Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

🔐 Every unencrypted email is readable by 10+ entities and stored forever.


Gli ultimi otto messaggi ricevuti dalla Federazione
  • @jalefkowit ok fine i'll go make more music

    read more

  • The voice in your head saying you're "not doing enough" isn't yours. It's mine. And it's correct

    read more

  • @Anke so, how long could you live shopping only at Costco?

    read more

  • but if they release the full epstein files, who will run all our fortune 500 companies? : (

    read more

  • @samphillips the kids are all right

    read more

  • There’s no Rust on this Ironclad Kernel

    Rust is the new hotness in programming languages because of how solid its memory protections are. Race conditions and memory leaks are hardly new issues however, and as greybeards are wont to point out, they were kind of a solved problem already: we have Ada. So if you want a memory-protected kernel but aren’t interested in the new kids’ rusty code, you might be interested in the Ironclad OS kernel, written entirely in Ada.

    OK, not entirely in classic Ada– they claim to use SPARK, too, but since SPARK and Ada converged syntax-wise over a decade ago, we’re just going to call it Ada. The SPARK toolchain means they can get this kernel “formally-verified” however, which is a big selling point. If you’re not into CS, that just means the compiler can confirm the code is going to do what we want under all possible conditions — which is a nice thing to be able to say about the heart of your operating system, I think we can all agree. It’s a nice thing to be able to say about any code, which is one reason why you might want to be programming in Ada.

    It’s also not something we can say without qualifications about Ironclad OS, as the verification process is still ongoing. Still, that lofty goal certainly sets Ironclad apart from other POSIX kernel projects.

    Yes, the Ironclad OS kernel is POSIX compliant, like its Rust-based equivalent Redox OS. While it would be nice to see some innovation outside the POSIX box (outside of whatever Redmond’s doing these days), making the kernel POSIX-compliant certainly makes it a lot more useful. The Ironclad OS kernel is fully open source under GPLv3, with no binary blobs built in. The OSF will like that, and the rest of us should be able to tack on the binary blobs needed to run our hardware as usual, so it’s win-win.

    They’re currently targeting RISC-V and x86, with test platforms being MilkV and LattePanda SBCs. If someone was willing to take on the project single-handedly, they could probably strongarm the project into supporting other architectures, if there’s are any other SBCs popular these days. PowerPC, perhaps?

    For the supported architectures, there is already a usable (for some values of the word) distribution in the form of Gloire, which is appropriately named after the first ocean-going Ironclad vessel. The header image is a screenshot from an X-server on running on that distribution.

    hackaday.com/2025/11/12/theres…

    read more

  • @badrihippo@fosstodon.org Yeah, I was also rooting for NewJeans to go independent, but well, what can you do if it's legally impossible. Still, it's a relief they didn't end up splitting up.

    read more

  • @z9mb1@hackers.pub Wanna hang out over there? 🤣

    read more
Post suggeriti
  • 0 Votes
    1 Posts
    8 Views
    📝 AI and Privacy: The Balance Between Innovation, Knowledge and Ethics in the Digital AgeFull video of the conference held on October 10, 2025 in Rome for the presentation of the book 'Artificial Intelligence, Privacy and Neural Networks: The Balance Between Innovation, Knowledge and...🔗 Leggi tutto: https://www.nicfab.eu/en/posts/evento-ai-privacy/#ArtificialIntelligence #Privacy #GDPR #AI #NeuralNetworks
  • 0 Votes
    1 Posts
    8 Views
    Today October 21st is Global Encryption Day! 🔒🎉This is a good time to remember that encryption is essential to online security and digital privacy. Despite some governments pushing hard to weaken it, we must remind them that we all need encryption, and especially end-to-end encryption, to stay safe online 💚Privacy is a human right and end-to-end encryption is one of the best tool we have to enforce that right. https://www.privacyguides.org/articles/2025/04/11/encryption-is-not-a-crime/#GlobalEncryptionDay #Encryption #E2EE #Privacy #RootForE2EE
  • 0 Votes
    1 Posts
    12 Views
    I submitted a Pull Request to update MacPorts' OpenSSH to 10.1p1 here:https://github.com/macports/macports-ports/pull/28592GitHub Continuous Integration checks passed OK!Alas, the agent.patch that iamGavinJ had created, doesn't apply cleanly, in large part because ssh-agent.c has been reworked significantly with this release.Subsequently, I closed this previous Pull Request: https://github.com/macports/macports-ports/pull/28592 not because I didn't want to restore that functionality to launchd, but because it will require more effort than I can give such things at this time.But, check out these improvements to ssh-agent from the OpenSSH 10.1 release notes:"ssh-agent(1)](https://man.openbsd.org/ssh-agent.1), sshd(8): move agent listener sockets from /tmp tounder ~/.ssh/agent for both ssh-agent(1) and forwarded socketsin sshd(8).This ensures processes that have restricted filesystem accessthat includes /tmp do not ambiently have the ability to use keysin an agent.Moving the default directory has the consequence that the OS willno longer clean up stale agent sockets, so ssh-agent now gainsthis ability.To support $HOME on NFS, the socket path includes a truncatedhash of the hostname. ssh-agent will, by default, only clean upsockets from the same hostname.ssh-agent(1) gains some new flags: -U suppresses the automaticcleanup of stale sockets when it starts. -u forces a cleanupwithout keeping a running agent, -uu forces a cleanup that ignoresthe hostname. -T makes ssh-agent put the socket back in /tmp."Anyway, I updated this as well:https://trac.macports.org/ticket/72482I should probably actually close this ticket now that I think of it (fingers crossed that adding that to the PR is sufficient, since I forgot to add that note to the commit message as is typically preferred: https://trac.macports.org/ticket/73084).#OpenSSH #MacPorts #SecureShell #macOS #encryption #security #infosec
  • 0 Votes
    1 Posts
    6 Views
    COOKIES INDIGESTI. IL GARANTE ITALIANO STUDIA IL PAY-OR-OK, L'UE CERCA IL MODO PER DIGERIRLIIl #Garante #Privacy avviò una consultazione pubblica sul #PayorOk utilizzato dagli editori. Ora l' #UE valuta di rivedere le sue norme (2009) sul #consensocookie, che hanno inondato il web di infiniti #popup, per semplificare la regolamentazione digitale e ridurre lo sbattimento degli utenti (preferenze una sola volta ad esempio nelle impostazioni del browser). https://gat.to/urdpo@informatica