"Just decrypting some data can overflow a heap buffer with attacker controlled data, no verification or signature is validated before the vulnerability occurs." — @taviso
This is neat, the new SoloKey sports an updateable Rust firmware.
Now, hear me out @nickraystalder@0x0ece: you already have 25519 code, give us a scalarmult op and we can make an age plugin that works with native recipients!
Here we go, let's see how the new M1 chips do on Go benchmarks!
(Might be a good time to mute #M1, I have a new toy and I took time off work until the end of the month.)
First step is
$ GOOS=darwin GOARCH=arm64 ./bootstrap.sh
on my corp MacBook.
Well, it couldn't be too easy I suppose.
Ran bootstrap[.]sh (which is just a convenience wrapper for make + mv bin/darwin_arm64/go bin/go + tar), sent it over with webwormhole.io, cleared the quarantine xattr, and...
The police is arresting, shooting, and macing journalists.
They are driving tanks into cities and escalating.
They're getting recorded and they don't care.
Defund the police. Disarm them. Drop qualified immunity.
A black CNN reporter was arrested after identifying himself while filming on a highway that was blocked by police and protesters.
Easy UNIX piping! No config options! Modern crypto! No keyrings! Public keys that fit in a tweet! No more looking up how to encrypt a file on StackOverflow. 💥