Being able to unlock the bootloader of a device you own should be legally mandated. I own the hardware, I should own the functionality of it too. I can get the modem being illegal to modify, since that has a ton of regulatory and public safety tape around it, but the OS being irreplacible is dumb.
Also, unlocking the bootloader should be as simple as sending a command to the device. Screw this trend of needing unlock codes (looking at you Motorola, Fairphone, and Co.).
Boost this if you think DENIC should just hand out free hosts files in the meantime
mitosis is just a scam by Big Biology to cell more
my dear sysops: where do you store backups? 
iām looking for something below 2EUR/TB, because otherwise itās just more cost-effective to buy drives and create a small backup serverā¦
the whole thing would be in the ballpark of 30-40TB, so if you want to suggest hetzner storageboxes⦠uhā¦
With Windows 9x Subsystem for Linux you can run all your favourite Windows and Linux apps side-by-side with a modern Linux kernel running cooperatively with the Windows kernel in ring 0. And unlike modern WSL, no hardware virtualisation is used so even your 486 can run it!
Please enjoy, I think this might be one of my greatest hacks of all time
Today is Friday, and as every Friday, like clockwork, I will turn up the "mess with the crawlers" knob. Today is also the first of May, where we celebrate not one, but two birthdays: my Wife's and mine.
In good Hobbit tradition, on birthdays, we do not get presents. We give persents. On this beautiful day, here's my present to you all: some of the crawlers will happily honor Ā Content-Disposition: attachment; filename="/lib/libc.so.6" and the like. Yes, they'll try to save the file to an absolute path of your choosing.
Now, they usually don't run as root, but there's so many other ways to exploit this vulnerability! Like, if a crawler was a bash script using curl without -q, ~/.curlrc would present a few fun opportunities.
Combine that with other exploits, such as copy.fail, and remember that many of the systems used for crawling are ancient and contain multitudes of such vulnerabilities.
Happy Friday!
OpenWrt is still vulnerable to copyfail and doesnāt compile algif_aead as a module or include BPF-LSM support
Edit: it does, in fact, compile algif_aead as a module (kmod-crypto-user)
If you are as annoyed as me about the fancy CVE-2026-31431 website not actually mentioning what Kernel versions to update to (only mentioning the commit rev), I translated this for you by looking through the releases manually and checking if they contain the fix.
The following upstream kernel tags contain the fix:
6.6.137+
6.12.85+
6.18.22+
6.19.12+
7.0+
But of course your distro might also apply the patches on any other version, and they will hopefully provide that information.
Edit: added 6.6/6.12 versions
Quickly dove into the copy.fail exploit.
1. Yes, it's real.
2. Current chain can write any arbitrary content to any user-readable file (into the page cache).
3. Current chain relies on an available target suid binary that you can open() as a lowpriv user.
4. Current exploit relies on that binary being /bin/su and then being able to execve(/bin/sh, 0, 0) (which doesn't work on alpine, etc.). The former is easily replaced in the code. The latter needs a rebuilt payload ELF (also easy).
Want to make your system immune to copyfail (CVE-2026-31431) but compiled your kernel with CONFIG_CRYPTO_USER_API_AEAD=y so you canāt disable the module and donāt want to reboot? Use BPF-LSM to block AF_ALG sockets from being created!
/* SPDX-License-Identifier: GPL-2.0-or-later OR MIT */
#include <linux/bpf.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#define EPERM 1
#define AF_ALG 38
char LICENSE[] SEC("license") = "Dual MIT/GPL";
SEC("lsm/socket_create")
int BPF_PROG(socket_create_block_af_alg, int family, int type, int protocol, int kern, int ret)
{
if (ret) return ret; /* don't override a previous denial */
if (family == AF_ALG) return -EPERM;
return 0;
}
Compile with clang -Wall -Wextra -Wno-unused-parameter -g -O2 -target bpf -c -o nocopyfail.o nocopyfail.c and load with bpftool prog load nocopyfail.o /sys/fs/bpf/nocopyfail autoattach (as root).

Iām not saying I need new electronics but who wouldnāt want a I apologize but I cannot complete this task it requires using trademarked brand names which goes against OpenAI use policy. Is there anything else I can assist you with-16ā 32GB RAM
In light of recent events, I just want to put out a PSA
You are seen
You are loved
You are valuable
Iām kind of terrible with words, but I like being here for people. If you ever feel alone, please reach out. I promise there are people who see you and care.
Linux HQ) The Pink āā¾ā¶āā¤ā½ā [AS208709]
my wife just reminded me of a very funny story. I ordered a bench PSU from one of the big electronics suppliers and when the box arrived only the power cable was in there, no bench PSU. so I called them up, the warehouse guy was able to confirm the shipping weight was way off, and we ended up chatting about funny shipping errors. one of their newbies had once gone to a shelf, it was empty, so assumed the shelf itself was the item and shipped it out. but that wasn't the funniest one.