Lobsters

Latest

Mythos finds a curl vulnerability

2026-05-11 @ 07:24:32Comments

Fully Preserving Fisher-Price Pixter

2026-05-11 @ 06:54:03Comments

How Factorio Syncs A Million Objects over the network

2026-05-11 @ 05:38:44Comments

dBase: 1979-2026

2026-05-11 @ 04:47:23Comments

Unlocking Encrypted ZFS Volumes with a Passkey

2026-05-11 @ 03:30:32Comments

You Need AI That Reduces Maintenance Costs

2026-05-11 @ 02:19:28Comments

My pastebin clone Vivipara and language musings

2026-05-10 @ 23:17:43Comments

Replacing Ctrl-R in Bash without TIOCSTI

2026-05-10 @ 23:09:39Comments

ClaudeBleed: A Flaw In Claude's Browser Extension Allows Any Extension to Hijack It

2026-05-10 @ 21:51:34Comments

Childhood Computing

2026-05-10 @ 21:07:33Comments

Robot Dogs Are a Security Nightmare

2026-05-10 @ 21:04:55Comments

Tiny-Lua-Compiler: Possibly the smallest Lua compiler ever

2026-05-10 @ 20:59:58Comments

let-go: Almost Clojure written in Go

2026-05-10 @ 20:07:57Comments

the 90 day disclosure policy is dead

2026-05-10 @ 18:06:47Comments

We see something that works, and then we understand it

2026-05-10 @ 15:40:37Comments

wayland.fyi minimalist wayland special interest group

2026-05-10 @ 15:05:18Comments

So you've installed `fzf`. Now what? (2023)

2026-05-10 @ 14:55:11Comments

Debian must ship reproducible packages

2026-05-10 @ 13:12:55Comments

FreeBSD: Local privilege escalation via execve()

2026-05-10 @ 12:58:29Comments

Replacing a 3 GB SQLite database with a 10 MB FST (finite state transducer) binary

2026-05-10 @ 11:42:30Comments

Idempotency Is Easy Until the Second Request Is Different

2026-05-10 @ 10:35:23Comments

AI is Breaking Two Vulnerability Cultures

2026-05-10 @ 07:01:30Comments

Flipping the bozo bit on flips the learning off

2026-05-10 @ 03:14:27Comments

Laptops all have built-in security tokens these days

2026-05-09 @ 18:43:45Comments

I Will Not Add Query Strings to Your URLs

2026-05-09 @ 16:12:57Comments

Archives

2026

2025

2024

2023

2022