When mounting an encrypted Bcachefs filesystem (after unlocking it with a passphrase), you may encounter the error:
mount: ... Required key not available
ERROR - bcachefs::commands::cmd_mount: Fatal error: Required key not available
When mounting an encrypted Bcachefs filesystem (after unlocking it with a passphrase), you may encounter the error:
mount: ... Required key not available
ERROR - bcachefs::commands::cmd_mount: Fatal error: Required key not available
CVE-2025-3155 affects Yelp which is The Gnome's user help application. It's installed by default on Ubuntu desktop.
A URI scheme is the part of a Uniform Resource Identifier (URI) that identifies a protocol or a specific application (steam://run/1337) that should handle the resource identified by the URI. It's the part that comes before the colon (://).
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k
| XZ Backdoor symbol deobfuscation. Updated as i make progress |
I'm scared to account; scared of statements of business dealings, credits and debits, and tracking of all this money-related stuff. Scared of reciting these transaction histories, and yet reckoning with these computations and enumerations is as deathly certain as taxes.
It is silly that this problem has not been solved given fancy new technology like AI and large language models. It's also silly how much big institutions skim off the top, like 1.5–3.5% per credit card transaction, and our expanding web of subscriptions to Substacks, Youtubes and the like that become more numerous and Medusa-like the harder they are to track, aggregate, categorize, and analyze across instutitions. I'm also scared of Mint.com (I used it for many years) as they broker our data, but still need the help of software and technology to manage money. This feels like a data problem that should have been solved long ago 🤯
So the goal here was to spend a few hours on a weekend t
| #include <stddef.h> | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <unistd.h> | |
| #include <gio/gio.h> | |
| #include <mpv/client.h> | |
| /** | |
| * mpv pluging to inhibit screensaver while playing a video on GNOME Desktop |
I have a Linux virtual machine inside a customer's private network. For security, this VM is reachable only via VPN + Citrix + Windows + a Windows SSH client (eg PuTTY). I am tasked to ensure this Citrix design is secure, and users can not access their Linux VM's or other resources on the internal private network in any way outside of using Citrix.
The VM can access the internet. This task should be easy. The VM's internet gateway allows it to connect anywhere on the internet to TCP ports 80, 443, and 8090 only. Connecting to an internet bastion box on one of these ports works and I can send and receive clear text data using netcat. I plan to use good old SSH, listening on tcp/8090 on the bastion, with a reverse port forward configured to expose sshd on the VM to the public, to show their Citrix gateway can be circumvented.
I hit an immediate snag. The moment I try to establish an SSH or SSL connection over o
| """Sort Beancount Entries by meta['time'] | |
| Although beancount says that time is meaningless, there are situations | |
| where an account that should not be negative may have a negative balance | |
| at some point because transfers that occurred on the same day are | |
| scheduled later and spending records are scheduled earlier. | |
| This is not a big deal, but it is a bit odd. | |
| 2021-10-01 balance Assets:Cash 500 USD |
| #!/bin/bash | |
| # | |
| # ~/.local/bin/btswitch | |
| # | |
| # wait a second this is too fast for udev | |
| sleep 1 | |
| btdev="$(pactl list sinks|grep Name|grep 'bluez.*.a2dp.sink'|sed 's/Name: //'|sed 's/\s//')" | |
| if [ -n "$btdev" ]; then |