GeistHaus
log in · sign up
72 pages link to this URL
The Philosophy of the Open Source Pledge

Today, we launched the Open Source Pledge. Virtually all companies use Open Source software 1, making the Open Source ecosystem crucial to virtually all of the technology we use. That Open Source software is created and supported by maintainers. But the companies that use Open Source software almost never pay the maintainers anything. This means that the maintainers end up doing a huge amount of work for free, often as a second shift after their dayjob so that they can pay the bills, leaving them burned out and overworked, and leaving the projects they maintain at risk of serious security issues.

0 inbound links article en
Today I Learned

Sharing things I learned something interesting from. Unlike my curated and maintained links, these are more more one and done resources.

12 Days of Christmas – Reflections from a Pentester - TrebledJ's Pages

Secure Your Janky Systems, 2024 Edition Over the past year, I've been pentesting various systems, diving into a variety of web apps, mobile apps, IoT devices, desktop apps, and the occasional Active Directory network. Some were...

0 inbound links article en cybersecurity trebledj12dayschristmasreflectionspentestersecurejankysystems2024editioninfosecsoftware-engineeringreflectionwebpentesting
Richard WM Jones

Virtualization, tools and tips

0 inbound links website en Uncategorized interviewlinuxvideoxzrisc-vdisk imagelibnbdnbdqcow2qemuvirtualizationperformancehiringjobsvirt-v2vvmwarenbdkitnyancatsecuritydevconf.czlibguestfsfedorahackingnewsradioextensionshardware
More, and More Extensive, Supply Chain Attacks

Open source components are getting compromised a lot more often. I did some counting, with a combination of searching, memory, and AI assistance, and we had two in 2026-Q1 ( trivy, axios), after four in 2025 ( shai-hulud, glassworm, nx, tj-actions), and very few historically [1]: Earlier attacks were generally compromises of single projects, but some time around Shai-Hulud in 2025-11 there sta

0 inbound links article en airisktech
The Dependency Avalanche — Vivian Voss

644 strangers in your package.json. The XZ backdoor was caught by one engineer noticing half a second of latency. Next time it might be 50 milliseconds. Next time it might be no perceptible drift at all.

0 inbound links website en
My New Secure Baseline for GitHub

In March there was a particularly nasty supply chain attack targeting Aqua Security and their tools, including the widely used Trivy security scanner, which later spread to other projects. The attack was carried out by a threat actor named TeamPCP and began by exploiting an insecure GitHub Actions workflow that utilised the pull_request_target trigger – a type known to be dangerous and easily misused. Using this, they stole a Personal Access Token granting wider access to the aquasecurity org.

Today I Learned

Sharing things I learned something interesting from. Unlike my curated and maintained links, these are more more one and done resources.

pcsc-lite now uses meson build tool

With the version 2.2.0 of pcsc-lite I just released (see New version of pcsc-lite: 2.2.0) the recommanded tool to configure and build pcsc-lite is now meson. Problems with autoconf/automake The chang

0 inbound links article en pcsc-lite CC BY-NC-SA 4.0
I was interviewed on NPR Planet Money

I was interviewed on NPR Planet Money about my small role in the Jia Tan / xz / ssh backdoor. NPR journalist Jeff Guo interviewed me for a whole 2 hours, and I was on the program (very edited) for …

0 inbound links article en Uncategorized hackingnewsradioxz
Veritasium

I was interviewed on Veritasium about the rise of Linux and the XZ hack.

0 inbound links article en Uncategorized interviewlinuxvideoxz
The new PostgreSQL 17 make dist

When the PostgreSQL project makes a release, the primary artifact of that is the publication of a source code tarball. That represents the output of all the work that went into the creation of the PostgreSQL software up to the point of the release. The source tarball is then used downstream by packagers to make binary packages (or file system images or installation scripts or similar things), or by some to build the software from source by hand.

1 inbound link article en
R.L. Dane
1 inbound link en HumorBooksEntertainmentEthicsLifePhilosophyProseQuickPostTechWriting 100DaysToOffloadADHDComputingEntertainmentEthicsFOSS (Free and Open Source Software)HumorNon-religious postPolemicSocial MediaUNIX
Investigating Linux graphics

I learn how to draw a triangle with a GPU, and then trace the code to find out how the graphics system works (or doesn't), looking at Mesa3D, GLFW, …

Heartbleed and XZ backdoor learnings: open source infrastructure can be improved efficiently with moderate funding

The XZ Utils backdoor, discovered last week, and the Heartbleed security vulnerability ten years ago, share the same ultimate root cause. Both of them, and in fact all critical infrastructure open source projects, should be fixed with the same solution: ensure baseline funding for proper open source maintenance.\n

0 inbound links article en Post [open sourcesecuritysoftware vulnerabilitiesdigital infrastructure]
The Great Refactor | IFP

How to secure critical open-source code against memory safety exploits by automating code hardening at scale

4 inbound links article en Emerging Technology
The agency case for open source · Joost.blog

Open source spent thirty years winning the cost argument. AI is making that irrelevant. What replaces it (the agency argument) is still open.

0 inbound links article en Open Source Open SourceAI
flawed.net.nz

Hacking, hardware, software, and general curiosities of computing machinery! Docendo discumus.

Better Datamash Build Story with Meson

This article is a small case study on introducing the Meson build tool into a legacy Autotools and Gnulib centric code base, i.e. the GNU Datamash project. With Meson, the result builds twice as fast and configures one order of magnitude faster while only requiring a few hundred lines …

0 inbound links article en
Don’t trust, verify

Software and digital security should rely on verification, rather than trust. I want to strongly encourage more users and consumers of software to verify curl. And ideally require that you could do at least this level of verification of other software components in your dependency chains. Attacks are omnipresent With every source code commit and … Continue reading Don’t trust, verify →

0 inbound links article en cURL and libcurl cURL and libcurlSecurity
Private Open Source

Open source communities depend on a fundamental assumption that is no longer true: the presumption of good faith actors. The hosts serving free and open source code are scraped relentlessly, denying service to developers. Once that code has been assimilated into various models it is washed of all attribution and license information, denying rights of the developers. Some subset of users then feel empowered, emboldened, I’m not sure what exactly by these models and lob massive thousand line changes back at the developers. Nearly every technology has the possibility to be used for positive and negative effects, but free and open source communities are being harmed from multiple directions right now.

0 inbound links article en opensourcebuoyantdataai
Reproducible and minimal source-only tarballs
1 inbound link en generalsecurity android (7)bootstrappable (4)crypto (5)debian (48)devuan (4)ed25519 (6)fsdg (4)fsf (5)git (7)gitlab (16)gnome (5)gnu (37)gnuk (8)gnupg (17)gnutls (4)gsasl (5)guix (16)i9300 (4)ietf (10)key (4)laptop (5)lenovo (4)linux (7)neo (4)openpgp (20)openssh (5)openwrt (6)pgp (5)pipeline (4)pureos (10)replicant (7)reproducible (11)rsa (5)ryf (4)s3 (6)sasl (8)security (20)sigstore (5)smartcard (6)smartcards (4)ssh (6)supply-chain (8)trisquel (25)ubuntu (12)yubikey (6)
Verified Reproducible Tarballs
0 inbound links en general android (7)bootstrappable (4)crypto (5)debian (48)devuan (4)ed25519 (6)fsdg (4)fsf (5)git (7)gitlab (16)gnome (5)gnu (37)gnuk (8)gnupg (17)gnutls (4)gsasl (5)guix (16)i9300 (4)ietf (10)key (4)laptop (5)lenovo (4)linux (7)neo (4)openpgp (20)openssh (5)openwrt (6)pgp (5)pipeline (4)pureos (10)replicant (7)reproducible (11)rsa (5)ryf (4)s3 (6)sasl (8)security (20)sigstore (5)smartcard (6)smartcards (4)ssh (6)supply-chain (8)trisquel (25)ubuntu (12)yubikey (6)
Independently Reproducible Git Bundles
1 inbound link en general android (7)bootstrappable (4)crypto (5)debian (48)devuan (4)ed25519 (6)fsdg (4)fsf (5)git (7)gitlab (16)gnome (5)gnu (37)gnuk (8)gnupg (17)gnutls (4)gsasl (5)guix (16)i9300 (4)ietf (10)key (4)laptop (5)lenovo (4)linux (7)neo (4)openpgp (20)openssh (5)openwrt (6)pgp (5)pipeline (4)pureos (10)replicant (7)reproducible (11)rsa (5)ryf (4)s3 (6)sasl (8)security (20)sigstore (5)smartcard (6)smartcards (4)ssh (6)supply-chain (8)trisquel (25)ubuntu (12)yubikey (6)
Introducing the Debian Libre Live Images
0 inbound links en debian android (7)bootstrappable (4)crypto (5)debian (48)devuan (4)ed25519 (6)fsdg (4)fsf (5)git (7)gitlab (16)gnome (5)gnu (37)gnuk (8)gnupg (17)gnutls (4)gsasl (5)guix (16)i9300 (4)ietf (10)key (4)laptop (5)lenovo (4)linux (7)neo (4)openpgp (20)openssh (5)openwrt (6)pgp (5)pipeline (4)pureos (10)replicant (7)reproducible (11)rsa (5)ryf (4)s3 (6)sasl (8)security (20)sigstore (5)smartcard (6)smartcards (4)ssh (6)supply-chain (8)trisquel (25)ubuntu (12)yubikey (6)
fwupd and xz metadata

A few people (and multi-billion dollar companies!) have asked for my response to the xz backdoor. The fwupd metadata that millions of people download every day is a 9.5MB XML file -- which thankfully is very compressible. This used to be compressed as gzip by the LVFS, making it a 1.6MB download for end-users, but...

0 inbound links article en Uncategorized
daniel.haxx.se

curl, open source and networking

0 inbound links website en cURL and libcurlSecurityTechnology AIcURL and libcurlSecurityBooksreleaseCVEemailURLgitstatsstatistics
xz backdoor - Dmitry Kudryavtsev

A malicious backdoor was discovered in xz library that implements LZMA compression. xz, among many other places, is used, indirectly, in sshd. My attempt to explain what happened.

1 inbound link article en Security CC BY-NC 4.0
ghidra-delinker-extension is snowballing out of control

As the lack of updates might suggest, I’ve taken a break from my Tenchu: Stealth Assassins reverse-engineering/decompilation project. There’s a bunch of reasons for that and some of them are possibly relevant for whatever readership I have, so I figured I might as well write about them here.

0 inbound links article en
I'm done with Ubuntu

A few busted upgrades and the heavy-handed push of a software packaging solution has ruined Ubuntu for me.

1 inbound link article en posts Ramblings