| The Associated Worlds | https://eldraeverse.com/ |
| Random Bytes | https://randombytes.substack.com/ |
| The Associated Worlds | https://eldraeverse.com/ |
| Random Bytes | https://randombytes.substack.com/ |
So, I know lots of people are wary of self promoting #OnHere, but one of the best things about the bird was finding out what everyone was doing.
Selfishly, I *desperately* want to read your papers and blog posts and add books to my TBR piles and find out when you're at a conference or on the radio or launching a pilot or whatever it is you do. Please keep sharing that - with a CW if necessary and plenty of hashtags to make it discoverable.
https://eldraeverse.com/2022/11/21/not-eldraeic-word-of-the-day-oolkor-voain/
What did they do to our language?
Tailscale has recently been notified of security vulnerabilities in the Tailscale Windows client which allow a malicious website visited by a device running Tailscale to change the Tailscale daemon configuration and access information in the Tailscale local and peer APIs.
To patch these vulnerabilities, upgrade Tailscale on your Windows machines to Tailscale v1.32.3 or later, or v1.33.257 or later (unstable).
https://tailscale.com/blog/windows-security-vulnerabilities/
Tailscale has recently been notified of security vulnerabilities in the Tailscale Windows client which allow a malicious website visited by a device running Tailscale to change the Tailscale daemon configuration and access information in the Tailscale local and peer APIs.
Seeing a lot of folks developing a case of the vapors at the prospect that some instance admin somewhere may read their DMs.
Y'all do realize that every platform, by necessity, has your DMs on disk _somewhere_, and the potential for someone unprofessionally nosy to be admining things?
If you're going to trust _any_ platform with something private, you should be encrypting it yourself before it leaves your machine.
Lil something from @emilyposting and (my team member, so proud ❤️) @jamie wherein they straight up gangsta dns-rebind-bugchain _remote code exec_ in @tailscale