Lobster Roll

All Programming (General) 14278 Systems / Low-Level / OS 11779 Programming Languages / CS Theory 7564 Data / Databases / Infrastructure 6479 Web Development 4631 Security / Privacy 3776 Culture / Philosophy / History / Reading 3691 AI / Machine Learning 3187 Productivity / Career / Business 2565 Maker / DIY / Hardware 2341 Gaming / Retro Computing 1526 Design / UX / Visualization 1503 Science / Math / Physics 1406 Apple / macOS / iOS 1217 Internet / Digital Culture 556 Health / Fitness / Lifestyle 33 Crypto / Blockchain 31

Security / Privacy

Citizen Protest Halts Chat Control (patrick-breyer.de)
OpenSSH 10.1 released (openssh.com)
TESID: Textualised Encrypted Sequential Identifiers (temp.chrismorgan.info)
UUIDv47 = v4 privacy + v7 performance (github.com)
Personal data storage is an idea whose time has come (blog.muni.town)
Attack paths for exfiltrating data using 1Password CLI (codeberg.org)
Supply Chain Risks in Late 2025 (buttondown.com)
Pointer leaks through pointer-keyed data structures (googleprojectzero.blogspot.com)
CVE-2025-59489: Arbitrary Code Execution in Unity Runtime (flatt.tech)
CI/CD components to generate and verify provenance attestation (gitlab.com)
Nine HTTP Edge Cases (blog.dochia.dev)
Stop Trusting Nix Caches (garnix.io)
Shellshock (2014, 2025) (dwheeler.com)
Claude in Cyber Competitions (red.anthropic.com)
Supply chain security for the 0.001% (and why it won’t catch on) (blog.viraptor.info)
Testing "exotic" p2p VPN (blog.nommy.moe)
Is IP fragmentation still considered vulnerable? (blog.apnic.net)
Offline translator for Android (github.com)
seL4 2025 Playlist (youtube.com)
go-landlock: A Go library for the Linux Landlock sandboxing feature (github.com)
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails (koi.security)
Cross-Agent Privilege Escalation: When Agents Free Each Other · (embracethered.com)
crates.io: Malicious crates faster_log and async_println (blog.rust-lang.org)
Race Against Time in the Kernel’s Clockwork (streypaws.github.io)
How MCP Authentication Flaws Enable RCE in Claude Code, Gemini CLI, and More (verialabs.com)
Fifty Years of Open Source Software Supply-Chain Security (cacm.acm.org)
Our plan for a more secure npm supply chain (github.blog)
Phishing attacks with new domains likely to continue (blog.pypi.org)
Using DNS for responding to ACME challenges (hsm.tunnel53.net)
Crypto Miner in hotio/qbittorrent (apogliaghi.com)