SHA1-Hulud the Second Comming – Postman, Zapier, PostHog All Compromised via NPM

It’s another Monday morning, sitting down at the computer. And I see a stack of alerts from the last hour of packages showing signs of malware in our triage queue. Having not yet finished my first cup of coffee, I see Shai Hulud indicators. Yikes, surely that’s a false positive? Nope, welcome to Monday, Shai […]
Show HN: Cynthia – Reliably play MIDI music files – MIT / Portable / Windows

Reliably play midi music files from a folder or “.m3u” play list. Adjust playback speed, volume and output device on-the-fly during playback. A large playback progress bar makes jumping forward and backward in time a breeze with just a single click or tap. Supports “.mid”, “.midi” and “.rmi” files in format 0 (single track) and […]
Fast Lua runtime written in Rust

— Create a new server local server = require(“http”).server.new() — Register a route server:get(“/”, function() return “hello from default Astra instance!” end) — You can also use the local variables within routes local counter = 0 server:get(“https://astra.arkforge.net/count”, function(request, response) — consume the request body print(request:body():text()) — set header code (Optional) response:set_status_code(300) — set headers (Optional) […]
NSA and IETF, part 3: Dodging the issues at hand
cr.yp.to: 2025.11.23: NSA and IETF, part 3 Table of contents (Access-I for index page) 2025.11.23: NSA and IETF, part 4: An example of censored dissent. #pqcrypto #hybrids #nsa #ietf #scope 2025.11.23: NSA and IETF, part 3: Dodging the issues at hand. #pqcrypto #hybrids #nsa #ietf #dodging 2025.11.23: NSA and IETF, part 2: Corruption continues. #pqcrypto […]
General principles for the use of AI at CERN
Artificial intelligence (AI) can be found at CERN in many contexts: embedded in devices, software products and cloud services procured by CERN, brought on-site by individuals or developed in-house. Following the approval of a CERN-wide AI strategy, these general principles are designed to promote the responsible and ethical use, development and deployment (collectively “use”) of […]
Show HN: Network Monitor – a GUI to spot anomalous connections on your Linux
Nice work! I do want to say, I don’t like having to rely on scraping ss output. But that’s not a comment on this project – I have done the exact same thing. It just proved to be the most expedient way given the constraints I was under. I suspect there is a lot of […]
Quake Engine Indicators
Quake Engine Indicators Nov 24, 2025 Quake Engine Indicators I was working on a bug in Chocolate Quake netcode. The issue was an edge case where starting two clients on the same machine resulted in the second one zombifying the first one. When the bug occurred there was no disconnection but the client could no […]
Build a Compiler in Five Projects
Class website here: https://kmicinski.com/cis531-f25 Are you interested in building a compiler? Learning how functional languages are implemented? Gaining a bit of practical experience with x86-64 assembly language? If so, I invite you to try your hand at the projects in my class, CIS531. CIS531 is a masters-level class on compiler design which assumes that (a) […]
A One-Minute ADHD Test

I’m writing 30 posts in 30 days at Inkhaven. This is number 23. There is a six-question test for ADHD that takes a minute to complete. If you score highly on it, you are likely to have ADHD and have a strong reason to talk to a psychiatrist about getting medication. It’s a low-effort way […]
RuBee

2025-11-22 I have at least a few readers for which the sound of a man’s voice saying “government cell phone detected” will elicit a palpable reaction. In Department of Energy facilities across the country, incidences of employees accidentally carrying phones into secure areas are reduced through a sort of automated nagging. A device at the […]