Founder @ Phish Report 🎣
(assuming it's an old-school machine with rotating drums which could have those symbols adjacent)
(assuming it's an old-school machine with rotating drums which could have those symbols adjacent)
Those get uploaded to bsky, and the client gets a list of hits back -> this tells them which of their contacts have bsky accounts
cleaner than a separate GUI window, but without the overhead of maintaining separate extensions for intellij, vscode, zed, etc.
cleaner than a separate GUI window, but without the overhead of maintaining separate extensions for intellij, vscode, zed, etc.
noooo they need to go into the void, never to be recovered
but ok yeah that seems pretty great, and even open source!
noooo they need to go into the void, never to be recovered
but ok yeah that seems pretty great, and even open source!
The link to their website is an outlook safelinks url?
They're not even a security company, they're a "hide the fact you used an LLM" tool???
The link to their website is an outlook safelinks url?
They're not even a security company, they're a "hide the fact you used an LLM" tool???
Partitioning the cache by tenant very slightly reduces hit rate, but you'll sleep better at night knowing there's no novel attacks out there
Partitioning the cache by tenant very slightly reduces hit rate, but you'll sleep better at night knowing there's no novel attacks out there
Those get uploaded to bsky, and the client gets a list of hits back -> this tells them which of their contacts have bsky accounts
Those get uploaded to bsky, and the client gets a list of hits back -> this tells them which of their contacts have bsky accounts
A's contact list includes B
*and*
B's contact list includes A, I think that could work safely?
A's contact list includes B
*and*
B's contact list includes A, I think that could work safely?
> I’ll continue adapting those paths, unless you’d prefer I pause here.
🥺
bot's sleepy, wants a rest
> I’ll continue adapting those paths, unless you’d prefer I pause here.
🥺
bot's sleepy, wants a rest
Based on @filippo.abyssdomain.expert's investigation, this header is how the latest Go version implements cross-site request forgery detection
Based on @filippo.abyssdomain.expert's investigation, this header is how the latest Go version implements cross-site request forgery detection
Sec-Fetch-Site: same-site
Because the request comes from the same registered domain
Whereas for an exact hostname match, you'd get:
Sec-Fetch-Site: same-origin
(Other values: "none" if a user clicked 'open image in new tab', or 'cross-origin' for someone hotlinking)
Sec-Fetch-Site: same-site
Because the request comes from the same registered domain
Whereas for an exact hostname match, you'd get:
Sec-Fetch-Site: same-origin
(Other values: "none" if a user clicked 'open image in new tab', or 'cross-origin' for someone hotlinking)
Allowing anything except a "cross-site" value is equivalent to your current referrer check (but would work even if referrers aren't sent)
Allowing anything except a "cross-site" value is equivalent to your current referrer check (but would work even if referrers aren't sent)