Show more

My life is swirling sewage-laden toilet bowl right now, but the world needs an article on OpenBSD "breaking embargos."

If other people find the sources, I'll take an hour and hammer them into a post.

Post original mailing list and article links in answer to this toot. Or don't. Whatevs.

I'll credit folks, of course.

My bias on this: there were fubars, like the 8 out of 10 OpenSSL bug. They'll argue against embargos over beer, but if they agree to it they'll keep it.

responsible disclosure 

Wow. Constanze und Frank haben einmal fett draufgehauen. Liest sich weg, sehr gut gemacht, ihr zwei! netzpolitik.org/2018/fuenf-jah

@akpoff I'm losing most of the respect I had for Cantrill. So, he was in the cool kids club, had lots of notice, and claims to have been fighting for the little guy.

"The CVE was absolutely going public; all Theo did was marginally accelerate the timeline, which in turn has resulted in systems not being as prepared as they otherwise could be."

Nice vague term, marginally. Oh, and those prepared systems? Just those of the in crowd like Cantrill.

I've watched Cantrill give more caustic talks.

Slides for Ayaka Koshibe (akoshibe@)'s "Mininet on - Using rdomains for interactive SDN testing and development" talk at 2018: openbsd.org/papers/bsdcan2018-

Must have had a really good time at @bsdcan as I already set up the #BSD #Pizza Night event for this month! calagator.org/events/125047387

As a corporation, Microsoft will out-live all of us. Same for Google and Apple. Free software is an inter-generational effort. We don't know what proprietary software companies will do beyond our lifetimes, so we need to do our best to care for free software in our lifetime. Same goes for a lot of other, similar efforts.

Article 13 of the proposal for a copyright directive is a threat to a Free and Open Internet. Join us in taking action on Tuesday June 12th to ask MEPs not to censor the Internet saveyourinternet.eu

#SaveYourInternet #FixCopyright #CensorshipMachine

Today I was procrastinating ... err, toying around with authenticator and implemented an OATH-compatible login mode for #OpenBSD – RFC 6238 (TOTP) and RFC 4226 (HOTP). github.com/reyk/login_oath/blo

talking about people who were once upset 

Thanks to Kurt Mosiejczuk's console server talk, I learned about upobsd for #OpenBSD upgrades for the brave. In ports.
bitbucket.org/semarie/upobsd

#BSDCan

Important update! Theo de Raadt's Speculation on #Intel talk will be in DMS1160, new streaming link is bsdnow.tv/bsdcan_dms1160 in 10 minutes.

#openbsd #infosec #bsdcan

@phessler Said move of Theo to DMS 1160 is in progress.

Re-launch of the free #openmoko USB Product ID and IEEE OUI (Ethernet MAC address) allocation for OSHW and FOSS projects: laforge.gnumonks.org/blog/2018

Show more
Mastodon

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!