Pinned toot

Ever since I was 7 years old, I've been interested in computers, the Internet, and more recently, cybersecurity and social engineering.

I strive to become an excellent cybersecurity engineer. I'm always eager to learn and love meeting new people with similar interests. Feel free to drop me a DM!

For more information, please check out my personal blog:

Pinned toot

Friendly reminder: is a great project to contribute your otherwise idle computing power.

You can set complex scheduling options, either by time of day, battery level, non-BOINC CPU usage, mouse and keyboard activity and so on. This way, it won't take up all your resources when you're compiling or playing videogames.

You can also configure it to only take a percentage of the CPU, a specific core count, or only allow it to run in bursts.

Contribute today!

My blog is now CDN free, and thanks to the use of aggressive local and server caching, it should feel just as fast as it was before!

I liked this article on the failures of the Boeing 737 Max. Very well written and detailed technical and administrative explanations on what went wrong.

My gf's learning html. Nobody told her that vim's a strange tool for genius programmers, so I just told her it was a normal tool, showed her insert and escape, then let her get on with it.

Half an hour later, I showed her another vim command.

Someone with almost zero education, who can't type properly, is programming in vim because nobody told her it was difficult. I know people who can program in Haskell who aren't sure if they can do vim.

there were some things i ddn't knew about raspberry pis:

"Linux runs on that ARM CPU, we know that, but we might be surprised to learn that Linux on this device is only a second class citizen. The GPU cores run a real time operating system called ThreadX. This operating system is closed source and rules the system without the open source Linux Kernel being aware of it."

and guess who bought the ThreadX operating system last april?

Verifpal 鈥 tool to verify the security of cryptographic protocols:

鈥 paper: (PDF file)
鈥 user manual: (PDF file)
鈥 Verifpal is still highly experimental software
鈥 available for Windows, Linux and macOS

#verifpal #crypto #cryptography #verification #security #cybersecurity #infosec

Crossposted from Twitter 

Hard at work implementing categories in my #mac client app for the #nextcloud notes app!

"When C is your hammer, everything looks like a thumb"

Banned C standard library functions in Git source code:

Another privacy win from Apple as they take a firm no-exceptions policy to all tracking practices in Safari.

Their newly-announced policy states that "tracking users 'without' consent... will [get you] kicked off the platform, treated like malware."

This is the exact same reason why I switched to iPhone. iPhone SE too!

Great article, @kev, good job.

My new blog is live! Come check it out at

Will be adding new features over time, probably.

I ended up scrapping my progress and started from scratch. I'm testing and developing my blog's new design at I used as a base.

Let me know your thoughts!

Holy dang. Not only can the DMCA be used to bogusly take down someone's content, it can be used to get their address too.

"Man sued for using bogus YouTube takedowns to get address for swatting"

@ultem Seems like this instance doesn't have this post for some reason, but yeah, that sounds like a good idea! I'm not an expert by any means but I'd love to have someone to play with.

U2F / Yubikey users: Not all supporting accounts let you add more than one key. How do you deal with the possibility of losing or breaking your key?

iOS app developers will now be forced to use the background connectivity APIs exclusively for voice calling, which is what they were designed for

Hooray for battery life, hooray for privacy!

Show more
Mastodon 馃攼

Fast, secure and up-to-date instance. provides knowledge and tools to protect your privacy against global mass surveillance.

Matrix Chat:
Support us on Patreon and Liberapay!