Hey you-- casual #OpenBSD gamer, go post here. Thanks.
Hi! I'm Pamela, and I make the "flan" emoji set:
I learned inkscape to make them, and it has been amazing watching them spread through the Fediverse!
I adore making the set, and I want to add to it and develop new ones! What I need is some breathing room so I can create, and so I'm launching this patreon.
If you enjoy my work, I would really appreciate your support! Thanks!
#openbsd gamers - #Chasm is a metroidvania indie gem released *today* that runs on OpenBSD with sound and gamepad support - first fully running commercial game of 2018! Steam library needs to be replaced with a stub, but that's all! Then just run #fnaify on it and you're good to go!
looks like the schedule for #eurofreebsdcon is out Show more
Don't waste personal favours again by asking me to please submit because there are so few OpenBSD proposals.
Ingo Schwarze (@schwarze) on sed(1) bugfixing with Martijn van Duren (martijn@) , and about other small userland stuff
People are insecure about things you wouldn't even imagine. They're afraid you are judging them based on things you haven't even noticed. They secretly believe they're dull or untalented even as you sit in awe of their skills, insight or accomplishments.
Accept them for who they are. Listen to their fears and doubts. Then show them precisely what it is about them that shines so brightly and fiercely that you can't look away.
Just like clockwork, when I am about to call it a night, the TU Graz guys release a new Spectre level: NetSpectre. It is “a remote Spectre attack without attacker-controlled code on the victim, and the first Spectre attack which works without the cache as covert channel.”
Kenneth Westerback (krw@) on dhcpd(8) fixes, disklabel(8) refactoring and more: https://undeadly.org/cgi?action=article&sid=20180726184322
Theo de Raadt on unveil(2) usage in #OpenBSD base, a userland diff (approx. 37 programs so far) demonstrating how it will be used, also touching a bit on chrome: https://marc.info/?l=openbsd-tech&m=153262228632102&w=2
Hmm. I might check out #castlerock today. New King series.
For people experimenting on -current, robert@ just unveiled his unveil(2) work for chromium on #OpenBSD, including a overhaul of the existing pledge(2) support, still a WIP! ☺️https://marc.info/?l=openbsd-ports-cvs&m=153250162128188&w=2
"Do "Return stack refilling", based on the "Return stack underflow" discussion and its associated appendix at https://support.google.com/faqs/answer/7625886
This should address at least some cases of "#SpectreRSB" and earlier #Spectre variants; more commits to follow." #OpenBSD https://marc.info/?l=openbsd-cvs&m=153236845523439&w=2
"Once great men lived here... giants... gods... once, but long ago."
Heads-up for #OpenBSD -current IPv6 users: "2018/07/23 - rtadvd(8) removed; replaced by rad(8)" https://www.openbsd.org/faq/current.html#r20180723 @florian
This bug highlights a problem with securing containers: the tiniest bit of kernel code can screw it up. All it takes is one infoleak. Have you audited your entire kernel, including modules and binary blobs for information leaks?
Virtualization, whether it be a hypervisor or a container, does not increase security.
Carlos Cardenas (ccardenas@) on vmm/vmd progress, LACP: https://undeadly.org/cgi?action=article&sid=20180721053002
Claudio Jeker (claudio@) on #OpenBGPD developments: https://undeadly.org/cgi?action=article&sid=20180721053011
AKA brynet@. I like tinkering with #OpenBSD and occasionally other Unix-like systems. In other words, not a MCP. He/Him. 🍕🐈💻🇨🇦
Follow friends and discover new ones. Publish anything you want: links, pictures, text, video. This server is run by the main developers of the Mastodon project. Everyone is welcome as long as you follow our code of conduct!