Skip to main content



Delivering some @FreeCAD training today into an org and ended up stripping down the extruder in their prusa mini as it had a stuck piece of filament. All back up and running now. #3Dprinting
in reply to Robee? Na! 🌈

@RobeeShepherd I've not had to do it on mine but they'd left it stood loaded with pla slowly absorbing moisture and the entire filament in tube and through extruder was cracked into like 10-15mm sections! Fun and games!
in reply to concretedog

I think most of my problems were actually caused by the PTFE tube in the hotend shrinking and leaving a gap, causing a clog. I cut so many spares I have loads left over from when I changed to a Revo.
in reply to Robee? Na! 🌈

@RobeeShepherd I had this on an ender 2 pro, the ptfe had been cut at a jaunty angle so instantly blocked... easily sortable but if it had been a beginners machine would have totally put someone off!
in reply to Robee? Na! 🌈

@RobeeShepherd
I replaced the heatbreak very quickly after acquiring it with the bondtech and never suffered that problem. I was very grateful for that.
@concretedog @FreeCAD


Meep! Meep!

reshared this



Just checking if I use a link here to my own blog if it generates the "more from" bar at the bottom

cogdogblog.com/2019/09/lacktri…

in reply to Alan is @cogdog

they are on 4.3.4, which isn't the latest but anything in 4.3+ does have this feature.

You need to make sure your blog has the fediverse creator meta data in the header, and also that your profile has the domain marked as being able to generate the link. It also has to be a unique link to the instance (so something from 2019 may already have data) for it to generate the link preview.

in reply to Michael Stanclift

@vmstan Thanks much. My WordPress blog with the ActivityPub plugin does add the fediverse creator tag (can see in source) and I added the blog domain to the plugin settings for sites that can generate.

But I think you got it, I picked a really old post, I will try a newer one.



By accident, Trump administration national security leadership includes journalist from The Atlantic in group chat discussing upcoming attack on Houtis in Yemen.

youtu.be/H1eFV_5XTWk?si=hhQkLQ…

This entry was edited (5 months ago)

Randahl Fink reshared this.

in reply to Randahl Fink

Apparently they also discussed who had to pay for that mission. And that has to be Europe, obviously, because American ships don't use the Suez canal.


Such a pretty ram lamb and an unusual colour in my experience of Soays #Defaidodon #soay

Trivial Einstein reshared this.


in reply to George Takei 🏳️‍🌈🖖🏽

No offense I'd have a hard time telling which is trans.
This entry was edited (5 months ago)




in reply to George Takei 🏳️‍🌈🖖🏽

Unfortunately, I am not sure that learning from history and not repeating its mistakes is one of humanity's core competencies.



Today's OPSEC lesson is this: all of the encryption in the world is not going to save you if you add the editor of The Atlantic to your war-planning Signal group chat.

theatlantic.com/politics/archi…

SpaceLifeForm reshared this.

in reply to evacide

It has only been TWO MONTHS, folks; buckle up for at least four years of this.
in reply to evacide

-- Stupidity is a talent for misconception -- E. A. Poe


We need to keep the pressure high so our next gov't doesn't cave! #CancelTheF35

Will Canada Cancel Its Order for American F-35 Fighter Jets? (VIDEO) youtu.be/la0tKqpcCTk?si=0X0NO_… #cdnpoli #polcan #Canada #RCAF #defence #defense #military #aviation

in reply to J.P.

Do you know when SAAB will be replacing the U.S. based engines in the Gripen?
in reply to Dianora (Diane Bruce)

@Dianora No, sorry, I'm not an expert. But from what I could glean, the odds are extremely slim.


For people who are concerned about crossing the US border, The Verge and Wired both have useful discussion and advice:

theverge.com/policy/634264/cus…

wired.com/2017/02/guide-gettin…

in reply to evacide

I'm so tired of having to read and share these articles about how to spend lots of time, money and energy defending myself against invasive searches at the U.S. border, especially because it never seems to get any better and is likely to get worse and who ordered this hellscape anyway fuck it I'm going to live in a hut made of sticks and moss in the woods now who wants to join me?
in reply to evacide

While
It's a great time for actual criminals to cross the border, odds are better that agents will be occupied harrassing normal visitors.



oh hey, starting next week we'll be hosting a weekly "low-tech lunch" meetup in the MAL Pop-Up space CASE W250.

every Monday from 12-2pm. no stakes, just a friendly space to hang out, build other networks projects, play with tech at human scales, talk about low-tech, minimal & perma-computing, &tc.

join us if you're able!

Unknown parent

mastodon - Link to source
dr_a
@rose_alibi so tempting... 😁






Somebody is claiming to have exfiltrated 6 million lines of data with Oracle Cloud’s SSO and LDAP that includes JKS files, encrypted SSO passwords, key files and enterprise manager JPS keys from servers on login.*.oraclecloud.com

The poster has no prior reputation, it is unclear if they're LARPing. Some of the sample data does align with prior infostealer logs, I'm told. breachforums.st/Thread-SELLING…

#threatintel

This entry was edited (5 months ago)
in reply to Kevin Beaumont

If anybody is interested, the servers they claim they targeted all run Oracle WebLogic and are managed by Oracle as a SaaS service.
in reply to Kevin Beaumont

Has anybody else got Oracle to comment on this? No reply to my queries.
in reply to Kevin Beaumont

Oracle are denying a breach to @BleepingComputer, but the threat actor has provided an archived URL which suggests they somehow uploaded a file to the Oracle Access Manager (SaaS solution) frontend.

web.archive.org/web/2025030116…

in reply to Kevin Beaumont

The Oracle thing keeps getting more strange. The threat actor has supplied an hour long YouTube video, which appears to be taken from an endpoint inside Oracle... in 2019. They've also supplied a dump of data from 2025, to Hudson Rock. youtube.com/watch?v=375_G9wAff…
in reply to Kevin Beaumont

If anybody from Oracle follows me, I definitely think the OCI team needs to spin up security incident response on that YouTube video to try to find out what was happening. It looks like it may be a Citrix session recording of a staff member's access in OCI.
in reply to Kevin Beaumont

Hudson Rock are reporting the Oracle Cloud breach claim threat actor has provided 10k records, and they appear genuine according to one of their customers.

linkedin.com/posts/alon-gal-ut…

It’s unclear to me exactly what is happening with this one as the threat actor doesn’t appear to understand basic English grammar.. but there are signs something has happened at Oracle.

Big problem for Oracle as I’m not sure how plausible denials will be when threat actor, who sounds 12, is dumping data online.

in reply to Kevin Beaumont

CloudSEK are doubling down on their Oracle Cloud breach reporting, despite a denial from Oracle: cloudsek.com/blog/part-2-valid…

I am still looking into this and will probably do a blog post this week. The threat actor is still dropping files everywhere and they do tend to point to a security incident at Oracle Cloud.

in reply to Kevin Beaumont

Bleeping Computer say multiple Oracle customers confirm their customer data has been stolen. Oracle continue to deny there is a problem.

bleepingcomputer.com/news/secu…

This entry was edited (4 months ago)
in reply to Kevin Beaumont

Also, that YouTube video I linked above has two hours of audio of Oracle employees talking. I haven’t transcribed it yet.

Separately, the threat actor has shared what they claim to be current config files from Oracle Cloud servers with a different reporter.

I’m deliberately staying out of this one for now as I’m trying to finish Assassin’s Creed Shadows first.. but I think Oracle may have a pending PR disaster when the TikTok deal is due to complete.

in reply to Kevin Beaumont

There’s now been a data breach at Oracle Health, which is separate to the ongoing security issue at Oracle Cloud.

Oracle have not commented publicly on the breach, instead telling people to only talk to their CISO by phone, not in writing. They’ve sent out letters without Oracle letterheads, using external lawyers instead.

The behaviour going on at Oracle with cybersecurity is extremely alarming.

bleepingcomputer.com/news/secu…

reshared this

in reply to Kevin Beaumont

Going back to the Oracle Cloud security incident, the 2019 video posted by the threat actor: youtu.be/375_G9wAffo

Now has an audio transcription github.com/j-klawson/oracle_br…

(I’ve redacted the root passwords from screenshot)

This entry was edited (4 months ago)
in reply to Kevin Beaumont

I can confirm there has definitely been a serious security incident at Oracle's managed cloud service, and they're attempting to wordsmith their way out of it. doublepulsar.com/oracle-attemp…

reshared this

in reply to Kevin Beaumont

Oracle have attempted to hide the Oracle Access Manager access, by requesting archive.org exclude the URL.
This entry was edited (4 months ago)
in reply to Kevin Beaumont

The wordplay here is Oracle Cloud.

Oracle rebadged old Oracle Cloud services to be Oracle Classic. Oracle Classic has the security incident.

They’re denying it on “Oracle Cloud” by using this scope - but it’s their cloud service.

mhoye reshared this.

in reply to Kevin Beaumont

Multiple Oracle cloud customers have reached out to me to say Oracle have now confirmed a breach of their services.

They are only doing so verbally, they will not write anything down, so they’re setting up meetings with large customers who query.

in reply to Kevin Beaumont

A friend of mine has described a Sev0 incident as a Sev1 that escalates from "a major incident or outage" to "a c-level executive's career is on the line".

They're never "declared", you just know they're happening when suddenly process goes out the window, nothing get written down and there are lawyers on every call not because they have anything to say, but so that those calls are now privileged information that can't be subpoenaed or used as evidence.

This entry was edited (4 months ago)
in reply to mhoye

@mhoye And if you've been through a couple of them - you can usually tell when it's about to turn the corner - to parrot a phase from Bad Boys II - when it puckers up your butthole.
in reply to Kevin Beaumont

Oracle Health customers dealing with the breach there of patient PII, if you’ve had a verbal briefing could you please Signal me? GossiTheDog.1337

I’m interested to see if they’ve told you it was in legacy Oracle Classic aka OCI Gen1 environments, like they have with Oracle Cloud customers - I’m trying to line up if the breaches are actually related.

It appears Oracle migrated people off OCI G1 a few years ago, but left the systems on and unpatched with customer data.

in reply to Kevin Beaumont

Heise has a look at the Oracle security incident. Oracle didn’t return request for comment when asked about Oracle Classic - I understand from multiple large outlets they’ve also declined to comment.

heise.de/en/news/Data-leak-at-…

in reply to Kevin Beaumont

When I asked Oracle for comment, a PR person responded and offered a comment on the condition I not attribute it in any way to Oracle. When I said no, the PR person said Oracle was declining to comment.

#radicalopacity

in reply to Dan Goodin

@dangoodin what, so they were expecting you to report “some unspecified random person told me that Oracle…” ?
in reply to Kevin Beaumont

A class action lawsuit has been filed in the US around Oracle failing to publicly disclose a breach of Oracle Health. storage.courtlistener.com/reca…
in reply to Kevin Beaumont

We have an update. Reuters and Bloomberg confirm my blog, that’s there’s a security incident going on at Oracle cloud. Oracle declined to comment, after lying to @BleepingComputer and other outlets on the record.

CrowdStrike is the IR company.

“Oracle staff acknowledged to some clients this week that an attacker had gotten into a legacy environment, Bloomberg News report said.”

reuters.com/technology/cyberse…

in reply to Kevin Beaumont

“The company informed customers that the system has not been in use for eight years and that the stolen client credentials therefore pose little risk, the report added. The stolen data included Oracle customer log-in credentials from as recently as 2024, the report said.”

This would be Oracle Classic, aka Gen1. I’ve been told the systems were left online after migration.. unpatched.

Oracle are trying to play legacy angle - but what else was stolen? What else did the attacker do? Why cover up?

in reply to Kevin Beaumont

Yeah, by legacy system Oracle mean ‘a system we manage housing active customer data’. They’ve also been telling people it isn’t Oracle Cloud.. but it is, and they know it is, they’re just doing customer talking points to wordsmith around it.

infosec.exchange/@Fringedcrow/…

in reply to Kevin Beaumont

Oracle were still trying to get SaaS solutions *they* manage off Oracle Classic aka Gen1 as of 2023. They made a mess of it.
in reply to Kevin Beaumont

To answer my own question up thread - from talking to people, the Oracle Health breach appears to be unrelated to the Oracle SaaS incident this thread describes.

In both cases they’re being extorted, and in both cases they’re working with the FBI and external incident response.

in reply to Kevin Beaumont

Also in both cases Oracle hasn’t filed an 8-K or told regulators or provided an IR report to customers or a written technical statement of what happened or put anything on their website or commented to press.
in reply to Kevin Beaumont

Bleeping Computer report that although Oracle are telling clients the login data is "old", they've received login details from the threat actor current to this year (2025). Oracle haven't returned requests for comment. bleepingcomputer.com/news/secu…
in reply to Kevin Beaumont

The Oracle cloud threat actor has told the BBC they plan to release European region Oracle Cloud Classic data this weekend. #threatintel
in reply to Kevin Beaumont

The Register has a look at the Oracle situation. No new info, as Oracle won’t comment on anything and the info they’ve told customers is extremely light.

theregister.com/2025/04/08/ora…

in reply to Kevin Beaumont

Oracle have finally issued to a written notification to customers about their cybersecurity incident.

They are again wordsmithing. OCI is a different org unit in Oracle to Oracle Classic - they’re denying a different scope.

How long was the attacker in the SaaS solution (that Oracle manage)? What did they do with the access? How long were they in for? Why were ‘legacy’ systems containing customer info left unmanaged and insecure? Etc.

Really poor response from a SaaS provider.

in reply to Kevin Beaumont

If anybody is struggling to find the Oracle security incident notification email, search your email server for subject “Oracle customer notification” - if anybody in your org got the email, your Oracle SaaS service is impacted (not that you’d know it from the email). It’s widespread.

Also, although Oracle say “user names” they mean email addresses.

This entry was edited (4 months ago)
in reply to Kevin Beaumont

Watch Oracle PR their way out of their responsibilities.. they’ve managed to publish a security incident notification and have the press run it as a denial. insight.scmagazineuk.com/oracl…



:goose_honk: mama & papa Muscovy nesting together again today ❤️❤️

Day 28, as far as I'm aware 🐣🐣
Stay tuned for future updates :goose_honk:

Fantastic info about ducklings
👇👇👇👇
wildthingsfood.co.uk/news/the-…

#Jacksonville #Florida #Nature #Birds #Ducks #MuscovyDucks #AmateurPhotography #Pixelfed #StreetPhotography #UrbanExploration #GalaxyS23+



Today we're releasing two new boards 🎉 1. The RP2xxx Stamp Carrier Basic breaks out all the pads to pin headers + USB Type-C and offers the 3-in-1 SMD/TH/FlexyPin Stamp footprint. 2. A FlexyPin Adapter for the Raspberry Pi RM2 module. Get them from our @lectronz.com store: lectronz.solder.party


Nope. Brain broken now. Can't brain. But it's cool, because it is literally impossible to be as bad at my job as *texting military plans to the editor of a major magazine* theatlantic.com/politics/archi…


in reply to Chris Pirillo

Lowering my expectations has succeeded beyond my wildest dreams.
This entry was edited (5 months ago)


Calling to anyone with nginx proxy experience:

In the Mesa CI, we use a proxy that passes requests from test devices through the gateway they're physically connected to and out to the internet.

The config is here: gitlab.freedesktop.org/mesa/me…
That file includes this other file: gitlab.freedesktop.org/mesa/me…

On the last line of that second file, there is a bug: `$1` needs to be url-encoded, so that any `&foo=bar` argument in the `location:` header gets forwarded. Right now, they are lost.

Please help ❤️

This entry was edited (5 months ago)


Julian Fietkau (@julian) is coming to #FediForum and wants to talk about:

Academic exchange and collaboration on the fediverse – what’s already working and what’s still missing?

Join us for this discussion and many others on April 1-2, online? More info: fediforum.org




One problem with ActivityPub is that there is not a standard format for errors returned from the API or federation protocol.

I wrote a Fediverse Enhancement Proposal (FEP) to establish a standard set of error messages using RFC 9457, Problem Details for HTTP APIs.

It'd be great to get some review here:

codeberg.org/fediverse/fep/src…

Comments and suggestions here (or just reply):

codeberg.org/evanp/fep/issues

..

reshared this



Why is no one talking about a Swiss or Norway-type association? #CanadaEUSingleMarket

Could Canada Join the EU? (VIDEO) youtu.be/kV9OfUGiExQ?si=rYG28-… #cdnpoli #polcan #eupoli





Seven Arrested For Nazi Salutes At France V Croatia Match
https://www.barrons.com/news/seven-arrested-for-nazi-salutes-at-france-v-croatia-match-aa22b685?utm_source=flipboard&utm_medium=activitypub

Posted into afp news @afp-news-Barrons



We’ve re-released our May 2023 “How to Fix the Internet” episode with FTC Commissioner Alvaro Bedoya. By moving to fire him last week, the Trump Administration has sidelined the FTC’s much-needed focus on protecting all users of digital technologies. eff.org/deeplinks/2025/03/podc…

in reply to padeluun ⁂

Should have just been using basic calculus to make it less confusing for the reader. /s



Update: I'm no longer completely fine - if you want to donate to me, feel free (but not pressured.

Please look at all the urgent #MutualAid-Posts as well.

I have some additional monthly expenses for all the #SafeguardingResearch & #WhiteHouseWash, if you want to chip in:
liberapay.com/lavaeolus/donate
ko-fi.com/lavaeolus

It's $45/month right now:
- $45 for @Pikapods (change-tracker and web-archiving
- the forum got moved to pro-bono safeguarding-research.discours…

This entry was edited (5 months ago)


April Goal: 184/$600 CAD
I'm disabled & queer, living in extreme poverty. I'm in URGENT need of food, hygiene, medication, clothing, etc. Disability benefits aren't enough for survival or comfort.
Donate: ko-fi.com/qpthepurplesnep
Wish List: amazon.ca/hz/wishlist/ls/2H98Z…
#MutualAid #Help #DisabilityCrowdfund