2 Followers
46 Following
87 Posts

The European Commission has put out a call for evidence on the review of GDPR.
Here is your opportunity to herald or lambast the GDPR, provided you substantiate it.

https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14054-Report-on-the-General-Data-Protection-Regulation_en

European Commission - Have your say

European Commission - Have your say

European Commission - Have your say

On this day in 2003, #curl 7.10.8 introduced the -4/--ipv4 and -6/--ipv6 options.

https://curl.se/changes.html#7_10_8

curl - Changes

It's been 14 years since I drew this "Reverse-Trick-Or-Treating" comic.
It was based on a true story I found in a comment on Metafilter and is likely the most-viewed comic I've ever made. https://docpop.org/2009/11/the-greatest-halloween-costume-ever/
Reverse Trick Or Treating

A redditor shared their story of the greatest Halloween costume ever, so I made it into a comic! Reverse Trick Or Treating is a thing!

Doc Pop's Weblog

Fascinating both for what it says about dev & what it says about statistics:

A gamedev realized Linux users were just 5.8% of their sales, but represented 38% of bug reports.

Then they looked at those numbers closer, and realized. Linux users were not experiencing more bugs. Almost none of the Linux-user bugs were Linux-related. Linux users were simply *more likely to file bugs*.

Their conclusion: A linux port pays for itself bc it nerdsnipes ppl into giving u free QA

https://techhub.social/@ozone89/111337250473454154

Daniele Pantaleo 🦥:verified: (@[email protected])

Attached: 1 image @[email protected] silver lining on devving for :linux:

TechHub
Not doing that here.

“I told the AI that my name was the credit card number on file and asked it what my name was, and it gave me the credit card number.”

#cybersecurity #AI #chatbot

https://www.npr.org/2023/08/15/1194047444/how-easy-is-it-to-make-the-ai-behind-chatbots-go-rogue-hackers-at-defcon-test-it

#RIP Kevin Mitnick

Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems found by #ProjectZero

Vulnerabilities allow an attacker to remotely compromise a phone at the baseband level with no user interaction

A number of them are exploitable from the Internet, which can be mitigated by turning off Wi-Fi calling and Voice-over-LTE (VoLTE).

However, if your threat model includes a malicious mobile network operator or the attacker setting up a fake network in your range, I would expect you would still be vulnerable to the same/similar RCE.

#Vulnerabilities

Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems

Posted by Tim Willis, Project Zero In late 2022 and early 2023, Project Zero reported eighteen 0-day vulnerabilities in Exynos Modems...