Lobster Roll

All Programming (General) 8178 Systems / Low-Level / OS 6631 Programming Languages / CS Theory 4253 Data / Databases / Infrastructure 3848 Web Development 2762 AI / Machine Learning 2325 Security / Privacy 2167 Culture / Philosophy / History / Reading 2105 Productivity / Career / Business 1501 Maker / DIY / Hardware 1281 Gaming / Retro Computing 996 Design / UX / Visualization 915 Science / Math / Physics 838 Apple / macOS / iOS 697 Internet / Digital Culture 332 Health / Fitness / Lifestyle 24 Crypto / Blockchain 10

Security / Privacy

Object-capability Programming in Javascript (youtube.com)
Do Users Verify SSH Keys? (2011) (usenix.org)
I spent a year of my life making an ASN.1 compiler in D (bradley.chatha.dev)
Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs (ian.sh)
Fixing UUIDv7 (for database use-cases) (brooker.co.za)
Element: setHTML() method on MDN (developer.mozilla.org)
What’s the problem with pipe-curl-into-sh?
The emulator's gambit: Executing code from non-executable memory (redops.at)
How Minecraft servers can track you across accounts and IPs using resource packs (alaggydev.github.io)
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace (koi.ai)
TARmageddon (CVE-2025-62518) highlights the challenges of open source abandonware (edera.dev)
The Day My Smart Vacuum Turned Against Me (codetiger.github.io)
Bundler 2.6: Enhanced Security with Built-in Checksum Verification (mensfeld.pl)
How I Almost Got Hacked By A 'Job Interview' (blog.daviddodda.com)
What’s your go-to strategy for giving engineers access to production?
I Cheated At Poker By Hacking A Casino Card Shuffling Machine (youtu.be)
F5 Says Nation-State Hackers Stole Source Code and Vulnerability Data (securityweek.com)
Pwning the Entire Nix Ecosystem (ptrpa.ws)
GrapheneOS could break Pixel exclusivity in 2026 with major OEM deal (piunikaweb.com)
Don't Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites (satcom.sysnet.ucsd.edu)
A modern approach to preventing CSRF in Go (alexedwards.net)
Let's not Encrypt (2019) (michael.orlitzky.com)
Modern iOS Security Features -- A Deep Dive into SPTM, TXM, and Exclaves (arxiv.org)
It Is A War Out There - Take Control of Your Supply Lines with HtDTY (sheep.horse)
Critical GitHub Copilot Vulnerability Leaks Private Source Code (legitsecurity.com)
ksmbd - Exploiting CVE-2025-37947 (blog.doyensec.com)
A major evolution of Apple Security Bounty, with the industry's top awards for the most advanced research (security.apple.com)
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises (words.filippo.io)
A new breed of analyzers (daniel.haxx.se)
Rubygems.org AWS Root Access Event – September 2025 (rubycentral.org)