability scanner maintained by Aqua Security — experienced a second security incident. Three weeks after the hackerbot-claw incident on February 28 that resulted in a repository takeover, a new compromised release (v0.69.4) was published to the trivy repository. The original incident disclosure discussion (#10265) was also deleted during this period, and version tags on the aquasecurity/setup-trivy GitHub Action were removed. Trivy maintainers deleted the v0.69.4 tag and Homebrew downgraded to v0.69.3. The following is a factual account of what we observed through public GitHub data.

Most people think Bluetooth works at about 10 meters.But researchers have already demonstrated Bluetooth attacks 𝗳𝗿𝗼𝗺 𝗺𝗼𝗿𝗲 𝘁𝗵𝗮𝗻 𝗮 𝗺𝗶𝗹𝗲 𝗮𝘄𝗮𝘆 using directional antennas and external power amplifiers.

Now a company called Hubble Network has demonstrated Bluetooth connectivity 𝗮𝗹𝗹 𝘁𝗵𝗲 𝘄𝗮𝘆 𝘁𝗼 𝘀𝗮𝘁𝗲𝗹𝗹𝗶𝘁𝗲𝘀 using space-based phased-array receivers. And they’re building and launching the constellation.

https://novelbits.io/hubble-network-nrf54l15-tutorial/?utm_source=novelbits&utm_medium=email&utm_campaign=no-cellular-no-lora-just-bluetooth-le-to-the-cloud

#bluetooth #lorawan #space #sattelite

Integrate Hubble Network on your nRF54L15 for Global Connectivity

Connect your Bluetooth LE devices to Hubble Network's global IoT infrastructure—90M+ smartphone gateways and satellite connectivity—using Nordic's nRF54L15 reference app.

Novel Bits
Making an account on something today when I came across a novel to me password restriction

This Afroman trial is giving me life.

Cops raided Afroman's house for no reason. They pointed guns at him and his kids, ransacked his house, and tried to disconnect his home security cameras. They didn't disconnect them all, and so were allegedly caught on camera stealing his money.

He then made a series of music videos using footage from his security camerasz and body cam footage. Now the cops are suing him for making the videos. The ACLU is defending him.

https://m.youtube.com/shorts/2m8NpGplUOM

Lawyer Asks Afroman If He’ll Stop Talking About Cops Who Raided Home

YouTube

This week the European Commission published the draft for a guidance document for the Cyber Resilience Act (CRA). It is 70 pages, but contains some helpful examples and flowcharts, like this one, making it accessible even to Open Source folks with limited time.

Here: Quick guidance for the question if your FOSS component is in scope for the CRA, and if so, wether you're deemed a steward or manufacturer in regards of the component.

#opensource #cra

I saw southern auroras last night!!!! Rakiura! Holy cow that was AMAZING

(View from a bit south of Arthur's Pass, New Zealand)

so!! i am excited!!! to have finally finished the complete reimplementation of the #GlasgowInterfaceExplorer memory-25x applet for managing SPI NOR flashes. it is called memory-25q and it took an enormous amount of effort, because i have decided to Build It Properly

want to jump to the docs (there are a lot of docs, including on the fundamentals of (Q)SPI flashes) or read the code? here we go:

now, why did i do that? two reasons. memory-25x is one of the first applets i made, ~7 years ago, and i had no idea what kind of UI i should be building (yet). to make it worse, i thought that SPI NOR flashes were "easy", you could "just send a few bytes and that's basically it".

nothing could be further from truth. first off, SPI NOR flashes don't really exist—there is no spec, no standard organization that can say "no, your thing is not compliant", no order to any of this. every vendor does whatever they want, and then every other year JEDEC writes down all of the unhinged shit they did. here is the list of six incompatible methods to turn a single bit on or off, as a warmup

second, SPI flashes have an absolutely absurd diversity of framings. you cannot even express it without building a meta-framework for abstracting over all the ways people have come up to squeeze 8 bits into 2 or 4 wires. then on top of it you have to manage a bunch of global state that affects framing in subtle or sometimes really fundamental ways, without having any way to find out that you've made an error besides "you compare the actual data with the expected data (or its checksum) and it is not equal"

anyway, the new applet should be excellent at any daily task and at least okay at >90% of the exotic ones. also it's easily generalized for the (completely incompatible on the wire) QSPI NAND 25N series, octal or DTR variants, etc

applet.memory.25q: new applet by whitequark · Pull Request #1130 · GlasgowEmbedded/glasgow

This is a complete functional replacement for the memory-25q applet and it obsoletes and deprecates the latter. To do: figure out why 1-2-2 and 1-4-4 modes are broken not broken, just crosstalk ...

GitHub