maxime borges

Embedded System Engineer | 🖤 Hack & DIY | 🦀 Rust | Music | Photo
Comitee member & Sysadmin @PostTenebrasLab hackerspace
Managing @CursedFootprint

maxime borgesmborges
2026-01-16

@whitequark I was hoping for some tab auto completion from my shell when finally playing with it yesterday. I never tried to implement that in my CLIs, do you know if it's easily feasible for Glasgow?

maxime borges boosted:
Absurdist schyzotisticoballtheodora@rivals.space
2026-01-15
We were human sloping, way before they ai sloped
maxime borgesmborges
2026-01-14

@q3k @elly tbh I never had a project for which it was worth spending time trying any of those, but I've heard good things for complex projects. Was genuinely curious about your opinion here

maxime borgesmborges
2026-01-14

@q3k @elly is there tooling in any other language allowing that kind of cross-language building not being a total mess?

maxime borgesmborges
2026-01-13

@23n27 did you just order the whole stock? ^^

maxime borgesmborges
2026-01-13

@janamarie @gsuberland same, still quite happy with it :3

maxime borgesmborges
2026-01-13

🍑 👨

USB-A to USB-A male cable, with a label mentioning the manufacturer "assmann"
maxime borges boosted:
2026-01-12

Someone brought back this #qrcode sticker from #39c3. The QR code encodes a minified #Linux #x86 #ELF binary that obfuscates what it actually does. Looking at the #disassembly, we can see the following behavior:

🧵 1/5

A sticker with a big QR code on it. In the center of the QR core is a white rectangle with "i386-unknown-linux" written on it. The QR code contains a 154B sized ELF binary.A screenshot from Ghidra with some disassembled x86 Intel-style assembly code. The disassembly reads as follows:

entry
    LEA        ECX,[LAB_08049086]
    XOR        dword ptr [ECX]=>LAB_08049086,0x5414070e
    XOR        dword ptr [ECX + 0x4]=>LAB_08049087+3,0x550a1141
    XOR        dword ptr [ECX + 0x8]=>LAB_0804908d+1,0x1241010e
    XOR        dword ptr [ECX + 0xc]=>LAB_0804908f+3,0x711491b
    XOR        dword ptr [ECX + 0x10]=>LAB_08049096,0x466d4f03
    ADD        EBX,0x1
    ADD        EAX,0x4
    ADD        EDX,0x13
    INT        0x80
    SUB        EAX,0x12
    XOR        EBX,EBX
    INT        0x80
LAB_08049086
    PUSH       EDI
LAB_08049087+3
    PUSH       0x63207461
    OUTSD      DX,ESI
LAB_0804908d+1
    JNZ        LAB_080490fb
LAB_0804908f+3
    AND        byte ptr FS:[EDI + 0x6f],AH
    AND        byte ptr [EDI + 0x72],DH
LAB_08049096
    OUTSD      DX,ESI
    OUTSB      DX,ESI
    AASHexdump of the binary. Next to the hexdump is a textual rendering of the binary, where we can see that the last 20 bytes of the binary are the string "What could go wrong?"
maxime borgesmborges
2026-01-12

@iro_miya we need to ask people at Duralex to make a special collection for nerds

maxime borgesmborges
2026-01-12
maxime borgesmborges
2026-01-12

@Violet le bounnie

maxime borgesmborges
2026-01-11

@mei is that a RPi reference

maxime borgesmborges
2026-01-11

@theodora y a pas des masses de différences, j'en ai chez OVH, quelques uns chez Infomaniak, j'avais chez Gandi fut un temps.

maxime borgesmborges
2026-01-10

@luna thus why my first lens on my A7C was a 28-200, so I can see what range I like to use the most and get primes in that range

maxime borges boosted:
2026-01-10

actually yeah it's not terrible

maxime borgesmborges
2026-01-10

@citronmecha j'ai plutôt l'impression que le problème est lié à la verbosité du truc plus qu'autre chose.

maxime borgesmborges
2026-01-09

@theodora tu peux pas passer ids et masks directmeent sans déférencer et re-référencer ? Sinon le reste ça me choque pas trop, en soit ils pourraient fournir une API un peu plus sympa pour le end-user mais une fois que t'as un exemple de comment transformer tes datas dans le bon sens ça me semble ok

maxime borgesmborges
2026-01-09

@theodora t'as un exemple pour y jeter un oeil ?

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst