Cerebrate

@cerebrate
4 Followers
56 Following
119 Posts
Science fiction writer. Entrepreneur. Speaker to minerals. Consensualist. Illeist (pronouns: none). Pony and kanmusu stan. Can call spirits from the vasty deep!
The Associated Worldshttps://eldraeverse.com/
Random Byteshttps://randombytes.substack.com/
So. Moving this account over to my new and should-be-working-this-time personal instance at @cerebrate . See you on the flip side.

I suppose it was inevitable that the first result of the great exodus of #twitter users onto #mastodon would be the discourse filling up with conversations about implementing a strong content moderation/social control infrastructure.

But it's still depressing.

Concept: A fanfic about gay raccoons called "Slash Pandas".

So, I know lots of people are wary of self promoting #OnHere, but one of the best things about the bird was finding out what everyone was doing.

Selfishly, I *desperately* want to read your papers and blog posts and add books to my TBR piles and find out when you're at a conference or on the radio or launching a pilot or whatever it is you do. Please keep sharing that - with a CW if necessary and plenty of hashtags to make it discoverable.

Why do we say "phoenix" when we could say "Molotov Cockatiel"?
(Not) Eldraeic Word of the Day: Oolkor Voäin

oolkor voäin: A gutterspeak corruption of the Low Eldraeic, and Trade, phrase ulquor vohaïnár, literally “no brawl (is present herenow)”. (From ulquor, zero degree quantifier + vo, seco…

The Associated Worlds

Tailscale has recently been notified of security vulnerabilities in the Tailscale Windows client which allow a malicious website visited by a device running Tailscale to change the Tailscale daemon configuration and access information in the Tailscale local and peer APIs.

To patch these vulnerabilities, upgrade Tailscale on your Windows machines to Tailscale v1.32.3 or later, or v1.33.257 or later (unstable).

https://tailscale.com/blog/windows-security-vulnerabilities/

Action required: Upgrade Windows clients to v1.32.3

Tailscale has recently been notified of security vulnerabilities in the Tailscale Windows client which allow a malicious website visited by a device running Tailscale to change the Tailscale daemon configuration and access information in the Tailscale local and peer APIs.

Tailscale

Seeing a lot of folks developing a case of the vapors at the prospect that some instance admin somewhere may read their DMs.

Y'all do realize that every platform, by necessity, has your DMs on disk _somewhere_, and the potential for someone unprofessionally nosy to be admining things?

If you're going to trust _any_ platform with something private, you should be encrypting it yourself before it leaves your machine.

Lil something from @emilyposting and (my team member, so proud ❤️​) @jamie wherein they straight up gangsta dns-rebind-bugchain _remote code exec_ in @tailscale

https://emily.id.au/tailscale

CVE-2022-41924 - RCE in Tailscale, DNS Rebinding, and You

TL;DR Recommendations

God's kingdom is a Kerberos realm and none of you have the correct system time.