FAP

@fap
221 Followers
618 Following
785 Posts

Maintainer & Mentor for the Emacs Lisp track @ Exercism | Contributor @ Eclipse

Ask me for my Focusmate link if you want to co-work with me :)

GitHubhttps://github.com/fapdash
Exercismhttps://exercism.org/profiles/fap
Matrix@fap:matrix.org
Myhttps://pronoun.is/he

#38c3 You missed the #Disklo #Toiletparty #Maskenball ?! The maniacs recorded most of the sets until the card was full...

I present you from #GameBoys with love https://peertube.1312.media/w/m9tbbAJAApBihWtuaxdRzr
#Nanoloop

Shout out to @pornophonique who rocked the lounge and signed my DS

Bobo_PK@38c3_Disklo

PeerTube
Who's at 38c3 and wants to hang out? Will be at Komona and the Lisp assembly, but I'm planning on not staying there all the time, so better reach out if you want to meet up. :)
This is what the iOS contact permission prompt should be

The awesome authors from A Book Apart (RIP 💐) have created a semi-official directory of where you can find their books

https://authors-together.org

Many you can read for free, others you can buy from the authors.

Thanks folks!

Authors Together

A directory of books by the former authors of A Book Apart

Authors Together

Breaking news: the proposal for a #Lisp assembly at #38c3 has been accepted! This is so exciting!

38c3 is the 38th edition of the Chaos Communication Congress, the annual hacker conference happening in Hamburg, Germany from 27th to 30th December. Roughly speaking, a Congress assembly is a space that's made available for a self-organised group, to collaborate, organise workshops, talks, etc. around a specific project or area of interest.

#scheme #emacs #guile #guix #clojure #racket #fennel

0/

Léonie later wrote another post about concerns regarding CSS Speech: https://tink.uk/addressing-concerns-about-css-speech/
Addressing concerns about CSS Speech - Tink - Léonie Watson

Tink - Léonie Watson - On technology, food & life in the digital age

Just found out about CSS Speech and 1. it's great and we definitely need it, but 2. now I can't stop thinking about troll potential.

voice-family: UwU;
voice-stress: strong;
voice-volume: 90db;

https://drafts.csswg.org/css-speech-1/
https://tink.uk/why-we-need-css-speech/

CSS Speech Module Level 1

Vom Halfnarp zum Fahrplan

Vielen Dank allen, die den halfnarp ausgefĂŒllt haben. Dank euch und vieler helfender HĂ€nde der Referentinnenbetreuung und der Content Teams können wir euch heute die erste Version des 38C3-Fahrplans prĂ€sentieren! Das offizielle Programm des 38. Chaos Communication Congress wartet mit 7 Tracks auf, die 140 VortrĂ€ge mit 6625 Minuten Programm beinhalten. Da ist definitv fĂŒr jede:n etwas dabei! Der 38C3 beginnt am 27. Dezember um 10:30 Uhr mit der Opening Ceremony und endet am 30. Dezember um 18:00 Uhr mit “Return to legal constructions”. Diejenigen unter euch, die jetzt hĂ€ndisch nachgezĂ€hlt oder sogar die LĂŒcken im Programm gefunden haben: das ist richtig, denn wir haben einige Überraschungs-Talks, die wir euch erst kurz vor dem 38C3 bekanntgeben können.

CCC Event Blog

> (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

That last sentence of the paragraph, in paranthesis, is referencing tools like flymake and flycheck.

More information and advise on how to mitigate here: https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html

#emacs #elisp #emacslisp #cve

Emacs Arbitrary Code Execution and How to Avoid It

A post by Eshel Yaron with details and advice about a long standing arbitrary code execution vulnerability in Emacs

Unfixed Arbitrary Code Execution in Emacs!

In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

https://nvd.nist.gov/vuln/detail/CVE-2024-53920

#emacs #elisp #emacslisp #cve

NVD - CVE-2024-53920