oh hey, it's doing that analog-buttons trick!
See, There's only 3 wires for eight buttons: voltage, ground, and "key".
Each button has a resistor inline, and the microcontroller on the other end measures the resistance of the keypad, and can figure out which key is pressed based on that.
We all know how this ends.
We're proud to announce the official release of Fedora Asahi Remix! 🎉
Learn more:
https://asahilinux.org/fedora/
December 17! It's a Mavica!
Here is a later model that was lightly used back in the day. This platform-agnostic camera was revolutionary for its compatibility and ease of use. The optics weren't bad either! 📸
These are also very reasonably priced, and new batteries are affordable and available. Highly recommend!
This is your regular and very unwanted reminder that it's not "heli+copter", but "helico+pter", with "pter" being the same root word meaning "wing" as in pterodactyl.
look upon the world with the eyes of a game developer and everything looks pretty because wow the real world is so good at diffuse reflections and lighting (for real though)
🎵currently listening to colorcoaster by fusoxide, such a good song https://fusoxide.bandcamp.com/track/colorcoaster
my cold take on the Threads federation thing is: if you simply consider them not as some mystical "platform" but as any other "instance", then they're an over-sized under-moderated data-scraping instance housing many vile users right up to the point of "technically legal free speech"... and we've all suspended instances before for much less.
this is but one tiny example of what i mean when i say: THIS WORLD IS BEAUTIFUL, AND WE MUST PROTECT IT
Some of my favorite papers are the ones where you can go back and look at other, non-vulnerable constructions and see "oh, that's why they did it that way". Here: SSH doesn't do handshake transcript integrity --- they felt like it was good enough to just authenticate the _parts_ of the handshake that went into key negotiation. Compare with (say) Noise, or TLS.
Result: attackers can inject no-op messages into the handshake. "Who cares”, right, except that SSH keeps implicit sequence numbers and the NOPs bump those sequence numbers, allow attackers to edit the underlying handshake.
Trans woman, bisexual, someone's fiancée, forever a programmer, poly, and former total mess