kpcyrd 🏴
kpcyrd.chaos.social.ap.brid.gy
kpcyrd 🏴
@kpcyrd.chaos.social.ap.brid.gy
Rust Developer 🦀, {Arch Linux,Debian,Alpine} Package Maintainer 📦, Reproducible Builds Enthusiast ⛓, Security Researcher 🦝, Anarcho Communist 🏴

🌉 bridged from ⁂ https://chaos.social/@kpcyrd, follow @ap.brid.gy to interact
Pinned
I did a writeup of things I was working on in 2024: https://vulns.xyz/2024/12/2024-wrapped/
Dear blog. This post is inspired by an old friend of mine who has been writing these for the past few years. I meant to do this for a while now, but ended up not preparing anything, so this post is me writing it from memory. There’s likely stuff I forgot, me being gentle with myself I’ll probably just permit myself to complete this list the next couple of days. I hate bragging, I try to not depend on external validation as much as possible, and being the anarcho-communist anti-capitalist that I am, I try to be content with knowing I’m “doing good in the background”. I don’t think people owe me for the work I did, I don’t expect anything in return, and it’s my way of giving back to the community and the people around me. Consider us even. That being said, I: * Uploaded 689 packages to Arch Linux * Most of which being reproducible, meaning I provably didn’t abuse my position of compiling the binaries * 59 of those are signal-desktop * 34 of those are metasploit * Made 28 commits in Alpine Linux’ aports * 24 of those being package releases * Made 43 uploads to Debian * All of them being related to my work in the debian-rust team, that I’ve been a part of since 2018 * Made 5 commits in NixOS’ nixpkgs * Made 1 commit in homebrew-core * Was one of the people involved in rolling out `_FORTIFY_SOURCE=3` compiler hardening in Arch Linux, for the entire operating system. I wrote lists, tools, patches and my work got me quoted in an “Additional Considerations” section of the OpenSSF compiler hardening guide for C and C++. There are now more, stricter buffer-overflow checks at runtime that hopefully make your computer harder to exploit in 2025. * Was one of the people behind the launch of `reproduce.debian.net` which is analogous to `reproducible.archlinux.org` that I also helped create 5 years ago. Reproducing these packages (and allowing anybody else to do the same) proves the binaries have not been backdoored by the build server (or whoever compiled them), and if there’s a backdoor, you can likely find it in the source code. * Integrated librustls, a memory safe TLS implementation, into Arch Linux’ C dynamic linking ecosystem and became one of the authors of the rustls curl TLS backend * In response to the XZ Jia Tan incident I created whatsrc.org, a source code indexing project. It doesn’t solve anything in itself, but it’s framing the concept of source code inputs and how to reason about them in a way that I consider promising. It also documents and makes it very apparent what specifically is the source code we’re putting into our computers, that would benefit from code reviews. * Contributed to the Reproducible Builds mailing list 33 times * Volunteered at a soldering workshop for beginners for the 3rd year in a row, with people describing me as a good teacher, giving very calm vibes and having endless patience * Reverse engineered the signal username and QR-code feature * Rewrote my tooling for apt.vulns.xyz to use repro-env, the .deb files can now be verified through reproducible builds, and I switched to static Rust binaries because I had trouble targeting multiple Debian/Ubuntu releases with my previous tooling * Wrote 0 blog posts (besides this one) * Wrote 5.937 messages in irc channels * Got mentioned 1.664 times on irc * Attended FOSDEM, Fusion, the Reproducible Builds summit, Hackjunta 2024#2 and 38c3 * Made and printed 8 new sticker designs, and a custom hoodie * Mastered the art of pragmatic zaza cultivation and processing * Got 2 new piercings and 2-3 new tattoos (depending on how you count them) Thanks to everybody who has been part of my human experience, past or present. Especially those who’ve been closest. cheers, kpcyrd ✨
vulns.xyz
[politics]

Digital independence is nice and everything, but if the USA invasion of Europe starts a war, do I lose my .org domain due to not being able to renew? #diday #digitalsovereignty
January 21, 2026 at 1:42 PM
My #2026 resolution was field-testing sha256 git repos and I converted one of my minor projects, but since Github only supports sha1 I've moved the repository to codeberg:

https://codeberg.org/kpcyrd/ssh-keyonly

Everything else worked well. I'm also mirroring the repo to Arch Linux' Gitlab […]
Original post on chaos.social
chaos.social
January 12, 2026 at 7:19 PM
I did a writeup of things I was working on in 2025: https://vulns.xyz/2025/12/2025-wrapped/
kpcyrd: 2025 wrapped
Same as last year, this is a summary of what I’ve been up to throughout the year. See also the recap/retrospection published by my friends (antiz, jvoisin, orhun). * Uploaded 467 packages to Arch Linux * Most of them being reproducible, meaning I provably didn’t abuse my position of compiling the binaries * 35 of them are signal-desktop * 29 of them are metasploit * Made 53 uploads to Debian * All of them being related to my work in the debian-rust team, that I’ve been a part of since 2018 * Also applied for Debian Developer status (with 4 Debian Developers advocating for me) * Made 14 commits in Alpine Linux’ aports * 13 of them being package releases * Made 2 commits in NixOS’ nixpkgs * Also joined their Github org * Made 4 commits in homebrew-core * With special focus on polishing the Rust development experience for the RP2040 microcontroller * Lost Onion, my cat of 13 years, to inoperable cancer. He has been with me throughout my entire open source journey (sometimes being credited as co-author) and who looked after me for my entire adult life. You won’t be forgotten. 🐈‍⬛ * Developed 6 hand-held games with embedded Rust, most of them being birthday gifts for people close to me * game-taco-burglar * A motorcycling lockpicker * game-antifa-syndikitty * A nurse with a secret double life * At that point the longest and most in-depth game I built throughout my life * game-chop-chop * A French tetris-spinoff, this was one of my Fusion projects this year * The hardware was specifically designed to be easy to solder/make from readily available parts (~€5 per unit) * I gave away a few devices I made, some people successfully built one on their own * game-ratatat * A space-invader like game about a very enthusiastic seamster * game-octo-space-irs * As an employee of the intergalactic revenue service, you tax the rich through reversing and cracking computer programs * I gifted another copy to a Tor directory authority operator I’m friends with, who was very excited about the concept and levels I designed * game-the-curse-of-the-headless-goose * A turn-based game about an underground kickboxing club * This one was meant to be a rogue-lite (which I needed the savegame library for), but only managed to build the introduction/tutorial unfortunately * Picked up work on apt-swarm again * Replaced the old database code with a custom engine, reducing RAM usage from multiple gigabytes down to ~9MB * Ran a small p2p network all over the world, with ~10-15 locations/countries on average * As part of this, found a bug in tokio that could lead to silent data loss in some cases * Had 2 of my projects explicitly mentioned in the Debian release notes in their “What’s new in Debian 13” summary * Was mentioned in multiple academic papers on arxiv.org: * Reproducible Builds and Insights from an Independent Verifier for Arch Linux (explicitly in the “Acknowledgments” section) * Beneath the Mask: Can Contribution Data Unveil Malicious Personas in Open-Source Projects? * Wolves in the Repository: A Software Engineering Analysis of the XZ Utils Supply Chain Attack * Causes and Canonicalization of Unreproducible Builds in Java * Reproducible Builds for Quantum Computing (mentions rebuilderd) * Was referenced twice on LWN: * Hash-based module integrity checking (mentions me directly) * Fedora change aims for 99% package reproducibility (doesn’t mention me, but rebuilderd 10x) * Published a draft version of PlatypOS, an “Experimental toy unix-like userspace operating system with strong preference towards Rust”. As part of this: * Developed custom pacman-database tooling in Rust instead of bash * During this project I found and reported issues in uutils’ `install` (uutils/coreutils#8033) and `mv` (uutils/coreutils#8044) (both fixed shortly after) * The project stalled because it’s too big to side-quest * Had the first ever CVE issued for software I wrote: CVE-2025-52926 * Found, reported and fixed by a c’t Open Source editor * Published 9 repositories related to my embedded Rust work * embedded-mono-img for all the graphics in my games * rp2040-psp-joystick to demo use of an analog joystick input * rp2040-demo-st7789 to demo a higher resolution screen I experimented with * rp2040-demo-w25qxx to demo how to store data in NOR flash * rp2040-demo-at24cxx to demo how to store data in an EEPROM * embedded-graphics-colorcast a library I developed so I can keep using embedded-mono-img on ST7789/ILI9486 screens - I used tinybmp in one project but it was fairly slow * ch32v003-demo to demo and document the lowend ch32v003 RISC-V microcontroller, with devboards that are commonly sold for €0.50-0.70 on AliExpress (it’s cute but lacks the required 5.1kΩ resistors on the USB-C configuration pins that tell the host to provide 5V, so it won’t work with many USB-C chargers, which is quite annoying) * embedded-savegame an atomic/transactional savegame library, with powerfail-safety and wear-leveling, optimized for flash and EEPROM storage * djb2 a very lightweight non-cryptographic checksum algorithm that replaced my use of CRC32 in the embedded-savegame library, to make it more suitable for the ch32v003 * Contributed to the Reproducible Builds mailing list 30 times * Developed repro-threshold, an integration for apt to act as a rebuilderd client, enforcing a reproducible builds trust policy of your choice * The feature was suggested/requested by a CCC member during MiniDebConf Hamburg 2025 * Collaborated with an openSUSE engineer I’ve known for several years to debug and fix an issue in gtk-rs that caused indeterministic build output for many desktop programs * Volunteered at a soldering workshop for beginners for the 4th year in a row * Completed the first year of volunteering in an awareness team * Wrote 1 blog post (besides this one) * Attended FOSDEM, MiniDebConf, Fusion, the Reproducible Builds summit, the Arch Summit and 39c3 * Hosted sessions at both FOSDEM (1st time) and Fusion (2nd time) * Grew and harvested 2 plants * Traveled to * Denmark * Sweden * Turkey, visiting a good friend * Belgium * Austria * Made and printed * 2 new sticker designs * 2 new hoodie designs * Changed my medication plan * Got 4 new tattoos Thanks to everybody who has been part of my human experience, past or present. Especially those who’ve been closest.
vulns.xyz
January 1, 2026 at 5:02 PM
RE: https://fosstodon.org/@orhun/115775969492350970

haha, maybe I can finally do android development now
fosstodon.org
December 24, 2025 at 7:55 PM
In other news, very happy to see the most popular #rust http client library is switching their default TLS implementation from OpenSSL to #Rustls.

https://github.com/seanmonstar/reqwest/releases/tag/v0.13.0-rc.1
Release v0.13.0-rc.1 · seanmonstar/reqwest
👀 Discussion here if you give it try, thanks! Main breaking changes rustls is now default instead of native-tls rustls provider defaults to aws-lc instead of ring (rustls-no-provider exists if you...
github.com
December 24, 2025 at 4:42 PM
#netcat is both really popular with #linux users, but also quite the train-wreck.

There's multiple mainstream implementations, they all have incompatible commandline interfaces, two of them have been unmaintained for 20 years and lack ipv6 support (netcat-traditional and gnu-netcat).

Debian […]
Original post on chaos.social
chaos.social
December 24, 2025 at 4:04 PM
Out of the 789 npm packages on the Sha1-Hulud list, only 4 have showed up in the dependency trees of any Linux operating system.

Not in the affected versions, but ever.

#supplychainsecurity #infosec
November 25, 2025 at 11:34 AM
Github Actions and the hashFiles incident
lists.reproducible-builds.org
November 23, 2025 at 8:28 PM
The sudo-rs CVE-2025-64517 is all over the news, but it looks like it's not really exploitable in the wild?

It's a very cool find and I'm glad it's fixed, but it's not the unconditional local-root that people seem to think it is? Going from www-data to root with this bug seems to be almost […]
Original post on chaos.social
chaos.social
November 13, 2025 at 10:47 PM
While the bug in async-tar/tokio-tar dubbed #tarmageddon / CVE-2025-62518 is cool on a technical and code-correctness level, I'm calling bullshit on the #rce claim. It's a severe overstatement that isn't backed by the advisory.

Processing a tar stream with a vulnerable version won't execute […]
Original post on chaos.social
chaos.social
October 21, 2025 at 5:18 PM
In 2025 your options when making a website as a non-webdev person are "everybody is upset because it looks AI generated", "everybody is upset because it's bootstrap" and "everybody is upset because you decided the only css is going to be `body { background-color: #db7093; font-family: sans-serif […]
Original post on chaos.social
chaos.social
October 17, 2025 at 8:29 PM
Friendly reminder that many pseudonymous opensource developers are well prepared and equipped for things like "end-to-end encrypted chat gets outlawed".

The cypherpunk movement never really died, it just wasn't necessary while regulators acted mostly reasonable and there are in fact some things […]
Original post on chaos.social
chaos.social
October 8, 2025 at 1:22 PM
I always feel a little fancy when I get to decide about random implementation details during my #debian adventures, like how this error should be handled.

The code assumes an outdated API of the library, that returned either a list of certificates, or a […]

[Original post on chaos.social]
October 1, 2025 at 6:55 PM
Just found this option in Github repository settings :) Very happy this is getting emphasized.
September 18, 2025 at 10:58 PM
For the memes, there's now an apt-swarm node running in Nepal:

38.54.71.220:16169

Joining my collection of "p2p nodes running in countries with active conflicts". https://map.apt-swarm.orca.toys/
Map of apt-swarm p2p locations
🌏⛏ hack the planet 🌈✨
map.apt-swarm.orca.toys
September 13, 2025 at 2:44 PM
Reposted by kpcyrd 🏴
Sticker in der Post!!
September 13, 2025 at 1:54 PM
Open Source is one person
Comments
opensourcesecurity.io
August 29, 2025 at 12:36 PM
If you do #embedded #rust on the #rp2040 with elf2uf2-rs, and you struggle with the recent "Unrecognized ABI" error due to a change in Rust's elf header for `thumbv6m-none-eabi`, I've landed StripedMonkey's patch in both Arch Linux and Homebrew, so if you use those packages, things should work […]
Original post on chaos.social
chaos.social
August 29, 2025 at 8:50 AM
I locked myself out of an account by:

1) starting the process to enable 2FA
2) saving the TOTP secret into bitwarden/vaultwarden
3) enter the confirm code and continue
4) the website askes me to "add a security question", which I didn't want to do, I cancel the setup
5) I delete the TOTP secret […]
Original post on chaos.social
chaos.social
August 25, 2025 at 11:41 PM
When I did my first Debian install, I didn't see coming that a tool I authored would be explicitly mentioned in the Debian release notes ~15 years later. 🖤

https://www.debian.org/releases/trixie/release-notes/whats-new.en.html#debian-progress-towards-reproducible-builds
August 10, 2025 at 11:11 PM
For future reference, to crack the passphrase of your gpg secret key:

```
progpick -e 'env GNUPGHOME=/backup/.gnupg/ gpg --batch --passphrase-fd 0 --pinentry-mode loopback --export-secret-keys YOUR_FINGERPRINT' "$(cat pattern.txt)"
```
August 6, 2025 at 8:35 PM
Malware was recently found in some popular npm pkgs:
https://socket.dev/blog/npm-is-package-hijacked-in-expanding-supply-chain-attack

I checked the affected versions against the whatsrc.org dataset, while most of the packages (eslint-config-prettier, eslint-plugin-prettier, synckit, @pkgr/core […]
Original post on chaos.social
chaos.social
July 25, 2025 at 9:59 AM
For transparency: my #archlinux signing key is expiring, and other packagers have kindly started re-uploading my pkgs with different sigs (also taking care of updates meanwhile).

I struggle to jump through the necessary hoops to recover the pgp key needed to renew my subkey - I chose "better […]
Original post on chaos.social
chaos.social
July 17, 2025 at 10:53 PM
I sell software to software companies that sell software to companies that make software.
June 19, 2025 at 12:49 AM
I did a writeup of things I was working on in 2024: https://vulns.xyz/2024/12/2024-wrapped/
Dear blog. This post is inspired by an old friend of mine who has been writing these for the past few years. I meant to do this for a while now, but ended up not preparing anything, so this post is me writing it from memory. There’s likely stuff I forgot, me being gentle with myself I’ll probably just permit myself to complete this list the next couple of days. I hate bragging, I try to not depend on external validation as much as possible, and being the anarcho-communist anti-capitalist that I am, I try to be content with knowing I’m “doing good in the background”. I don’t think people owe me for the work I did, I don’t expect anything in return, and it’s my way of giving back to the community and the people around me. Consider us even. That being said, I: * Uploaded 689 packages to Arch Linux * Most of which being reproducible, meaning I provably didn’t abuse my position of compiling the binaries * 59 of those are signal-desktop * 34 of those are metasploit * Made 28 commits in Alpine Linux’ aports * 24 of those being package releases * Made 43 uploads to Debian * All of them being related to my work in the debian-rust team, that I’ve been a part of since 2018 * Made 5 commits in NixOS’ nixpkgs * Made 1 commit in homebrew-core * Was one of the people involved in rolling out `_FORTIFY_SOURCE=3` compiler hardening in Arch Linux, for the entire operating system. I wrote lists, tools, patches and my work got me quoted in an “Additional Considerations” section of the OpenSSF compiler hardening guide for C and C++. There are now more, stricter buffer-overflow checks at runtime that hopefully make your computer harder to exploit in 2025. * Was one of the people behind the launch of `reproduce.debian.net` which is analogous to `reproducible.archlinux.org` that I also helped create 5 years ago. Reproducing these packages (and allowing anybody else to do the same) proves the binaries have not been backdoored by the build server (or whoever compiled them), and if there’s a backdoor, you can likely find it in the source code. * Integrated librustls, a memory safe TLS implementation, into Arch Linux’ C dynamic linking ecosystem and became one of the authors of the rustls curl TLS backend * In response to the XZ Jia Tan incident I created whatsrc.org, a source code indexing project. It doesn’t solve anything in itself, but it’s framing the concept of source code inputs and how to reason about them in a way that I consider promising. It also documents and makes it very apparent what specifically is the source code we’re putting into our computers, that would benefit from code reviews. * Contributed to the Reproducible Builds mailing list 33 times * Volunteered at a soldering workshop for beginners for the 3rd year in a row, with people describing me as a good teacher, giving very calm vibes and having endless patience * Reverse engineered the signal username and QR-code feature * Rewrote my tooling for apt.vulns.xyz to use repro-env, the .deb files can now be verified through reproducible builds, and I switched to static Rust binaries because I had trouble targeting multiple Debian/Ubuntu releases with my previous tooling * Wrote 0 blog posts (besides this one) * Wrote 5.937 messages in irc channels * Got mentioned 1.664 times on irc * Attended FOSDEM, Fusion, the Reproducible Builds summit, Hackjunta 2024#2 and 38c3 * Made and printed 8 new sticker designs, and a custom hoodie * Mastered the art of pragmatic zaza cultivation and processing * Got 2 new piercings and 2-3 new tattoos (depending on how you count them) Thanks to everybody who has been part of my human experience, past or present. Especially those who’ve been closest. cheers, kpcyrd ✨
vulns.xyz
May 26, 2025 at 3:28 PM