Clarke Thomas

88.3K posts

Clarke Thomas banner
Clarke Thomas

Clarke Thomas

@needcaffeine

Sporting photo taking wanderlust that geeks out on tech & loves fine food/drink.

Road Not Taken Katılım Ocak 2008
2K Takip Edilen2K Takipçiler
Sabitlenmiş Tweet
Clarke Thomas
Clarke Thomas@needcaffeine·
Weird how Black Sheep's are represented by docile creatures. Yet Black Swans are represented by regal but violent creatures. 🤔🤔
English
1
0
7
0
Clarke Thomas retweetledi
BuBBliK
BuBBliK@k1rallik·
MICROSOFT EDGE STORES ALL YOUR PASSWORDS IN PLAIN TEXT edge password manager security fail A security researcher just found that Edge decrypts EVERY saved password at startup and keeps them in memory - even if you never visit those sites. The wild part? Edge still asks for your Windows password to VIEW them in the UI. The passwords are already sitting there, naked in RAM. Chrome only decrypts passwords when you actually need them. Edge just.. doesn't. Microsoft's response when reported: "working as intended" If someone gets admin access on a shared machine, they can dump ALL Edge passwords from ALL logged-in users. Even disconnected ones.
Tom Jøran Sønstebyseter Rønning@L1v1ng0ffTh3L4N

Microsoft Edge loads all your saved passwords into memory in cleartext — even when you’re not using them.

English
120
850
4.3K
439K
Clarke Thomas retweetledi
Aviation Archive - Tim Farmer
Aviation Archive - Tim Farmer@aviationarchive·
To comply with the START I treaty, the US Air Force had to eliminate 365 B-52 bombers from its inventory. Initially, the B-52s were chopped into pieces with a 13,000-pound guillotine supported by a crane because that was the only know way to stop a B-52.🫡
English
139
380
5.7K
761.2K
Clarke Thomas retweetledi
Glenn Tunes
Glenn Tunes@glenn_tunes·
DEAR GOD THE WHITE HOUSE LOOKS LIKE A CHEAP RUSSIAN 80S WHORE HOUSE 😬
Glenn Tunes tweet media
English
5.7K
12.7K
71K
1.1M
Clarke Thomas retweetledi
Nav Toor
Nav Toor@heynavtoor·
In 2015, the Chinese police visited a programmer's home. They told him to stop working on his code. They told him to delete it from GitHub. He posted one final message before he obeyed: "Two days ago the police came to me and wanted me to stop working on this. Today they asked me to delete all the code from GitHub. I have no choice but to obey. I hope one day I'll live in a country where I have freedom to write any code I like without fearing." Then he deleted the repo. Then he deleted the message. Then something happened the Chinese government did not plan for. Within hours, the code was mirrored to thousands of other GitHub accounts. Within days, it became the #1 trending repository on GitHub globally. Within weeks, every Chinese developer who could compile code had a copy. The government tried to make it disappear. The act of trying made it permanent. The project is called Shadowsocks. The programmer's username was clowwindy. He built a tiny piece of software that let anyone in China bypass the Great Firewall and reach the open internet. No subscription. No company. No account. You set up a server somewhere outside China. You connect to it. Your traffic looks like normal encrypted web browsing, so the firewall cannot tell you are using it. Why this terrified the Chinese government in 2015: → It was open source. Anyone could compile it. → It was small. The whole protocol fit in a few hundred lines of code. → It looked like normal HTTPS traffic. The Great Firewall could not distinguish it. → It required no money. No accounts. No central server to seize. → It worked on every operating system. You cannot arrest a protocol. You can only arrest the person who wrote it. So they did. And the protocol kept spreading. shadowsocks-windows: 59,300+ stars. GPLv3. Still online 11 years later. The 2015 commits the Chinese government wanted deleted are still in the history. clowwindy was forced to walk away. The code never did. But DO NOT install it. The Great Firewall has feelings too. 100% Open Source. (Link in the comments)
Nav Toor tweet media
English
33
202
1.2K
109.6K
Clarke Thomas retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
230
2.7K
11.7K
2.4M
Clarke Thomas retweetledi
Barack Obama
Barack Obama@BarackObama·
Today’s Supreme Court decision effectively guts a key pillar of the Voting Rights Act, freeing state legislatures to gerrymander legislative districts to systematically dilute and weaken the voting power of racial minorities - so long as they do it under the guise of “partisanship” rather than explicit “racial bias.” And it serves as just one more example of how a majority of the current Court seems intent on abandoning its vital role in ensuring equal participation in our democracy and protecting the rights of minority groups against majority overreach. The good news is that such setbacks can be overcome. But that will only happen if citizens across the country who cherish our democratic ideals continue to mobilize and vote in record numbers - not just in the upcoming midterms or in high profile races, but in every election and every level.
English
52K
50.3K
297.8K
71.8M
Clarke Thomas retweetledi
Liam Nissan™
Liam Nissan™@theliamnissan·
We need a Gen X president. No more boomers, you fucked everything up
English
1.1K
1.8K
19.6K
249.4K
Clarke Thomas
Clarke Thomas@needcaffeine·
At a conservative location earlier, there was talking about the advances in medicine outside the US, and when will it come to the US or maybe they'll be doing medical tourism?!
English
0
0
0
8
Clarke Thomas
Clarke Thomas@needcaffeine·
never heard of "to 86" to kill, always to cancel..especially in a restaurant.
English
0
0
0
3
Clarke Thomas retweetledi
Dave Troy
Dave Troy@davetroy·
Not sure why there is so much confusion around this, but: 1. Cole Allen never reached the ballroom. 2. He never fired a shot. 3. He was not shot. 4. He was going to use buckshot, if he had reached the ballroom, but he didn’t. 5. The shots fired were by Secret Service; one officer took friendly fire, but it was stopped by tactical gear. 6. Allen was apparently subdued (tackled). 7. Officers recovered a handgun, a long-gun, and knives from Allen. 8. The security perimeter was inside the hotel and functioned as designed.
English
1
1.4K
5.8K
515.2K
Clarke Thomas
Clarke Thomas@needcaffeine·
The US authorities are asking for hundreds of millions in additional funding not to convert the $300 million luxury 747 jet gifted by Qatar but to rescue Boeing's hopelessly delayed Air Force One program from slipping even further behind schedule share.google/qx5cJ60clTsnzA…
English
0
0
0
27
Clarke Thomas
Clarke Thomas@needcaffeine·
Maybe the North Korea Meetup for Trump was all to learn about how to plaster himself everywhere?
English
0
0
0
5
Clarke Thomas retweetledi
BrooklynDad_Defiant!☮️
BrooklynDad_Defiant!☮️@mmpadellan·
Holy shit, this is BRILLIANT: This dude breaks down why everyone thinks the whole WHCD event was fake... everything about trump is FAKE. Best video you'll see today.
English
1.1K
19.7K
65.6K
1M
Clarke Thomas retweetledi
Kim Dotcom
Kim Dotcom@KimDotcom·
TUCKER: “How much does it matter what Americans think?” HUCKABEE: “It matters every bit.” TUCKER: “80% oppose Iran war.” HUCKABEE: “We don’t live in a world where polls dictate policy.” TUCKER: “Oh, I thought you said it matters what Americans think.”
English
453
6.5K
34.2K
786.1K
Clarke Thomas
Clarke Thomas@needcaffeine·
It was always hyped that Democrats used tax money for too many societal issue, in reality the current Republicans waste more on problems which don't effect Americans directly.
English
0
0
0
0
Clarke Thomas retweetledi
unusual_whales
unusual_whales@unusual_whales·
Senate Republicans push bill to authorize $400 million for White House ballroom, per the Hill
English
178
64
676
121K
Clarke Thomas
Clarke Thomas@needcaffeine·
Why does Trump want the ballroom in "the swamp?"
English
0
0
0
12
Clarke Thomas retweetledi
Maine
Maine@TheMaineWonk·
‼️ Trump Corruption: Taxpayers paying Ballroom Builder after secret no-bid contract inflates value 3x - Biden admin estimated $3.3 MILLION for 2 broken fountains in Lafayette Park: - Trump admin secretly bumped it to $11.9M then $17.4 MILLION with double inflation padding + “schedule compression” magic Source: NYT
Maine tweet media
English
10
168
274
6.1K