Pixel

1.7K posts

Pixel banner
Pixel

Pixel

@CodeMeAPixel

Just a guy with over a decade of software development experience fueled by way too much coffee & homelab experiments. | 🧑‍💻 @TryByteSend | 💍 @CallMeAByte

🇨🇦 Canada Katılım Mayıs 2018
75 Takip Edilen492 Takipçiler
Pixel
Pixel@CodeMeAPixel·
Finally took a breath to document the chaos. From moving to CEO at NodeByte to shipping Emberly v2.4.2 and ByteSend v0.2.6, the first 4 months of 2026 have been a gauntlet. Detailed 2026 Q1 review is live 👇 codemeapixel.dev/blog/2026-q1-r…
English
0
0
3
50
Pixel retweetledi
nader dabit
nader dabit@dabit3·
This is crazy. The hacker installed a dead-man's switch that will wipe your computer if you revoke the GitHub token they stole from you. Revoking the token is what triggers the wipe.
nader dabit tweet media
TANSTACK@tan_stack

SECURITY ADVISORY — TanStack npm packages A supply-chain compromise affecting 42 @tanstack/* packages (84 versions total) was published to npm earlier today at approximately 19:20 and 19:26 UTC. Two malicious versions per package. Status: ACTIVE — packages are deprecated, npm security engaged, publish path being shut down. Severity: HIGH — payload exfiltrates AWS, GCP, Kubernetes, and Vault credentials, GitHub tokens, .npmrc contents, and SSH keys. If you installed any @tanstack/* package between 19:20 and 19:30 UTC today, treat the host as potentially compromised: • Rotate cloud, GitHub, and SSH credentials immediately • Audit cloud audit logs for the last several hours • Pin to a prior known-good version and reinstall from a clean lockfile Detection — the malicious manifest contains: "optionalDependencies": { "@tanstack/setup": "github:tanstack/router#79ac49ee..." } Any version with this entry is compromised. The payload is delivered via a git-resolved optionalDependency whose prepare script runs router_init.js (~2.3 MB, smuggled into each tarball at the package root). Unpublish is blocked by npm policy for most affected packages due to existing third-party dependents. All 84 versions are being deprecated with a SECURITY warning, and npm security has been engaged to pull tarballs at the registry level. Full technical breakdown, complete package and version list, and rolling status updates: github.com/TanStack/route… Credit to the security researcher for responsible disclosure.

English
146
1K
9.6K
1.7M
Pixel
Pixel@CodeMeAPixel·
Is it just me, or is 70% of the day just a constant internal battle to keep going? Doing my best, but honestly? This "trying" thing is becoming a full-time job and I’m exhausted.
English
1
0
1
33
Pixel
Pixel@CodeMeAPixel·
The open web is becoming a walled garden. Google Cloud Fraud Defense is here, and it’s effectively making "Privacy" a suspicious behavior. My latest post breaks down the silent 2025 rollout and the technical lockout of de-Googled users. Read more: codemeapixel.dev/blog/architect…
Pixel tweet media
English
0
0
0
58
Pixel retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 ALARMING: Google now treats privacy as suspicious behavior by default. Users of GrapheneOS, CalyxOS, /e/OS, and other deGoogled Android phones are being locked out of millions of websites unless they install the exact Google Play Services software they deliberately removed. GrapheneOS is recommended by the EFF and used by journalists, lawyers, and activists in high-risk environments. The audience most likely to read Google's data practices and refuse its terms is now flagged as fraudulent for that exact decision. What happened?: ▪️ Google announced "Cloud Fraud Defense" at Cloud Next on April 22-23, 2026, branding it "the next evolution of reCAPTCHA." Existing reCAPTCHA customers were auto-migrated. ▪️ When the system flags traffic as suspicious, the old click-the-bus puzzle is gone. Users get a QR code instead. ▪️ Scanning the QR code requires Google Play Services running on the device. Internet Archive snapshots show this requirement has been live since at least October 2025, silently rolled out for 7 months before anyone noticed. ▪️ No Play Services = no QR scan = locked out. The bigger picture: ▪️ Google already tried this in 2023. It was called Web Environment Integrity (WEI), and it would have let Google decide which devices were "real enough" to access the web. Standards bodies and the public pushed back hard, and Google killed it. Three years later, the same idea is back, just hidden behind a QR code instead of a browser feature. ▪️ reCAPTCHA runs on millions of websites. Every developer who keeps using it is now, by default, telling deGoogled Android users they're not welcome...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
555
5.1K
17.1K
1.6M
Pixel retweetledi
ByteSend
ByteSend@TryByteSend·
The hunt is over! ByteSend is officially live on @ProductHunt! Stop fighting your SMTP settings and start sending emails that actually land. To celebrate, we’re giving you 2 MONTHS FREE on our Lite and Hobby plans! 🎁 Code: PH_60DAYS 👉 Support us here: producthunt.com/products/bytes…
English
0
2
3
204
Pixel
Pixel@CodeMeAPixel·
@npmjs hey there, I’m having issues logging into my NPM accounts as it’s asking me for a verification code but never actually rolls out an email 🤔 any help would be appreciated!
Pixel tweet media
English
1
0
1
49
Pixel retweetledi
ByteSend
ByteSend@TryByteSend·
We just shipped a update that improves our deliverability and fixes some more known pesky UI bugs: #v0.2.2" target="_blank" rel="nofollow noopener">bytesend.cloud/changelog#v0.2…
English
0
1
2
85
Pixel
Pixel@CodeMeAPixel·
In the process of slowly moving all my projects under the @NodeByteLTD umbrella. Who knew this could be such a lengthy task! If you didn’t know I also updated the NodeByte website you should check it out and let me know what you think nodebyte.co.uk
English
0
2
5
118
Pixel retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Critical Chrome Vulnerabilities Let Attackers Execute Arbitrary Code – Update Now! Source: cybersecuritynews.com/chrome-vulnera… Google has rolled out a crucial security update for its Chrome browser, addressing 31 vulnerabilities that could leave systems exposed to severe cyber threats. Released on April 15, 2026, this Stable Channel update requires immediate attention from users worldwide, as the most severe flaws could allow attackers to execute arbitrary code on targeted machines. The latest Chrome update, bringing the browser to version 147.0.7727.101/102 for Windows and macOS, and 147.0.7727.101 for Linux, tackles a massive batch of security defects. #cybersecuritynews
Cyber Security News tweet media
English
8
50
175
12.2K
Pixel
Pixel@CodeMeAPixel·
What happens when the guy that everyone relies on, needs someone to rely on?
GIF
English
0
0
0
31
Pixel
Pixel@CodeMeAPixel·
I haven’t been feeling like myself lately and I’m sure that’s noticeable, so let’s talk about it, check out my new blog post 👇 codemeapixel.dev/blog/lost-in-m…
English
0
0
2
132
Pixel retweetledi
Emberly
Emberly@TryEmberly·
Coming in v2.4.2: named API keys. Up to 10 per account, labeled, tracked, independently revocable. The legacy upload token isn't going anywhere but this is how you should be authenticating your integrations going forward.
Emberly tweet media
English
0
1
2
73
Pixel
Pixel@CodeMeAPixel·
If I could shut off my devices and disappear from this fucked up world trust me when I say I would 🫡 I’m so done lately it’s not even funny
English
0
0
1
52
Pixel
Pixel@CodeMeAPixel·
You know even months after its shutdown I still get messages about @HeyItsMellow and when I will be brining it back online. I’m doing everything I can in this ongoing battle with Discord but I should have an update for you all soon 🫡
English
0
0
1
60
Pixel
Pixel@CodeMeAPixel·
Gotta love those stereotypical Discord mods that think they know everything 🤷🥱
English
0
0
2
67
Pixel
Pixel@CodeMeAPixel·
My brain is exactly like that junk drawer most people have in their kitchen, it’s full of tangled chords, three dead batteries a receipt from two years ago and absolutely nothing i actually need right now! 😮‍💨😩
GIF
English
0
0
0
52