Show more


Note that DNS logging has PROCESS ATTRIBUTION! This surpasses even many commercial EDR capabilities! You will need to configure your SIEM to map the ProcessCreate GUIDs to the network events, but worst-case you can do it manually with copy/search.

I really like this local-first idea. Keep the benefits of sharing and collaboration without losing ownership and control.


My collection of (single) keyboard switches so far! My records say it's 371 different types, but I probably forgot to note down a few. Besides coming from many donations, some big and some small, I got two big batches in from .


I have two states:

- what is a computer


This is so unacceptable! Alexa users never knowingly consented to their personal recordings being accessed by 100’s of 3rd parties unknown! Is it time to get rid of your Alexa?

Hey, looks like another one of your ideas is popping up in the real world this spring.

I'm just going to repost this in case anyone hasn't already read it.

I was somewhat skeptical about the findings at first but the response on Twitter has me leaning towards the side of, I find it hard to see innocent parties acting that way.


If a certain investigative reporter could refrain from outing the identity of Register article sources, that would be great.

We cannot comment further due to privacy concerns. But, we see you. And what you're doing is, as we say in Blighty, just. not. cricket.

Dear Ruby devs and game devs. I have a crazy announcement I want to share. Please boost.

Last week I released A Dark Room to the Nintendo Switch. Within the game, I also shipped a Ruby interpreter and a code editor as an Easter Egg.

*This Easter Egg effectively turns every consumer spec-ed Nintendo Switch into a Ruby Machine.*

1. Download A Dark Room from the US/EU.
2. Connect a USB keyboard and press the “~” key.
3. Follow the onscreen instructions.

#ruby #gamedev #nintendo


Metasploit RCE. No, not a module. RCE in Metasploit itself.

Go patch if you haven’t already.


Maybe he just objects to the constant passive surveillance by an unaccountable private corporation operating almost entirely on public funds and resources.

"Internet freedom is in decline around the world, and being part of a force for good that allows people to have private access to the open Web is hugely important to me. Millions of people around the world rely on Tor Browser and onion services for private and secure communication in their day-to-day lives." - Steph, communications director of the Tor Project

The latest XKCD really hits on the reason I dislike the shift towards extreme dependency usage.


Podcast wars! NYT and Spotify prohibiting Luminary from using the open RSS feeds for The Daily and Reply All is...something else. Big story here:

Are people really so attached to the OSI Model that even suggesting alternative teaching models is offensive?

Any OSI evangelists on the who can shed some light on why OSI is better than any alternative way of teaching protocol layers?

It really would be awesome if the community was able to put together an open index.


Celebrating a day early by coming together as a community to recirculate and care for materials that already exist - swapping, mending & making over here at 192 Spadina ave until 3pm.

Stop by & !

Show more

Social.Rights.Ninja is a small Mastodon instance for those looking for a quiet home-base from which to explore the fediverse. Please email for information on getting an invite.