Tootfinder

Opt-in global Mastodon full text search. Join the index!

@jevinskie@mastodon.social
2025-05-07 17:39:05

I found this today when messing around with lifting-bits/sleigh build options and got a build error. Very interesting! Dynamic p-code shenanigans!
“TLDR: there is a (undocumented and disabled by default) feature in the Ghidra decompiler that lets you create your own decompiler passes, using a custom DSL. I leverage it to write a deobfuscation rule for a simple obfuscation technique.”
Thanks you @…

@detondev@social.linux.pizza
2025-07-06 12:30:55

lowkey wish i had an eye in my hand. but with better (on-by-default) natural cover than eyelids. it'd be an absolute bitch to keep safe the way it's always depicted in art

Cloudflare will now block AI crawlers by default
The internet architecture provider will also let some publishers make known AI scrapers pay to crawl their sites
theverge.com/news/695501/cloud

@arXiv_csDC_bot@mastoxiv.page
2025-06-06 07:17:49

Energy-Optimized Scheduling for AIoT Workloads Using TOPSIS
Preethika Pradeep, Eyhab Al-Masri
arxiv.org/abs/2506.04902

@Techmeme@techhub.social
2025-06-03 22:15:52

OpenAI updates its coding agent Codex with internet access, turned off by default, and expands availability to ChatGPT Plus users (Simon Willison/Simon Willison's Weblog)
simonwillison.net/2025/Jun/3/c

@gadgetboy@gadgetboy.social
2025-07-02 11:49:35

👀
theverge.com/news/695501/cloud

@penguin42@mastodon.org.uk
2025-06-05 17:32:46

My JS Krups is resisting netbooting. I see it doing a DHCP discover, and I see Kea responding with an offer, but then it just sends another Discover. Hmph. I can get to the serial console and doing boot net from there doesn't help; none of the keyboard shortcuts for network diag etc seem to work (except the one that displays the help for it...). So I took the flash SIM out and now it boots to Net rather than flash by default; alas with the same DHCP behaviour. Time to try isc-dhcp.…

A serial console photo, showing a Javastation openbootprom 'ok' prompt and help and 'show-devs' output.  It's a boring white on black text.
The mainboard of a Javastation Krups, to the left are various connectors, just above middle is a speaker and below that the Microsparc,  to the right are two RAM dimms and a flash SIMM.
A horribly hacky serial setup; between two keyboards sits a serial breakout box, various wires and crock clip leads.  It's working by good luck rather than physics, The lights for RX/TX are green and the next LED is red.
@timbray@cosocial.ca
2025-07-01 18:42:29

wired.com/story/cloudflare-blo

@wfryer@mastodon.cloud
2025-05-31 00:58:24

🚨 Encryption isn’t optional anymore. In EdTechSR Episode 342: Jason & I discuss why the FBI wants you on Signal, Google’s antitrust headaches, and AI tools that’ll blow your mind.
🎙️ edtechsr.com/2025/05/30/edtech

An image featuring the phrase "ENCRYPTED BY DEFAULT" prominently displayed. Surrounding elements include icons representing global connectivity, Wi-Fi, a smartphone, chat bubbles, a padlock, and documents, all set against a blue background.
@arXiv_csCR_bot@mastoxiv.page
2025-06-04 07:20:57

Asymmetry by Design: Boosting Cyber Defenders with Differential Access to AI
Shaun Ee, Chris Covino, Cara Labrador, Christina Krawec, Jam Kraprayoon, Joe O'Brien
arxiv.org/abs/2506.02035

@jorgecandeias@mastodon.social
2025-06-05 18:23:06

Oh, I see now how quote posting is going to be processed around here...
Not a bad system at all, although I do have my doubts it'll work well when the quoted posts are coming from networks where this kind of approval is tacitly given by default, such as Bluesky, like in this case.
#Mastodon #QuotePosting

A screen capture of a bridged Bluesky post, quoting someone else, and featuring the novel Mastodon implementation of this feature, with the quotes and "This post is pending approval from the original author".
@noellabo@fedibird.com
2025-06-03 22:56:14

@… Sorry, I overlooked the mention.
I forked the Crystal-lang relay that was once maintained on Mastodon, and added the ability to set conditions for the Activity to be relayed. By default, it only relays Notes with a ha…

@abstractsun@social.linux.pizza
2025-06-08 05:34:31

I recently discovered a cool #firefox add-on called Auto Tab Discard.
It automatically unloads tabs after a certain period of time by default. Discard time is configurable, and you can also choose to discard only certain websites under certain conditions. You can also manually select tabs to keep or discard.
I started searching for a plugin for this because I had a lot of tabs ope…

@lil5@social.linux.pizza
2025-06-02 07:34:26

Turns out #synology 's home folders are set to chmod 777 by default!
blog.aaronlenoir.com/2018/05/0

@juandesant@astrodon.social
2025-06-04 00:36:12

Public Service Announcement: If you've worked in the UK, and you've changed the UK number that you use for accessing Gov.UK services, it is impossible to restore access because the default recovery workflow requires UK-issued photo ids: either a UK passport, or a UK driving license, are mandatory, even if you never had one or provided one in the first place.
Happily enough, as long as you keep your National Insurance Number, you can create a new Gateway ID, but this time follow…

@samir@functional.computer
2025-07-03 12:35:55

@… @… TIL about `expect(1)` which seems to be able to do all this too, and has one cool advantage which is that it ships by default.

@mgorny@social.treehouse.systems
2025-06-29 16:44:37

So #Gentoo #Python eclasses are pretty modern, in the sense that they tend to follow the best practices and standards, and eventually deal with deprecations. Nevertheless, they have a long history and carry quite some historical burden, particularly regarding to naming.
The key point is that the eclasses were conceived as a replacement for the old eclasses: "distutils" and "python". Hence, much like we revision ebuilds, I've named the matching eclasses "distutils-r1" and "python-r1". For consistency, I've also used the "-r1" suffix for the remaining eclasses introduced at the time: "python-any-r1", "python-single-r1" and "python-utils-r1" — even though there were never "r0"s.
It didn't take long to realize my first mistake. I've made the multi-impl eclass effectively the "main" eclass, probably largely inspired by the previous Gentoo recommendations. However, in the end I've found out that for the most use cases (i.e. where "distutils-r1" is not involved), there is no real need for multi-impl, and it makes things much harder. So if I were naming them today, I would have named it "python-multi", to indicate the specific use case — and either avoid designating a default at all, or made "python-single" the default.
What aged even worse is the "distutils-r1" eclass. Admittedly, back when it was conceived, distutils was still largely a thing — and there were people (like me) who avoided unnecessary dependency on setuptools. Of course, nowadays it has been entirely devoured by setuptools, and with #PEP517 even "setuptools" wouldn't be a good name anymore. Nowadays, people are getting confused why they are supposed to use "distutils-r1" for, say, Hatchling.
Admittedly, this is something I could have done differently — PEP517 support was a major migration, and involved an explicit switch. Instead of adding DISTUTILS_USE_PEP517 (what a self-contradictory name) variable, I could have forked the eclass. Why didn't I do that? Because there used to be a lot of code shared between the two paths. Of course, over time they diverged more, and eventually I've dropped the legacy support — but the opportunity to rename was lost.
In fact, as a semi-related fact, I've recognized another design problem with the eclass earlier — I should have gone for two eclasses rather than one: a "python-phase" eclass with generic sub-phase support, and a "distutils" (or later "python-pep517") implementing default sub-phases for the common backends. And again, this is precisely how I could have solved the code reuse problem when I introduced PEP517 support.
But then, I didn't anticipate how the eclasses would end up looking like in the end — and I can't really predict what new challenges the Python ecosystem is going to bring us. And I think it's too late to rename or split stuff — too much busywork on everyone.

@aredridel@kolektiva.social
2025-05-02 17:49:15

Watch Github for what happens for companies that go all-in on AI.
Notice all the details that are wrong now. Notice the docs. Notice the confusion between different interfaces. Notice the UI jank in new places. This is what happens when engineering decisions are made by default instead of discussion and planning. This is what happens when writing (already easier than editing) becomes even easier without improving editing.

@Duckbill4994@social.linux.pizza
2025-06-04 05:47:06

Goodmorning! Today I will be working with #kasten backup and creating some #kanister #blueprints
*

@arXiv_csSE_bot@mastoxiv.page
2025-07-02 09:50:50

Snaps: Bloated and Outdated?
Jukka Ruohonen, Qusai Ramadan
arxiv.org/abs/2507.00786 arxiv.org/pdf/2507.00786

@nohillside@smnn.ch
2025-05-20 11:01:32

So, EU users get the more open iOS now than the rest of the world?
Apple Is Working to Permit Other Default Virtual Assistants on iOS, but Only in the E.U. – Pixel Envy pxlnv.com/linklog/ios-default-

@Mediagazer@mstdn.social
2025-07-01 10:20:30

Cloudflare launches Pay per Crawl, a marketplace letting sites charge AI crawlers per crawl; new sites set up with Cloudflare will block AI crawlers by default (Maxwell Zeff/TechCrunch)
techcrunch.com/2025/07/01/clou

@crepererum@mastodon.online
2025-05-04 11:23:58

This week I've learned that "per-connection randomized MAC" – while being great for privacy – can be an issue for login-based WiFi networks. First of all it requires you to login again every time you reconnect, but you may also get issues with let's say hotel WiFis that limit the number of devices on one account 😅
I think this is mostly an issue caused by the captive portal implementation.
CC @…

Screenshot of the Wi-Fi network privacy settings with the 3 options:

1. Use per-connection randomized MAC (default)

2. Use per-network randomized MAC

3. Use device MAC
@Techmeme@techhub.social
2025-06-02 23:30:43

Microsoft announces new Windows changes in response to the DMA for EEA users, including Edge not prompting users to set it as the default unless it is opened (Richard Lawler/The Verge)
theverge.com/news/678350/micro

@ethanwhite@hachyderm.io
2025-04-14 14:47:01

If you look at the organizations standing up for students being targeted by US immigration, the unions are really leading the way. A huge thanks to the AAUP for it's leadership in this:
aaup.org/sites/default/files/2
aaup.org/sites/default/files/F

@kosi2801@graz.social
2025-05-31 20:48:41

"...'Without press, we by default have to assume that our government relaying information to us, is true,' Cuccia wrote, calling that attitude 'the antithesis of what we believe in.'..."
She's just soooo close to finally get it... 🤞
It is surprising, but some Magas really seem to have a small sense of ethics and really want to advance the country and not the cult (although the exact arguments/means are still disputable).
🤔

@grifferz@social.bitfolk.com
2025-05-29 23:41:26

Rather surprised to see the performance scaling of nftables is so bad compared to iptables, especially as many distros switched to nftables by default some time ago.
I do understand that synthetic benchmarks of firewalls are difficult, and that you are supposed to use the advanced features of nftables (e.g. sets, maps) to express the same filter in fewer rules.

@jtk@infosec.exchange
2025-06-16 13:36:14

I don't recall seeing much measurement research on mobile carrier identification from client traffic. Didn't find much in a cursory search.
Does this exist? Is it feasible, particularly with branded devices like this?
Can classification be done by address pools unique, IDs, MACs, user agent strings, default start-up apps, default DNS queries/settings, etc.?
Clue, ideas, and pointers wanted.

@Techmeme@techhub.social
2025-07-01 10:20:45

Cloudflare launches Pay per Crawl, a marketplace letting sites charge AI crawlers per crawl; new sites set up with Cloudflare will block AI crawlers by default (Maxwell Zeff/TechCrunch)
techcrunch.com/2025/07/01/clou

@blaise@mastodon.cloud
2025-05-29 21:38:06

Did the Trump regime really just say that judges who try to stop the executive from abusing their authority are actually the ones abusing their authority?
I suppose the rubber/glue principle is probably the default in a regime run by a man with the mind of a 12 year old...

@tiotasram@kolektiva.social
2025-05-15 17:02:17

The full formula for the probability of "success" is:
p = {
1/(2^(-n 1)) if n is negative, or
1 - (1/(2^(n 1))) if n is zero or positive
}
(Both branches have the same value when n is 0, so the behavior is smooth around the origin.)
How can we tweak this?
First, we can introduce fixed success and/or failure chances unaffected by level, with this formula only taking effect if those don't apply. For example, you could do 10% failure, 80% by formula, and 10% success to keep things from being too sure either way even when levels are very high or low. On the other hand, this flattening makes the benefit of extra advantage levels even less exciting.
Second, we could allow for gradations of success/failure, and treat the coin pools I used to explain that math like dice pools a bit. An in-between could require linearly more success flips to achieve the next higher grade of success at each grade. For example, simple success on a crit role might mean dealing 1.5x damage, but if you succeed on 2 of your flips, you get 9/4 damage, or on 4 flips 27/8, or on 7 flips 81/16. In this world, stacking crit levels might be a viable build, and just giving up on armor would be super dangerous. In the particular case I was using this for just now, I can't easily do gradations of success (that's the reason I turned to probabilities in the first place) but I think I'd favor this approach when feasible.
The main innovation here over simple dice pools is how to handle situations where the number of dice should be negative. I'm almost certain it's not a truly novel innovation though, and some RPG fan can point out which system already does this (please actually do this, I'm an RPG nerd too at heart).
I'll leave this with one more tweak we could do: what if the number 2 in the probability equation were 3, or 2/3? I think this has a similar effect to just scaling all the modifiers a bit, but the algebra escapes me in this moment and I'm a bit lazy. In any case, reducing the base of the probability exponent should let you get a few more gradations near 50%, which is probably a good thing, since the default goes from 25% straight to 50% and then to 75% with no integer stops in between.

@grifferz@social.bitfolk.com
2025-05-29 23:41:26

Rather surprised to see the performance scaling of nftables is so bad compared to iptables, especially as many distros switched to nftables by default some time ago.
I do understand that synthetic benchmarks of firewalls are difficult, and that you are supposed to use the advanced features of nftables (e.g. sets, maps) to express the same filter in fewer rules.

@samir@functional.computer
2025-06-26 14:48:44

@… @… What if you defined a new Fin which used a binary construction for n, rather than the default Nat?
Then dividing by 2 is generally pretty easy.

@fennek@cyberplace.social
2025-05-22 04:42:20

What has ... DRM (?!) ever done for us?
infosec.exchange/@dangoodin/11

@arXiv_nuclth_bot@mastoxiv.page
2025-07-01 09:02:43

Elliptic flow of charged hadrons in d Au collisions at $\sqrt{s_{NN}} =$ 200 GeV using a multi-phase transport model
Jaideep Tanwar, Ishu Aggarwal, Vipul Bairathi, Lokesh Kumar, Sonia Kabana
arxiv.org/abs/2506.22721

@whophd@ioc.exchange
2025-06-20 08:24:52

What can I use to make this? Hopefully easily (as in, the lines all move in a group if I need to reposition), but honestly I don't care if not — I just want it to know about curves and gaps, positioning nicely by default.
#maps #diagram

A cropped screenshot of a diagrammatic road map, tall and narrow.  It has a plain white background with three smaller horizontal roads across the top, middle and bottom, coloured gray except the top one in red.  Down the middle are two "motorway" style roads using parallels pairs of lines, instead of single lines, and they join in a T-junction in the middle, as the bottom one turns off to the right in parallel with middle horizontal road.  The bottom motorway is coloured green and the top one i…
@compfu@mograph.social
2025-06-11 21:31:20

#Linux tip for people running Rocky Linux #VFX workstations (or Alma or RHEL I guess) who are looking for a solution to the system locking up once you're running out of memory: install systemd-oomd - the out of memory killer daemon. It's not enabled by default but I think it is on distributions that…

@arXiv_statAP_bot@mastoxiv.page
2025-06-25 09:20:00

A comparative analysis of machine learning algorithms for predicting probabilities of default
Adrian Iulian Cristescu, Matteo Giordano
arxiv.org/abs/2506.19789

@Techmeme@techhub.social
2025-06-20 04:41:35

In a letter to CEO Aravind Srinivas, the BBC says it has evidence Perplexity's default model used its content and seeks "a proposal for financial compensation" (Financial Times)
ft.com/content/b743d401-dc5d-4

@arXiv_mathAG_bot@mastoxiv.page
2025-06-09 08:20:52

The SagbiHomotopy.jl package for solving polynomial systems
Barbara Betti, Viktoriia Borovik
arxiv.org/abs/2506.06264

@arXiv_csCR_bot@mastoxiv.page
2025-06-19 08:14:23

deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses
Georgios Androutsopoulos, Antonio Bianchi
arxiv.org/abs/2506.15648

@arXiv_qfinMF_bot@mastoxiv.page
2025-05-21 10:04:58

This arxiv.org/abs/2505.13185 has been replaced.
initial toot: mastoxiv.page/@arXiv_qfi…

@arXiv_qfinMF_bot@mastoxiv.page
2025-05-20 07:47:18

Filtering in a hazard rate change-point model with financial and life-insurance applications
Matteo Buttarazzi, Claudia Ceci
arxiv.org/abs/2505.13185

@mgorny@social.treehouse.systems
2025-06-23 19:52:19

In other news, I've sent a few fun patches to improve epytest in #Gentoo.
This includes forcing short summaries, creating junit .xml for machine processing, and most importantly, EPYTEST_PLUGINS to handle specifying the plugins to load. The goal is to eventually move away from plugin autoloading by default.
#PyTest #Python