Reading List
The most recent articles from a list of feeds I subscribe to.
Artemis II Desktop Pictures
Nick Heer: NASA has put a few hundred photos on Flickr with some awesome views — and I must emphasize how the word “awesome” undersells these images. I am using this one as the wallpaper on my iMac right now, and it feels like a pretty good use of a big, high-resolution display. Previously: Default […]
Artemis II’s Fault-Tolerant Computer
Logan Kugler (via Hacker News): To ensure those wrong answers never reach the spacecraft’s thrusters, NASA moved beyond the triple redundancy of traditional systems. Orion utilizes two Vehicle Management Computers, each containing two Flight Control Modules, for a total of four FCMs. But the redundancy goes even deeper: each FCM consists of a self-checking pair […]
Privacy & Security Settings Don’t Show Intent-Based Access
Howard Oakley (Hacker News): Thus, access to a protected folder by user intent, such as through the Open and Save Panel, changes the sandboxing applied to the caller by removing its constraint to that specific protected folder. As the sandboxing isn’t controlled by or reflected in Privacy & Security settings, that allows TCC, in Files […]
Notifications Privacy
Joseph Cox: The FBI was able to forensically extract copies of incoming Signal messages from a defendant’s iPhone, even after the app was deleted, because copies of the content were saved in the device’s push notification database, multiple people present for FBI testimony in a recent trial told 404 Media. Rosyna Keller: Push Notifications can […]
Mythos and Glasswing
Rich Mogull: Anthropic, the company behind the Claude AI chatbot, made two security announcements that were shocking for many but seen as inevitable by those of us working in AI security. First, it announced Mythos Preview, a new, non-public AI model that turns out to be startlingly good at finding security flaws in software. The […]