Searching We.Love.Privacy.Club

Twts matching #reading
Sort by: Newest, Oldest, Most Relevant

10 Incredibly Specific Oreo Facts You’ll Think About at 2 A.M.
You’ve twisted them, dunked them, and crumbled them into milkshakes—but odds are, you don’t really know Oreos. Behind the world’s best-selling cookie is a labyrinth of marketing manipulation, food science secrets, and flavor experiments so bizarre they’re hidden from the public. These aren’t your standard “Oreo was invented in 1912” trivia tidbits. These are the […]

The post [10 Incredibly Specific Oreo Facts … ⌘ Read more

⤋ Read More

I Learned Rust In 24 Hours To Eat Free Pizza Morally
This is a satirical tech story. For readers who prefer the text version, it’s provided below.

I Learned Rust in 24 Hours to Eat Free Pizza Morally

This is not just a story about pizza. As a recent Phoronix article explains,
the Linux Rust subsystem got into major drama because of my humble quest.

Well, here’s my side of the story, with every kernel of truth exposed.

A Moral Quest for Pizza

Des … ⌘ Read more

⤋ Read More

Morse Micro and Gateworks Launch Wi-Fi HaLow Solution for Industrial Connectivity
Morse Micro and Gateworks Corporation have partnered to bring Wi-Fi HaLow (IEEE 802.11ah) to industrial environments. In collaboration with Silex Technology, they offer a hardware and software ecosystem for long-range, low-power, and secure wireless networking across manufacturing, energy, and transportation sectors. Wi-Fi HaLow operates in the sub-GHz frequency band, offering a co … ⌘ Read more

⤋ Read More

JMP: Mitigating MITMs in XMPP
In October 2023, Jabber.ru, “the largest Russian XMPP messaging service”, discovered that both Hetzner and Linode had been targeting them with Machine-In-The-Middle (MITM) attacks for up to 6 months. MITM attacks are when an unauthorised third party intercepts traffic intended for someone else. At the point of interception, the attacker can inspect and even modify that traffic. TLS was created to mitigate this; all communication between the two parties is encrypted, so the third party sees … ⌘ Read more

⤋ Read More

A critical look at NetBSD’s installer
NetBSD is an OS that I installed only a couple of times over the years, so I’m not very familiar with its installer, sysinst. This fact was actually what led to this article (or the whole series rather): Talking to a NetBSD developer at EuroBSDcon 2023, I mentioned my impression that NetBSD was harder to install than it needed to be. He was interested in my perspective as a relative newcomer, and so I promised to take a closer look and write about it. While … ⌘ Read more

⤋ Read More

Redox gets X11 support, GTK3, and Mesa3D EGL
We’ve cleared another month by the skin of our teeth, so it’s time for another month of progress in Redox, the Rest-based operating system. They’ve got a big one for us this month, as Redox can now run X11 applications in its Orbital display server, working in much the same way as XWayland. This X11 support includes DRI, but it doesn’t yet fully support graphics acceleration. Related to the X11 effort is the brand new port of GTK3 and the arriv … ⌘ Read more

⤋ Read More

New EU rules mandate five years of OS updates for smartphones and tablets
Starting 20 June 2025, new rules and regulations in the European Union covering, among other thins, smartphones and tablets, will have some far-reaching consequences for device makers – consequences that, coincidentally, will work out pretty great for consumers within the European Union. The following “ecodesign requirements” will come into force on 20 June: Especially the requirements … ⌘ Read more

⤋ Read More

JMP: Mitigating MITMs in XMPP
In October 2023, Jabber.ru, “the largest Russian XMPP messaging service”, discovered that both Hetzner and Linode had been targeting them with Machine-In-The-Middle (MITM) attacks for up to 6 months. MITM attacks are when an unauthorised third party intercepts traffic intended for someone else. At the point of interception, the attacker can inspect and even modify that traffic. TLS was created to mitigate this; all communication between the two parties is encrypted, so the third party sees … ⌘ Read more

⤋ Read More