Stefán Jökull Sigurðarson

15.4K posts

Stefán Jökull Sigurðarson banner
Stefán Jökull Sigurðarson

Stefán Jökull Sigurðarson

@stebets

Microsoft MVP, Code Wrangler/Chief Iceberg Rider and Employee 1.0 @haveibeenpwned, @dotnetfdn member, @[email protected]. He/him

Reykjavík, Iceland Katılım Şubat 2009
1.3K Takip Edilen2.3K Takipçiler
Stefán Jökull Sigurðarson retweetledi
Charlie Eriksen
Charlie Eriksen@CharlieEriksen·
Speaking of worms, my talk about worms in our supply chain at NDC Security in Oslo was released yesterday: youtube.com/watch?v=Lt6GwB…
YouTube video
YouTube
English
0
5
6
1.6K
Jökull Solberg
Jökull Solberg@jokull·
this isn't what /autoresearch is designed for - but it's working - it's coming up with prompts, observing MCP friction, fixing, re-running and keeping improvements this is a powerful weapon
English
1
0
1
56
Jökull Solberg
Jökull Solberg@jokull·
now I'm using autoresearch to stress test an MCP implementation - I used claude /create-autoresearch skill to set up the "lab" - pi uses codex to start MCP sessions and look for friction points in tool calling 🤯
English
1
0
0
272
Charlie Eriksen
Charlie Eriksen@CharlieEriksen·
The guy writing the TeamPCP/CanisterWorm malware knows me by first name and is leaving little notes in his source code asking me to be nice💀 Somehow, he's finding time to read my ramblings between pushing new versions🙃
Charlie Eriksen tweet media
English
8
23
408
23.3K
Stefán Jökull Sigurðarson retweetledi
Milan Jovanović
Milan Jovanović@mjovanovictech·
Caching is easy until you run more than 1 app instance. Then one node updates the data. Another node serves stale cache. Now you have a distributed consistency problem. A better .NET setup: youtu.be/XTCFF61xEhA
YouTube video
YouTube
Milan Jovanović tweet media
English
1
14
111
5.4K
Stefán Jökull Sigurðarson retweetledi
Amanda Silver
Amanda Silver@amandaksilver·
I spent this past week building with Squad and… wow. Coordinated AI agents living inside your repo, working in parallel, sharing context, and staying inspectable. This is what agentic development is supposed to feel like. Proud of the team pushing this forward. Try it today and you will be on🔥tomorrow. aka.ms/AA1096on
English
4
28
163
14.2K
Johannes Schmidt
Johannes Schmidt@spaceMonster·
@ID_AA_Carmack Even worse -> why in 2026 is there no replacement to the "hands free" profile of Bluetooth where it switches to Potato mode for calls/video conferences Why can't it do a bidirectional full quality stream??
English
11
3
180
12.9K
John Carmack
John Carmack@ID_AA_Carmack·
When you stream Spotify to Bluetooth speakers or headphones, the audio comes over the network lossily compressed with Vorbis or AAC codecs, is then decoded on your device to 48 Khz raw samples, then the Bluetooth stack lossily re-compresses it with SBC or AAC codecs before sending it over the airwaves to the speakers. I don’t have “golden ears” to pick apart audio quality like I can with, say, missing gamma correction on texture filtering, but that still hurts my system optimization soul. It is likely over-optimization, but It would be cleaner if there were a way to send bluetooth-ready, compressed audio directly.
English
275
247
5.8K
441.7K
Stefán Jökull Sigurðarson retweetledi
Have I Been Pwned
Have I Been Pwned@haveibeenpwned·
New breach: Aura exposed 900k unique email address earlier this month, primarily sourced from a marketing tool. Data also included name, phone number, physical and IP address. 90% were already in @haveibeenpwned. Read more: haveibeenpwned.com/Breach/Aura
English
7
25
68
12.7K
David Whitney
David Whitney@david_whitney·
I did it, I finally found a way to make two entire communities hate me. Never JavasScript .NET people 🤝 People that Hate Microsoft And it's beautiful.
David Whitney tweet media
English
2
3
9
577
Troy Hunt
Troy Hunt@troyhunt·
I actually don’t have enough cloud for this 😮
vx-underground@vxunderground

Today @BleepinComputer published a story on a company named Telus Digital being compromised by a Threat Group operating under the moniker "ShinyHunters', a reference to Pokemon. GTIG (Google Threat Intelligence Group) has been tracking ShinyHunters under the label UNC6395. UNC6395 has been targeting enterprise organizations since at least August, 2025 by exploiting compromised OAuth tokens to gain access to company SalesForce instances. Upon successful compromise, UNC6395 attempts vertical or horizontal movement by combing through the compromised SalesForce data. At a currently unknown time, UNC6395 successfully compromised Telus' SalesForce instance which allowed them to pivot elsewhere within the organization. The amount of data UNC6395 claims to have compromised is astronomical. They claim to have exfiltrated over ONE PETABYTE of data (compressed as .tar.xz). While Telus has confirmed the compromise, the exfiltration of ONE PETABYTE of data indicates the compromise may have occurred weeks, possibly months, ago. Telus as of this writing has not given additional details on the compromise (more on that later). I am unable to confirm the validity of the data, primarily because I do have the means to reliably comb through a petabyte of data. However, "snippets" and "samples" have been shared. Based off data seen, the compromised appears authentic. Here is a high-level overview of what was allegedly compromised and successfully exfiltrated. - Employee Full Legal Name - Employee National ID Number and/or SSN - Telus hashed passwords, API keys, OAuth tokens - Call record details - Call meta data - Telecom customer PII (First Name, Last Name, Address) - HR records - Agent performance records - SalesForce accounts, contacts, leads, and records - Financial records (ACH routing numbers, etc) - GitHub repository access to an additional 20 organizations adjacent to Telus (20,000 internal source code projects) - Customer and Agent call records in .wav - 14,139 customer database instances, all containing customer PII (unspecified) - GLEAN TELUS background check files. UNC6395 has access to FBI, RCMP, and CISA background checks. - GLEAN TELUS confidential reports on investigations - GLEAN TELUS confidential reports on tax filings (?) - ... just search "GLEAN" on Google If what UNC6395 states is true, this breach impacts approx. 230M companies across the globe. Based on information seen publicly, ... it looks bad. However, as of this writing, Telus has not done anything other than confirm the compromise with some journalists. I suspect they're currently performing a DFIR (Digital Forensics and Incident Response) and forming a strategy to combat this technologically, legally, logistically, and PR-wise. Is UNC6395 telling the truth? Is this compromise as severe as it appears to be? When will TELUS provide more details? Will impacted customers be notified? Is law enforcement mad their background checks are allegedly compromised? Find out next time on Dragon Ball Z

English
11
7
162
32.3K
Stefán Jökull Sigurðarson retweetledi
Cloudflare Developers
Cloudflare Developers@CloudflareDev·
We want to clarify something: one of the motivations for building this feature is that building a crawler that respects crawling best practices is hard. Too many crawlers use this as an excuse not to abide by site owners' preferences, and respect directives like robots.txt. /crawl does this out of the box. Additionally, the /crawl endpoint cannot bypass Cloudflare's bot detection or Captchas, and self-identifies as a bot. It respects all the same protections available to operators today: AI Crawl Control, robots.txt, Content Signals and Pay-Per-Crawl. So, site owners can and should still choose how their content is consumed, and our /crawl endpoint will respect it.
English
38
60
1.2K
303.8K
Stefán Jökull Sigurðarson retweetledi
kathyl
kathyl@kathyyliao·
@CloudflareDev /crawl does not bypass challenges/captcha and this is by design. we identify as a bot + respect robots.txt site owners should have control over their content #robotstxt-and-bot-protection" target="_blank" rel="nofollow noopener">developers.cloudflare.com/browser-render…
kathyl tweet media
English
12
16
214
108.2K
Stefán Jökull Sigurðarson retweetledi