Arthur Besse
cultural reviewer and dabbler in stylistic premonitions
- 1.03K Posts
- 1.52K Comments
Arthur Besse@lemmy.mlto
Science Memes@mander.xyz•kansas can get fckedEnglish
9·9 months ago
Arthur Besse@lemmy.mlto
Mildly Infuriating@lemmy.world•Product packaging pandering to conservative AmericansEnglish
33·9 months agoI bought some cheap Chinese 2-way radios. The packaging has a big American flag and a “Designed in U.S.A.” claim, which I suspect is bullshit given the company involved. Also, there are two Bible verses referenced. This smacks of pandering to a particular slice of conservative Americans. All I want is cheap radios for skiing with my kids next winter, not a reminder of my country’s socio-political bullshit.
This bullshit is not from the well-known Chinese radio maker Baofeng (baofengradio.com) but rather from a US company called “BTech” which has the deceptive URL BaoFengTech.com.
Arthur Besse@lemmy.mlto
Asklemmy@lemmy.ml•Anyone know a good modern day MP3 player?English
5·9 months agosomething from the “stable ports” list at https://www.rockbox.org/
Arthur Besse@lemmy.mlto
Programmer Humor@programming.dev•The vibecoders are becoming sentientEnglish
2·9 months agoCan someone tell me what vibe coding is?
a term coined 6 months ago for writing software using an LLM https://en.wikipedia.org/wiki/Vibe_coding
Arthur Besse@lemmy.mlOPto
Technology@lemmy.ml•Google executive Ruth Porat calls Trump admin’s climate denialism “fantastic” and calls for data centers to be powered by coal, gas, and nuclearEnglish
121·9 months agoNo evidence of this happened. Blocked.
lol what? it is a pretty well-sourced article, with the main source being remarks in a video which it helpfully links to.
it is 10h long but on youtube one can search the transcript and easily find the parts that form the basis of this article: here are Secretary Burgam’s comments and here is Porat referencing them later.
Arthur Besse@lemmy.mlto
news@hexbear.net•MP spotted using ChatGPT to respond to constituents on the trainEnglish
14·9 months agoall emails are checked for accuracy. Closed AI is not publicly accessible and has better privacy and security than “open AI” systems.
🤔
Arthur Besse@lemmy.mlto
[Dormant] moved to !historymemes@piefed.social@lemmy.world•WhyyyEnglish
4·9 months ago
Arthur Besse@lemmy.mlto
Lefty Memes@lemmy.dbzer0.com•Liberals, standing in the way of progress no matter what!English
2·9 months agothis thread

also this thread

Arthur Besse@lemmy.mlto
HistoryPorn@lemmy.world•Two men examining paper tape from the early British computer WITCH, 1950sEnglish
11·9 months agois this...

pair programming?
Arthur Besse@lemmy.mlOPMto
Cryptography@lemmy.ml•ChaCha12-BLAKE3: Secure, Simple and Fast authenticated and committing encryption for any CPUEnglish
3·9 months agoI’m pretty ignorant of encryption algorithms. This article doesn’t seem to mention side-channel or GPU cracking attack resistance, which Argon2 addresses. KeepassXC’s default right now in ChaCha20-Argon2id.
The key space of a high-entropy 256-bit key is not brute-forceable. Generating a 256-bit key from a lower-entropy string like a passphrase is where you need to be concerned about resisting brute force attacks, but that is orthogonal to the question of how to do encryption using that key.
When KeepassXC says it uses “ChaCha20-Argon2id” i assume this actually means that they are using ChaCha20-Poly1305 with a key derived from the user’s password by Argon2id.
The ChaCha part is the symmetric encryption, while the Poly1305 is for the MAC.
This proposal is, for performance reasons, to replace ChaCha20 with ChaCha12 (which is believed to still provide an adequate amount of security) and to replace the Poly1305 MAC with BLAKE3. The performance gains aren’t particularly relevant for applications like KeepassXC which only needs to encrypt a small amount of data at a time, but as you can see from their benchmarks they’re substantial for applications like TLS where a lot of data needs to be encrypted.
Part of the reason they don’t mention Argon2 here is because in the sort of setting they’re designing for, you don’t typically derive keys from lower-entropy strings like passphrases. But, if you did want to key ChaCha12-BLAKE3 using a passphrase, it would still be a good idea to derive the key using Argon2id!
Arthur Besse@lemmy.mltoLibreByte@lemmy.ml•Should we remove XSLT from the web platform?English
1·9 months ago(tldr: libxslt is a significant source of vulnerabilities and it should absolutely be removed from browsers ASAP.)
Arthur Besse@lemmy.mlto
Technology@lemmy.world•Should we remove XSLT from the web platform?English
5·9 months ago(tldr: libxslt is a significant source of vulnerabilities and it should absolutely be removed from browsers ASAP.)
if they do something, it’s not in your interest
this is often true, but sometimes (like in this case) they are actually doing things that are in (almost) everyone’s interest: making browsers more secure 🙄
(see my other comment in this thread for details)
if they do something, it’s not in your interest
this is often true, but sometimes (like in this case) they are actually doing things that are in (almost) everyone’s interest: making browsers more secure 🙄
(see my other comment in this thread for details)
fuck google generally, but in this case that mastodon post’s characterization that “Respondents overwhelmingly reject the suggestion” is not accurate - lots of people in that thread are in favor of removing it and those who aren’t aren’t making a strong case to keep it.
imo client-side XSLT never needed to be implemented; afaict its primary use is styling RSS feeds and I doubt many people ever actually read RSS feeds styled that way even if millions of feeds are/were.
some important context here
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/127 CVE-2024-55549 (“Being an unpaid volunteer, I also don’t really care about external deadlines. I’ll just make the issue and the fix public and people can patch libxslt themselves. I also realized that I simply do not have enough free time and energy to continue maintaining libxslt and will step down as maintainer.”)
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/128 CVE-2025-24855
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/139 CVE-2025-7424
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/140 CVE-2025-7425
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/144 use-after-free, no CVE assigned yet
- https://gitlab.gnome.org/GNOME/libxslt/-/issues/150 “libxslt is unmaintained” (some good news there, at least: two weeks ago, the guy who reported those five bugs over the last eight months stepped up to be the new maintainer… i assume he probably isn’t a Jia Tan 😅 since he is endorsed by a co-founder of GNOME itself. but, even if he does improve the library drastically, that still won’t justify having browsers include it in their general attack surface imo)
tldr: This obscure “feature” is a significant source of vulnerabilities which attackers are able to compromise endpoints with right now. The GNOME project’s libxslt is used by all modern browsers and has been largely unmaintained for a long time, and it is a pretty sure bet that it has lots more remotely-exploitable bugs (in addition to those which have already been discovered and not yet fixed, or for which fixes are not yet widely distributed).
it sounds like there is also a mostly-working JS replacement for this C++ code; if it is actually possible to ship that and avoid breaking any sites it would be preferable, but, otherwise, i for one would certainly be in favor of dropping browsers’ XSLT support (which was only ever for XSLT 1.0 anyway!) completely ASAP.





















![screenshot of a paragraph of text from wikipedia: ""God is dead" (German: Gott ist tot [ɡɔt ɪst toːt] ⓘ; also known as the death of God) is a statement made by the German philosopher Friedrich Nietzsche. The first instance of this statement in Nietzsche's writings is in his 1882 The Gay Science, where it appears three times.[note 1] The phrase also appears at the beginning of Nietzsche's Thus Spoke Zarathustra."](https://lemmy.ml/pictrs/image/33db11fb-5653-4417-a877-e904b53032d1.png)








