Redis recently released a security advisory regarding CVE-2025-49844. This critical (CVSS 10.0) use-after-free (UAF) vulnerability in Lua scripting could allow authenticated attackers to execute remote code on older versions of Redis and Valkey with Lua scripting enabled. Developers are urged to upgrade to patched releases as ...
The Europol SIMCARTEL operation shows that fighting crime is essential, but it also raises a warning: in the EU, SIM cards and communications are already under strict surveillance and control. While dismantling criminal networks is a good cause, we must not let it justify the erosion of fundamental privacy and personal freedoms ...
The article says that DeepSeek was easier to unalign to obey the users instruction. It has less refusals and they make that sound like a bad thing. ...
Unreleased Beyoncé music and luxury Apple gear were stolen during the 'Cowboy Carter' tour. Classic blunder: thieves grab MacBooks loaded with Find My trackers, making escapes a digital nightmare. ...
I understand your point, but I would not imply that a backdoor has to be remote. Backdoors are essentially any alternative, often undocumented ways to access or gain privileges on systems. They don't always result from malicious intent either - many backdoors simply "happen" when developers haven't fully considered security implications. For the average user whose device contains such unintentional backdoors, the impact remains the same regardless of how they came to exist. Consider the times when vendors had default BIOS passwords - these created a nightmare for Uni IT staff (and others as well), even though they were not accessible remotely.
Before Trump's return to office was secured, I was chatting online with a friend about Putin's strategy in Ukraine. "Putin is playing the long game," my friend observed, "he realizes he cannot win quickly, but he's patiently waiting for a miracle." ...
The CALEA system, designed in the U.S. for mass surveillance, has become a global threat. Telecom equipment with "back doors" isn't just an American issue—it's a worldwide risk. Trusting the "good guys" is naive; any end with "back doors" can be a target. Encryption is our defense, and we must be careful about what we buy. ...
Do you feel guilty when you read fiction some times? Do you feel like it's a frivolous pursuit? Sometimes, I do, because I'd think to myself "might as well watch a TV show", and I hardly ever watch TV shows because, to me, they're a waste of time. But damn it, some of these novels are so good and I can't stop once I started ...
A strong majority of Americans across the political spectrum sympathize more with Ukraine than Russia in the ongoing war: 62% of respondents express more sympathy with Ukraine than Russia, including 58% of Republicans and 76% of Democrats. At the same time, just 2% of respondents said they sympathized more with Russia in the ...
Finished Moon Over Soho by Ben Aaronovitch. Book 2 of Rivers of London series. Our PC is getting better with the magic, and yet is still very new to this. We get a peek at the bigger magic world. Would be interesting to see how it develops further. ...
Mexico is breaking off diplomatic ties with Ecuador after police broke into the Mexican Embassy in Quito to arrest a former Ecuadorian vice president who has sought political asylum there after being indicted on corruption. ...
How can I easily move repos from Github to a European alternative?
Also which alternative I should use? Is Codeberg good enough?
Redis Critical Remote Code Execution Vulnerability Discovered After 13 Years ( www.infoq.com )
Redis recently released a security advisory regarding CVE-2025-49844. This critical (CVSS 10.0) use-after-free (UAF) vulnerability in Lua scripting could allow authenticated attackers to execute remote code on older versions of Redis and Valkey with Lua scripting enabled. Developers are urged to upgrade to patched releases as ...
SIMCARTEL operation: Europol takes down SIM-Box ring linked to 3,200 scams ( securityaffairs.com )
The Europol SIMCARTEL operation shows that fighting crime is essential, but it also raises a warning: in the EU, SIM cards and communications are already under strict surveillance and control. While dismantling criminal networks is a good cause, we must not let it justify the erosion of fundamental privacy and personal freedoms ...
DeepSeek AI Models Are Unsafe and Unreliable, Finds NIST-Backed Study ( www.techrepublic.com )
The article says that DeepSeek was easier to unalign to obey the users instruction. It has less refusals and they make that sound like a bad thing. ...
AI Is Quietly Rewriting Work—Here’s What You Need to Know ( gradientflow.substack.com )
Good (but scary) overview of state of AI in the og article, some points: ...
The UK is likely to back down from forcing Apple to weaken encryption due to US pressure. ( www.ft.com )
The UK government ordered Apple to create a “back door” into its most secure cloud storage, citing national security and crime prevention. ...
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says ( kyivindependent.com )
State-sponsored hacking is accelerating. Your industry is next. ...
China-linked hackers seen targeting Taiwan's chip industry with increasing attacks ( www.japantimes.co.jp )
Supply chains are the new (old) battleground. ...
Unreleased Beyoncé music stolen during 'Cowboy Carter' tour ( apnews.com )
Unreleased Beyoncé music and luxury Apple gear were stolen during the 'Cowboy Carter' tour. Classic blunder: thieves grab MacBooks loaded with Find My trackers, making escapes a digital nightmare. ...
“Localhost tracking” explained. It could cost Meta 32 billion. ( www.zeropartydata.es )
You think you are paranoid? Think again.
How I Used AI to Create a Working Exploit for CVE-2025-32433 Before Public PoCs Existed ( platformsecurity.com )
AI driven exploits? What is next - ICE on eBay? ...
Gen lay-Z: Why my generation doesn't care about work ( www.standard.co.uk )
Not my generation, but I support the message: ...
29 Undocumented commands found in ESP-32 microcontrollers CVE-2025-27840 ( www.bleepingcomputer.com )
cross-posted from: ...
Putin's Miracle: When the "Craziest Idea Possible" Became Reality ( www.reddit.com )
Before Trump's return to office was secured, I was chatting online with a friend about Putin's strategy in Ukraine. "Putin is playing the long game," my friend observed, "he realizes he cannot win quickly, but he's patiently waiting for a miracle." ...
Apple Pulls Advanced Data Protection From the UK, in Defiance of UK Demand for Global Backdoor ( daringfireball.net )
Nobody seems to notice... nobody seems to care..
Do you have kids? Do you want to have kids? Did you regret having / not having kids?
I am of the age to have kids, some of my friends have them, but I have mixed feelings about it, just wondering about other people's experiences.
Bypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blog ( oddlama.org )
If you left alone in the office and have nothing better to do..
ILA President Daggett on Automation and the Future of Work ( www.youtube.com )
Companies are earning billions while pushing for automation that cuts jobs. ...
Pluralistic: China hacked Verizon, AT&T and Lumen using the FBI’s backdoor (07 Oct 2024) – Pluralistic: Daily links from Cory Doctorow ( pluralistic.net )
The CALEA system, designed in the U.S. for mass surveillance, has become a global threat. Telecom equipment with "back doors" isn't just an American issue—it's a worldwide risk. Trusting the "good guys" is naive; any end with "back doors" can be a target. Encryption is our defense, and we must be careful about what we buy. ...
How Base 3 Computing Beats Binary | Quanta Magazine ( www.quantamagazine.org )
How Base 3 Computing Beats Binary ...
Gibler - How to 10X Your Security ( docs.google.com )
Good slides on how to reduce risks
Threat actors exploit zero days within 5 days, says Google's Mandiant ( www.scworld.com )
Highlights ...
2024 Conference ( www.remoteworkconference.org )
Some interesting research
Artificial Intelligence Is Accelerating Iranian Cyber Operations ( www.lawfaremedia.org )
Highlights ...
Super hero movies should have more scenes of them accidentally maiming people just because of the sheer amount of power they weild.
Nonfiction readers. Do you feel guilty reading fiction?
Do you feel guilty when you read fiction some times? Do you feel like it's a frivolous pursuit? Sometimes, I do, because I'd think to myself "might as well watch a TV show", and I hardly ever watch TV shows because, to me, they're a waste of time. But damn it, some of these novels are so good and I can't stop once I started ...
Most Life on Earth Is Dormant, After Pulling an ‘Emergency Brake’ | Quanta Magazine ( www.quantamagazine.org )
Many microbes and cells are in deep sleep, waiting for the right moment to activate. ...
More Americans want the US to stay the course in Ukraine as long as it takes ( www.brookings.edu )
A strong majority of Americans across the political spectrum sympathize more with Ukraine than Russia in the ongoing war: 62% of respondents express more sympathy with Ukraine than Russia, including 58% of Republicans and 76% of Democrats. At the same time, just 2% of respondents said they sympathized more with Russia in the ...
Doom scrolling - Works in Progress ( worksinprogress.co )
Highlights ...
The Physics of Cold Water May Have Jump-Started Complex Life | Quanta Magazine ( www.quantamagazine.org )
Highlights ...
With ‘Digital Twins,’ The Doctor Will See You Now | Quanta Magazine ( www.quantamagazine.org )
Highlights ...
The S-Matrix Is the Oracle Physicists Turn To in Times of Crisis | Quanta Magazine ( www.quantamagazine.org )
Fascinating, I like this kind of Magick.
What book(s) are you currently reading or listening? August 27
Finished Moon Over Soho by Ben Aaronovitch. Book 2 of Rivers of London series. Our PC is getting better with the magic, and yet is still very new to this. We get a peek at the bigger magic world. Would be interesting to see how it develops further. ...
Across a Continent, Trees Sync Their Fruiting to the Sun | Quanta Magazine ( www.quantamagazine.org )
Highlights ...
Redefining the scientific method: as the use of sophisticated scientific methods that extend our mind ( academic.oup.com )
We can best view the method of science as the use of our sophisticated methodological toolbox ...
Spots, stripes and more: Working out the logic of animal patterns ( knowablemagazine.org )
Interesting findings
Parishioners Report Priest for Saying Jesus Died With Erection ( www.thedailybeast.com )
#420 – Annie Jacobsen: Nuclear War, CIA, KGB, Aliens, Area 51, Roswell & Secrecy ( share.snipd.com )
Notes from the podcast: ...
Biden Signed the TikTok Ban. What's Next for TikTok Users? ( www.eff.org )
Selection of quotes: ...
The strange and turbulent global world of ant geopolitics | Aeon Essays ( aeon.co )
S3 Bucket Encryption Doesn't Work The Way You Think It Works ( blog.plerion.com )
Good overview on how it works and why being compliant does not mean being secure.
GitHub - kevinbentley/Descent3: Descent 3 by Outrage Entertainment ( github.com )
Mexico's president says his country is breaking diplomatic ties with Ecuador after embassy raid ( apnews.com )
Mexico is breaking off diplomatic ties with Ecuador after police broke into the Mexican Embassy in Quito to arrest a former Ecuadorian vice president who has sought political asylum there after being indicted on corruption. ...