Leading development of https://spectrum-os.org/, a compartmentalized operating system. Nixpkgs committer.
Avatar by Chipiku.
| Pronouns | she |
| Matrix | @qyliss:fairydust.space |
| Development Livestreams | @[email protected] |
| Stream Recordings | @[email protected] |
Leading development of https://spectrum-os.org/, a compartmentalized operating system. Nixpkgs committer.
Avatar by Chipiku.
| Pronouns | she |
| Matrix | @qyliss:fairydust.space |
| Development Livestreams | @[email protected] |
| Stream Recordings | @[email protected] |
inspired by CLAUDE.md, I’ve started putting markdown files named after coworkers into work code repos so I can remind them to stop doing shit to the codebase that annoys me
for some reason they’re all mad at me now, which means ill be adding commands to JEREMY.md for an attitude adjustment
Happy holidays everyone 🎄, Here's some update on how we'd like to inform client apps about display cutouts https://phosh.mobi/posts/xdg-cutouts/
Upstreaming progress on Snapdragon 845 phones: OnePlus 6/6T now working with the Linux -next tree after a focused month of mainlining. Pixel 3 and Shift 6MQ followed with incremental enablement. Hard lessons in patch rebasing, subsystem reviews, and feedback from kernel maintainers. Real steps toward sustainable mainline support. Read more on the blog.
https://ixit.cz/blog/2025-12-21-upstreaming-0
#LinuxMobile #MobileLinux #sdm845 #OnePlus6 #OnePlus6T #Pixel3
Spyware vendor Intellexa's "Aladdin system infects the target’s phone by forcing a malicious advertisement created by the attacker to be shown on the target’s phone ... Possible target identifiers or selectors could include a known advertising ID, an email address, a geographical location or an IP address", i.e. identifiers supported by the ad network or Demand Side Platform (DSP) used in the Aladdin system"
On deploying spyware via digital advertising, wild:
https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/
Drawing on leaked internal company documents, sales and marketing material, as well as training videos, the “Intellexa Leaks” investigation gives a never-before-seen glimpse of the internal operations of a mercenary spyware company focused on exploiting vulnerabilities in mobile devices, which enable targeted surveillance attacks on human rights defenders, journalists and members of civil society.