Pinned toot

I'm moving to @brynet! This account will remain. Feel free to follow me on both, or.. you know. If you wanna. :blobpeek:

Hi! I'm Pamela, and I make the "flan" emoji set:

:flan_tea: :flan_royal: :flan_writing: :flan_cheer: :flan_molotov:

I learned inkscape to make them, and it has been amazing watching them spread through the Fediverse!

I adore making the set, and I want to add to it and develop new ones! What I need is some breathing room so I can create, and so I'm launching this patreon.

patreon.com/flan_foundry

If you enjoy my work, I would really appreciate your support! Thanks! :flan_guns:

I'm moving to @brynet! This account will remain. Feel free to follow me on both, or.. you know. If you wanna. :blobpeek:

I'm moving to @brynet! This account will remain. Feel free to follow me on both, or.. you know. If you wanna. :blobpeek:

@mulander @bcallah @devnexen @brynet

#openbsd gamers - #Chasm is a metroidvania indie gem released *today* that runs on OpenBSD with sound and gamepad support - first fully running commercial game of 2018! Steam library needs to be replaced with a stub, but that's all! Then just run #fnaify on it and you're good to go!

store.steampowered.com/app/312

looks like the schedule for #eurofreebsdcon is out Show more

A lengthy report! ☺️

Ingo Schwarze (@schwarze) on sed(1) bugfixing with Martijn van Duren (martijn@) , and about other small userland stuff
undeadly.org/cgi?action=articl

People are insecure about things you wouldn't even imagine. They're afraid you are judging them based on things you haven't even noticed. They secretly believe they're dull or untalented even as you sit in awe of their skills, insight or accomplishments.

Accept them for who they are. Listen to their fears and doubts. Then show them precisely what it is about them that shines so brightly and fiercely that you can't look away.

Just like clockwork, when I am about to call it a night, the TU Graz guys release a new Spectre level: NetSpectre. It is β€œa remote Spectre attack without attacker-controlled code on the victim, and the first Spectre attack which works without the cache as covert channel.”

Paper:
misc0110.net/web/files/netspec

Theo de Raadt on unveil(2) usage in base, a userland diff (approx. 37 programs so far) demonstrating how it will be used, also touching a bit on chrome: marc.info/?l=openbsd-tech&m=15

For people experimenting on -current, robert@ just unveiled his unveil(2) work for chromium on , including a overhaul of the existing pledge(2) support, still a WIP! ☺️marc.info/?l=openbsd-ports-cvs

"Do "Return stack refilling", based on the "Return stack underflow" discussion and its associated appendix at support.google.com/faqs/answer
This should address at least some cases of "" and earlier variants; more commits to follow." marc.info/?l=openbsd-cvs&m=153

This bug highlights a problem with securing containers: the tiniest bit of kernel code can screw it up. All it takes is one infoleak. Have you audited your entire kernel, including modules and binary blobs for information leaks?

Virtualization, whether it be a hypervisor or a container, does not increase security.

Show more
Mastodon

Follow friends and discover new ones. Publish anything you want: links, pictures, text, video. This server is run by the main developers of the Mastodon project. Everyone is welcome as long as you follow our code of conduct!