Landlock Path Walk Inversion Experiment
Landlock supports multiple nested sandboxes, so when an operation with filesystem path is attempted, it has to check it against up to 16 nested policies. The way it currently does that is by…
Fixing Flatpak Obsidian CLI
I just tried to use the new CLI tool for Obsidian for the first time. To set it up, enabling a toggle switch in the “General” section of the settings should suffice. But if Obsidian is…
I returned to AWS - and was reminded HARD why I left.
I was one of the very first advocates for AWS back when it was brand new - SQS, S3, EC2 SimpleDB - it was a lot smaller back then. In fact I organised the very first AWS event in Melbourne when the…
The Trial That Could Reshape AI
The Musk v. Altman trial drops bombshells, Meta quietly buries Llama for a proprietary model, and a severe Linux threat is actively targeting your CI/CD pipelines.
Smaller, Provable, and on Hardware You Own and Operate
Dino Dai Zovi made an argument recently that I want to build on. “If you agree that AI will help attackers discover and exploit vulnerabilities 10-100x more easily, then your excess attack…
Tinkerslop, Class Wartime, and Jobs Not AI Enough - Related to your interests, Friday
Also: VCF 9.1 prefers private cloud for AI, the McGroc analyst trap, and the bank that lost the pope’s account. From: The undertow - Astrid Related to your interests VMware Cloud Foundation 9.1…
How to Handle PostgreSQL Database Migrations in Go with Goose
Application code is stateless. You can tear down a container and spin up a new one in milliseconds without losing data. Databases are stateful. When you deploy new application logic that requires a…
Trenchant Exec Who Sold Zero Days to Russian Buyer Ordered to Pay $10 Million in Restitution to Former Employers
Peter Joseph Williams, the former L3 Trenchant executive recently convicted of stealing zero-day exploits from his employer and selling them to a Russian broker, has been ordered to pay $10 million…
Another AAE1 Special: Frankfurt/Singapore - $24K MRC
A point: SG1. Z point: FR5. Term: 3 Years. Routing: Avoids Marseille and clocks 140 ms RTD.
Why Gated Whitepapers Are Killing Your AI Visibility (And What Cybersecurity Marketers Should Do Instead)
The cybersecurity industry's reliance on gated PDFs and MQL-driven content is actively destroying future pipeline by making the best content invisible to AI engines. Here's the case for a fundamental…
Aluminium Wires
Insurance companies don’t like aluminum electrical wiring. It’s not technically the wires that are the problem, but the connectors used to join the wires. Because aluminum is soft, the wires come…
AI is Breaking Two Vulnerability Cultures
A week ago the Copy Fail vulnerability came out, and Hyunwoo Kim immediately realized that the fixes were insufficient, sharing a patch the same day. In doing this he followed standard procedure for…
From Kubernetes Dev Setup to Production: What Actually Changes
How we moved a Kubernetes-hosted product from a development setup to a platform with controlled delivery, policy checks, observability, and tested recovery.
Scam alert: Beware the very dangerous ‘Cellular Carrier Loyalty Giveaway’ scam
Want to get my easy to follow Tech Tips in your email? Sign up for my daily Rick’s Tech Tips Newsletter! As you probably know by now, the scammers of the world are always coming up with new ways to…
if they were running a linux-anything exposed to the web you could also send 3 UDP packets…
kremlin:in 1995 knowing someone’s IP address was indeed exploitable, you could very easily find out their ISP, call them, and allege anything you want and they would disconnect you while they…
Arch Linux: WireGuard Peer for Connecting to MikroTik
In the post MikroTik: setting up WireGuard and connecting Linux peers I described how to set up MikroTik as a VPN Hub and connect a peer running on Debian Linux. Setup on Arch Linux is mostly the…
Kafka
Kafka is a good thing.
Dirty Frag Gives Root Access on Every Major Linux Distribution
A new Linux zero-day called Dirty Frag gives any local user full root access on every major Linux distribution, and right now no distribution has a patched kernel available. The researcher planned to…
Boring but important stuff
I was reading the post of Mikael Nystrom, who regularly consults and assists with businesses and deployment. One of his comments caught my eye — the boring but important stuff. He offers up a…
Cloudflare Cuts 20% of Workforce for the 'Agentic AI Era'
I genuinely did not see this coming. Cloudflare has been building one of the more coherent AI developer platforms out there–Workers AI, AI Gateway, Vectorize, their edge inference stack–all sitting…
Is Your Database Slow? Probably Not.
Nine times out of ten, when an engineering team starts complaining about “slow database performance,” the database itself is perfectly fine. The real culprit is almost always hiding…
Anthropic Gives Your Data to Elon Musk
You really have to wonder why nobody is reporting the news as it is. Neither Anthropic’s blog post nor SpaceXAI’s mentions anything about data isolation, customer-managed keys, or an…
Linux monoculture is just as bad for security
Another day, another Linux exploit. It’s been hard to keep track over the last few months. Vulnerabilities are inevitable, but they do highlight my concerns again regarding monocultures. Any…
Restic Continuum
As I was migrating my online backups to Restic, I was concurrently building a system that would allow me to use Restic to complete full-disk backups to external USB drives, thus replacing my use of…
Public Videos: Segment Routing 101
In the spring of 2017, Jeff Tantsura , the IETF Routing Area chair , delivered a short “ Introduction to Segment Routing ” webinar. In mid-April 2026, we had ~100 people at ITNOG 10 attending the…
The Operational Decision Platform: Palantir, Databricks, Snowflake, and Microsoft Fabric
Closing the Gap Between Data, Insight, and Action. Palantir, Databricks, Snowflake, and now Microsoft Fabric are often compared as if they solve the same problem. They don’t. Most organisations…
The shift from x86 to ARM is about power, not just performance
Switching from an Intel iMac to Apple Silicon felt like a hardware upgrade. It turned out to be an architecture story, and that story is now reshaping the cloud.
Beyond the Basics: Advanced Text Processing with awk and sed
In the DevOps engineer’s toolkit, few commands are as revered—or as misunderstood—as awk and sed.
FBI Director Kash Patel Orders Polygraph Dragnet in Hunt for Journalists’ Sources
Carol Leonning and Ken Dilanian report for MS NOW. Excerpt: FBI Director Kash Patel ordered the polygraphing of more than two dozen former and current members of his security detail, as well as other…
DNS Tampering and IPv6
Can IPv6 play a role in resisting internet censorship? Background Earlier this week a user on the Fediverse noticed that a website titled “w-social.eu,” recently went offline. Looking…
Canvas Breach Disrupts Schools & Colleges Nationwide
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today,…
AI and DevOps Maturity
I just got back from DevOpsDays Austin, and it’s always great to go out and talk with a wide array of folks from the tech community to see what’s up. The takeaways were interesting.…
Ukrainian Surface Drone (USV) Found, Motor Running, In Greek Cave
 An armed uncrewed surface vessel (USV), almost certainly a Ukrainian example, has been discovered with its motor running, in a sea cave on the Greek…
signatory
A CLI and MCP server that aggregates trust signals about open-source code, projects, and the people behind them — so humans and LLM coding agents can decide, on evidence, whether to adopt a…
The Security Model of Not Being Single
A semi-personal note on how security, privacy, and self-hosting change when your life is no longer designed for one user.
Securing the Agentic Enterprise
Enterprises run on AI agents. So do the attackers. What does it mean to build, secure, and operate AI systems when both sides - defenders and attackers - are automated? Jonathan Jaffe, CISO at…
Letting an agent talk to my ECUs
Something has changed for me at the bench in the last few weeks, and I want to write it down before it stops feeling new. I have spent the last decade building or using diagnostic tools that put a…
Notes on incidents
Incidents are boring. Most of what you actually do during an incident is wait: for some other team to investigate, or for a deploy to finish, or for the result of some change to become apparent, or…
My Homelab: From Book Server to Full Media Stack
How my server started as a book library with Calibre and Kavita, then grew into a full media homelab with Jellyfin, Arr automation, a reverse proxy, and operations tooling — one folder per service,…
Remote Code Execution Vulnerability in Fooocus
Remote Code Execution Vulnerability in Fooocus Fooocus is the third-most popular open-source AI image generation WebUI on GitHub with 48k stars. By exposing it to the internet, you allow attackers to…
YOLO Is a Terrible Strategy for Validating Production Changes
YOLO is a terrible strategy for validating production changes. How many times have you seen it? Your platform is running smoothly. No alerts, no issues. Then suddenly, something breaks. After digging…
What kind of incompetent goofball would schedule maintenance for the last week of classes/finals week?
Yeah, sure, we all put our files/lectures/exams on this central server that we have no control over, and then they do this to us: For those who don’t know, Canvas is the courseware many schools…
PyGrunn: list-man, pragmatic system integration - Doeke Zanstra
(One of my summaries of the 2026 one-day PyGrunn conference in Groningen, NL). When automating in a big company with many systems, you often end up with spaghetti: many systems connecting to a lot of…
Canadian Alleges Legal Intimidation by U.S. Homeland Security Over Social Media Posts
Chris Iorfida, CBC News: A Canadian is fighting back in U.S. federal court over what he says is an attempt by the Department of Homeland Security, through Google, to seek “vast swaths of…
wordpress why why why oh no it was debian (Uncaught Exception: DateTimeZone::__construct(): Unknown or bad timezone)
Fatal error: Uncaught Exception: DateTimeZone::__construct(): Unknown or bad timezone (Europe/Berlin) in /var/www/html/domain.com/public_html/wp-includes/script-loader.php:414 Stack trace: #0…
Canvas is online again after ShinyHunters threaten to leak schools’ data
The Instructure-owned learning management platform, Canvas, is now onl... Continue reading →
Extracting Sensor Calibration from Intel's AIQB Binary for libcamera
Intel ships per-sensor calibration data in proprietary AIQB binaries alongside their Windows camera drivers. Here is how to parse them to generate libcamera Simple IPA tuning files with accurate CCMs…
May 7, 2026
May 7, 2026 But do you know what coreutils are a fertile ground for? Race conditions around file creation, deletion, permission setting, and so on. The original code accounted for decades of…
A Flood of “Free Gifts” Spam Scams
Over the past few weeks, I’ve received a serious flood of similar email messages that claim to be from well-known businesses like Harbor Freight, CVS, Kroger, Marriot, Costco, FedEx, Walmart, and…