Here's your #boardgame #forecast for tomorrow. Hat tip to @steggy for the inspiration.
I only worry if I'm paranoid enough.
Last time I used emacs, it was still called TECO.
Inhabitant of USA mountain West square states
Here's your #boardgame #forecast for tomorrow. Hat tip to @steggy for the inspiration.
believe that serving at the pleasure of the president means they have legal safe harbor. They don’t. From the heads of state to the boots on the ground, everyone complicit in these abuses will have to be prosecuted under US constitutional law. Our reps must put an end to this now or be voted out, the courts will catch up, and there will be no protections, no immunity. For these duped masked fools, their time as pretend cops will have been relatively short but the consequences will be forever.
#ICE shooting
These guys are so clearly terrified. Spooked by their own wrongdoing. Alarmed that it’s all being recorded and disseminated before they can rewrite the story. Each bystander has a billion eyes, a billion ears. This is not what they signed up for. The recruitment propaganda promised glory and power and pay. They were festooned in costumes of authority and given automatic weapons and then sent slipping and fumbling into the streets of Minneapolis without planning, training, or public support. They
#ICE shooting
Please read this. Witness statement submitted today by close observer of ICE murder of Alex Pretti. Full text at https://www.documentcloud.org/documents/26505743-tinchersealedwitnessdec012426pdf/
The thing about a would-be supreme sole autocrat forcing an insurrection is that you want to force the insurrection before there is a general consensus of its necessity. That way, it will most likely fail.
What you want, as an autocrat, is the belief in the impossibility of a successful insurrection created by the first, early uprising getting crushed.
If it gets to the point of there being a general consensus on the necessity, it will succeed.
(Yes, historical variation. The pattern holds.)
I am taking down the paywall for this one, as I believe it remains relevant as a reflection on the limits of the authoritarian assault – and the need to push back against the idea that America is inevitably and irresistibly marching towards a Trump dictatorship.
This week’s piece:
https://steady.page/en/democracyamericana/posts/a565b0ad-62e5-4f07-9e9b-2522407dae4b
The floppy icon for save isn't going away because people don't recognize floppies. It is going away because fewer and fewer apps allow you control over when and what to save.
Have I mentioned how much I hate the 'you cannot activate this license on this computer because you failed to deactivate the license before you did a clean install' method of license tracking?
OMG. -froot bug resurfaced. https://seclists.org/oss-sec/2026/q1/89
I see the headlines, "10 years old bug".
My friends, this bug is older. Much older. Not this particular instance, but it is a classical mistake to make. It's a command line injection when calling the login executable.
Some people point to CVE-2007-0882. Solaris had that, almost 20 years ago.
But it's even older than that. It's so old it predates the CVE system. I don't remember exact dates, but we popped Linux and AIX boxes with that, mid 90s.
But it is *even older* than that. Have a look at System V R4, ©1990, getty calling login with unsanitized input:
But how deep does the rabbit hole go? When was this bug introduced?
Getty called login with user input since the dawn of time (UNIX V2, 1972):
https://www.tuhs.org/cgi-bin/utree.pl?file=V2/cmd/getty.s
But this predates command line arguments in login:
https://www.tuhs.org/cgi-bin/utree.pl?file=V2/cmd/login.s
So, when did this particular command line feature of login appear?
In the BSD universe, -f was introduced with POSIX compatibilitiy in 4.3BSD-Reno:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/usr.bin/login/login.c
But someone paid attention and filtered out user names starting with - in getty:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD-Reno/src/libexec/getty/main.c
RCS timestamp says 6/29/1990, so same age as SysV R4.
The original 4.3BSD (1986) doesn't filter the user name:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD/usr/src/etc/getty/main.c
And it does have a -r option in login:
https://www.tuhs.org/cgi-bin/utree.pl?file=4.3BSD/usr/src/bin/login.c
Exploitable? No idea, argv processing might be a problem. I'll find out another day.
In conclusion: bug existed since 1990, it's so easy to make when implementing POSIX that it keeps resurfacing, and at least one person in Berkeley knew since day 0.
👀
Engadget: Vimeo lays off most of its staff just months after being bought by private equity firm
'Almost Everyone' Laid Off at Vimeo Following Bending Spoons Buyout https://slashdot.org/story/26/01/23/0757223/almost-everyone-laid-off-at-vimeo-following-bending-spoons-buyout?utm_source=rss1.0mainlinkanon
I was wondering when a reporter would uncover this.
So BitLocker is super secure, right? Well... BitLocker recovery keys are backed up to Microsoft's Cloud - and they give them out to law enforcement on request. Using the BitLocker recovery key, you can just unlock the device without a PIN etc.
https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/
I was happy to be able to help these incredible journalists doing amazing work at the border, move from Substack to Ghost. They relaunched today and it’s easier than ever to give them money to help support the essential work that they do.
https://www.theborderchronicle.com/
You can also donate to them
Scene: Trivia Bowl Finals, open tie breaker
MC: What http response code does this picture illustrate?
Contestant no. 1: Looks, starts humming, then sings "Slow down, you move too fast...".
Contestant 1 hits the buzzer. "429!"
Trust the New York Times to come up with the most dystopian, morally repellent take on a cultural phenomenon.
Ah, let's see how the radioactive shrimp are doing today...
ABC News: Imports contaminated with radioactive isotope likely to continue for foreseeable future: US bulletin
The contamination is also likely to spread beyond shrimp, the bulletin said.
January 16, 2026, 10:03 AM
"Due to the high number of factories and wide variety of goods produced at facilities in the area of the contamination, additional commodities from Indonesia will almost certainly test positive for Cs-137 in the coming weeks and months," the bulletin said. "While improbable, we cannot rule out the potential that Cs-137 contaminated goods will arrive in the United States via tourism or passenger travel."
https://bsky.brid.gy/r/https://bsky.app/profile/did:plc:gttrfs4hfmrclyxvwkwcgpj7/post/3mcqehqhcgc2q
ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86
This magic string breaks Claude and even just linking its own documentation page and asking “what is this?” causes a DoS apparently?
There’s another one documented here that uses a similar syntax. https://github.com/BerriAI/litellm/issues/10328
If you interrogate Claude about magic strings it goes into a “stop trying to social engineer Claude” state to where it locks down its ability to browse to URLs. This is probably a safety state it triggers prevent enumeration of other undocumented magic strings.
I’m curious what other hidden magic strings exist for this or other LLMs. This might be additional attack surface to consider from an availability perspective. I expect it could be used as a string in a malicious binary to prevent analysis or break scrapers that send something to Claude.
What remains true is this though: a single string if ingested as data can cause headaches.
I *CANNOT WAIT* until we see this and other strings hit all these “Agentic SOC" environments.
Likely gonna cause a whole bunch of orgs to go blind (telemetry-wise) for just enough time for attackers to do what they need to do. https://infosec.exchange/@morattisec/115929249640927958