The latest XKCD really hits on the reason I dislike the shift towards extreme dependency usage.


Podcast wars! NYT and Spotify prohibiting Luminary from using the open RSS feeds for The Daily and Reply All is...something else. Big story here:

Are people really so attached to the OSI Model that even suggesting alternative teaching models is offensive?

Any OSI evangelists on the who can shed some light on why OSI is better than any alternative way of teaching protocol layers?

It really would be awesome if the community was able to put together an open index.


Celebrating a day early by coming together as a community to recirculate and care for materials that already exist - swapping, mending & making over here at 192 Spadina ave until 3pm.

Stop by & !

This is really neat:

"Our mission is to collect, preserve, and share the source code of all software that is publicly available, including its full development history."


CircuitPython on GameBoy by NOW YOU'RE PLAYING WITH PYTHON !


At hacking conference and just learned how easy it is to physically gain admin access on a voting machine that is used in 18 states. Requires no tools and takes under 2 minutes. I’m concerned for our upcoming elections.

Mozilla WebThings is an open platform for monitoring and controlling devices over the web —


OK, we'll probably regret this but we made a *searchable* PDF of the available at Please share.


The Report on the Investigation into Russian Interference in the 2016 Presidential Election, by Special Counsel Robert S. Mueller, III, et. al, is now available in redacted form on the Internet Archive. Our interface lets you read it online and search it.


SCOOP: Facebook harvested 1.5 million people’s email contacts without their consent. It says it “unintentionally uploaded” them after asking users for their email passwords.


Initially, defenders have the overwhelming task of defending all vectors of attack, while attackers just need to exploit one vulnerability.

But once that perimeter is breached, the roles reverse.

Attackers need to execute each step perfectly, lest they trigger a single alert.


You ever misspell commands so often that you just alias the misspelling?


The legend started here ... my badge from E3, 2004. “My name is Reggie ...”

Jason Scott just dumped the ZIL source code for every infocom game on github. Clone it before Activision's lawyers wake up. And now we see how long it takes for the internet to produce a compiler for a language that's been dead for 30+ years from a cache of production grade source code for said language. We've had compiled z-machine files, but never the original ZIL.


🤔👍🏻 Let's see how many Amiga owners are really on twitter (past and present). Please comment and retweet if you are one.


This weekend, used a bogus copyright notice to take down our tweet about THEIR bogus copyright notice to, who had the audacity to report on leaked episodes of TV shows.

Say it with us: It's Not Infringement To Report On Infringement.

Did you know? Succulents are often used by DB (deutsche Bahn) travelers as lucky charms to prevent train delays.

It's annoying that "hyperbolic" can refer either to hyperbole or hylerbola.

What if I'm exaggerating about a curve!?


Show more

Social.Rights.Ninja is a small Mastodon instance for those looking for a quiet home-base from which to explore the fediverse. Please email for information on getting an invite.