🥳
I improved the #FluffyChat website a little bit and made it localizeable over weblate. It now even contains an imprint, the changelog, the privacy policy and a long FAQ. 🚀

Also it has a fancy new domain:

fluffy.chat

If you have some feedback, I'd appretiate it. You can help translating it or even improving the FAQ on weblate. ❤️❤️❤️

💡 Incredibly important work from @OpenForumEurope to propose an EU Sovereign Tech Fund (EU-STF) to strengthen Europe’s digital sovereignty, cybersecurity and competitiveness through sustainable, secure open-source technologies.

eu-stf.openforumeurope.org/

#фалыстыннаш
конфликт в судане кстати тоже идет с 2023 года. голод, 150 тыс убитыми, этнические чистки такого масштаба, что отмечаются на спутниковых снимках.

и чем как? где-то может быть певцы/актеры/режисеры объединились чтобы помочь желткам? где флотилии геев? где заседания совбеза? где хотя бы призывы прекратить поставлять оружие?

там нет жыдов? значит всем похуй.

и расскажите мне ЕЩЕ раз что они там про защиту угнетаемых а не про антисемитизм.

NTA 7532 biedt de kans om veilige en interoperabele chat in de Nederlandse zorg vorm te geven. XMPP levert daar al de open, bewezen en gefedereerde basis voor.
De XSF nodigt zorg-, IT- en standaardisatiegemeenschappen uit om samen te werken en NTA 7532 op XMPP te bouwen, in lijn met internationale best practices.
xmpp.org/2025/10/towards-secur…
#XMPP #DigitaleZorg #OpenStandaarden
This entry was edited (5 days ago)

NTA 7532 is an opportunity to define secure, interoperable chat for Dutch healthcare.
XMPP already offers the proven, open, federated foundation needed for this.
The XSF invites healthcare, IT, and standards communities to collaborate and help shape NTA 7532 on XMPP - aligned with international best practice.
xmpp.org/2025/10/towards-secur…
#XMPP #DigitalHealth #OpenStandards

The Max Velocity live YouTube coverage of Melissa is well suited to blind listeners wanting to keep up with the storm. Lots of good explanation of what's happpening. youtube.com/live/UkpbrMBjiJ4?s…

reshared this

Today I finally experienced Samsung’s HIYA spam blocking in action. It works perfectly — except that my food delivery courier couldn’t reach me. Clever guy though, he called again from a hidden number. I later found his repeated calls under “Other calls.” No idea why he ended up in the spam filter; it doesn’t seem like there’s a way to unblock him. Maybe adding him to my contacts would help…

I keep returning to the energy of programming in the 90s and today I realised it had the romantic vibe of a knitting group – a bunch of people doing something weird that is a lot of fun for them regardless of practical application or money. I think Mastodon has some of that vibe, too, and I think we need to keep that here and fight for keeping that in computing in general, against all techbros who want to mass-produce shitty acrylic jumpers.

After reading the press releases about the dark mode station information screens, I now have this conspiracy theory:

The current screens need replacing and the new generation of displays doesn’t like large permanently bright areas, so switching to a dark mode was a given. The research was mostly about finding a colour scheme that was ideally equally well readable and if at all possible, find some groups for which dark backgrounds actually works better.

Which is entirely reasonable, of course.

in reply to Martin Hoffmann

Sounds plausible, also considering how they argument with energy efficiency, which is not how LCD screens work.

Now they claim up to 4 % savings, which is probably only by those huge LED screens in Utrecht, Rotterdam and Den Haag.
If the new screens will be OLED-based, then the promise energy savings in order of 30 % could be plausible.

This entry was edited (6 days ago)
in reply to Ondřej Caletka

@Oskar456 Depends if the LCDs use local dimming on direct back light units. Those can save energy. But I am not sure if Digital Signage uses that. But yes, you need energy to create black. On self emitting LED screens a dark mode should save a lot of energy. They don’t really care about brightness, should be reliable. LCDs shouldn’t need to care about that too. They usually won’t live that long anyways. So many layers can break. OLED is problematic.

#ChatControl is OFF the table for now. 💪

But the Danish Minister of Justice and chief architect of the current Chat Control proposal, Peter Hummelgaard, wants to bring it back in December.

😡 He now even claims your activism was paid for by Big Tech! 😡

We must keep fighting for #encryption and our right to #privacy 🔒️

Source: netzpolitik.org/2025/absurd-un…

#No2Backdoors #CyberSecurityMonth #CyberSecurity #Security

Tuta reshared this.

Join the #LibreOffice Team as a Paid Developer focusing on scripting support, preferably full-time, remote: blog.documentfoundation.org/bl…

Federico Mena Quintero reshared this.

This project looks promising. It looks like amazing replacement for Station playlist. Supports playlists, automation, looping. I sometimes play music during family events using SPL, maybe on next I will try this. Seems that my next procrastination moment will be with this. github.com/michaldziwisz/sara. Latest release at github.com/michaldziwisz/sara/…

reshared this

in reply to Paweł Masarczyk

@Piciok @pvagner I’m glad the project caught your interest. To be honest, I’ve put it on hold for now because I ran into problems I couldn’t quite overcome — at least not easily with AI. However, I’ll definitely come back to it someday, since I’ve always wanted to build my own live broadcasting system; I just lacked the coding skills. Yes, SARA will be designed primarily around the traditional model of a live radio DJ — using a mixer, sound card (preferably several), and absolutely no virtual mixers or anything like that.

De Nederlandse standaard NTA 7532 voor veilige chatapplicaties wordt momenteel ontwikkeld.
Wij geloven dat XMPP hiervoor de natuurlijke basis is: open, veilig, interoperabel en bewezen in veeleisende omgevingen.
De XSF nodigt Nederlandse partijen uit om samen te verkennen hoe XMPP veilige, toekomstbestendige zorgcommunicatie kan ondersteunen.
xmpp.org/2025/10/towards-secur…
#XMPP #DigitaleZorg
This entry was edited (5 days ago)
in reply to XSF: XMPP Standards Foundation

Met XMPP kunnen ziekenhuizen, huisartsen en zorgverleners veilig berichten uitwisselen tussen systemen, met eigen regie en zonder afhankelijkheid van één leverancier. Het is het open, gefedereerde model dat zorgcommunicatie nodig heeft!
XMPP is gebouwd op de internetstandaarden die ook e-mail en webbeveiliging mogelijk maken. Het wordt wereldwijd gebruikt, onder andere in zorg-, overheids- en defensienetwerken. Laten we die ervaring benutten bij de ontwikkeling van NTA 7532.
This entry was edited (5 days ago)
in reply to XSF: XMPP Standards Foundation

De XSF staat klaar om samen te werken: wij bieden begeleiding, expertise en ondersteuning aan Nederlandse partijen bij het ontwikkelen van NTA 7532 op een internationaal bewezen basis.
@forumstandaardisatie @rdi @developer @ibestuur #OpenStandaarden #ZorgICT

Dutch healthcare is developing the NTA 7532 standard for secure chat. We believe XMPP is a natural foundation: open, secure, interoperable, and proven.
The XSF invites Dutch stakeholders to collaborate and explore how XMPP can power secure, future-proof healthcare communication.
xmpp.org/2025/10/towards-secur…
#XMPP #DigitalHealth
in reply to XSF: XMPP Standards Foundation

The XSF is ready to engage — offering guidance, sharing expertise, and supporting Dutch stakeholders in developing NTA 7532 on solid, internationally proven foundations.
Let’s collaborate.
@forumstandaardisatie @rdi @NGICommons #OpenStandards #HealthcareIT
in reply to Martin Schmitt

CW Deltachat

Sensitive content

@Tutanota

There's quite a major BUG going on with pasting images from the clipboard.

You write an email on the web interface, you paste an image from the clipboard, it appears as "image.png". You keep writing the email you past another image, it appears again a second image.png file in the email attachments list and on the email body as the actual image.

You then hit send, the email you send has none of those images, despite them being in the email body and on the attachment list.

#Tuta #TutaNota

This entry was edited (1 week ago)

Včera při výměně gum jsem se podíval na novou TMY Standard.

Ano, to působí opravdu jako holobyt. Manuální sedačky, chybí kus středovýho tunelu, textilní čalounění, vzadu klima bez displaye, prostředí sedačka se sklápí celá s dírama pro hrníčky, ale taky s dírou do kufru

Na druhou stranu, to podstatný tam je: 4 kola, volant. kufr jako kráva, přufr, baterka, motor. Pro rodinu akorát.

in reply to Jachym Cepicky

Kdyby to stálo 800-900k, tak dobrý, ale za tu cenu je to drahý. Přijde mi, že Tesla všechno vsadila na Robotaxi a to, že auta nebude prodávat jako fyzické kusy a prát se s čínskou konkurencí, ale jako službu. Jinak si tu modelovou "defensivu" v posledních letech nedokážu vysvětlit. Jako má ta strategie něco do sebe, pokud by se jim to autonomní řízení podařilo včas dotáhnout, jen pro člověka, který chce auto pořád vlastnit, to nebude z Tesly dělat moc atraktivní volbu.

Aztec-era farms revived by women to heal Mexico City wetlands
Women farmers in Xochimilco and San Gregorio are restoring chinampas (high-yield island farms) using canal-mud fertiliser, biofilters and invasive-fish barriers. The programme has certified 16 producers and is improving water quality in a wetland that’s just 3% of its original extent but buffers floods, cools the city and shelters the axolotl. AP apnews.com/article/mexico-xoch…
#ShareGoodNewsToo

This dumb password rule is from Sky Ticket.

Sky is a german pay-TV provider with over 23 million subscribed users worldwide. They also have an online streaming service called "Sky Ticket".

You can only set a **4 digit long PIN** with no option for two-factor authentication or any additional security mechanisms.

dumbpasswordrules.com/sites/sk…

#password #passwords #infosec #cybersecurity #dumbpasswordrules

Well, you see, this tempfile is a transient fonts.conf just for the testsuite and its fontconfig, and it's XML generated on the fly based on a hardcoded configuration plus a dynamic string for the location of the actual fonts, which are at a path relative to the manifest directory, which is not the same as the workspace directory.

Statements dreamed up by the utterly deranged.

(The utterly deranged is me, apparently.)

GrapheneOS version 2025102600 released


Tags:

  • 2025102600 (Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro, Pixel 7a, Pixel Tablet, Pixel Fold, Pixel 8, Pixel 8 Pro, Pixel 8a, Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, Pixel 9 Pro Fold, Pixel 9a, emulator, generic, other targets)

Changes since the 2025102300 release:

  • Sandboxed Google Play compatibility layer: add shim implementation of GmsFontProvider to prevent crashes of apps depending on Play services when it's missing or disabled (restores support for using Pixel Camera without Play services)
  • Sandboxed Google Play compatibility layer: extend shim for background service starts to address edge cases where a foreground service is required
  • Sandboxed Google Play compatibility layer: fix NoOpPrewarmService chain crash in Pixel Camera caused by lack of privileged OS integration
  • kernel (6.6): update to latest GKI LTS branch revision
  • Vanadium: update to version 142.0.7444.48.0

All of the Android 16 security patches from the current November 2025, December 2025 and January 2026 Android Security Bulletins are included in the 2025102601 security preview release. List of additional fixed CVEs:

  • Critical: CVE-2025-48593, CVE-2025-48631
  • High: CVE-2022-25836, CVE-2022-25837, CVE-2023-40130, CVE-2024-43766, CVE-2025-22420, CVE-2025-22432, CVE-2025-32319, CVE-2025-32348, CVE-2025-48525, CVE-2025-48536, CVE-2025-48555, CVE-2025-48564, CVE-2025-48565, CVE-2025-48566, CVE-2025-48567, CVE-2025-48572, CVE-2025-48573, CVE-2025-48574, CVE-2025-48575, CVE-2025-48576, CVE-2025-48577, CVE-2025-48578, CVE-2025-48579, CVE-2025-48580, CVE-2025-48582, CVE-2025-48583, CVE-2025-48584, CVE-2025-48585, CVE-2025-48586, CVE-2025-48587, CVE-2025-48589, CVE-2025-48590, CVE-2025-48592, CVE-2025-48594, CVE-2025-48596, CVE-2025-48597, CVE-2025-48598, CVE-2025-48600, CVE-2025-48601, CVE-2025-48602, CVE-2025-48603, CVE-2025-48604, CVE-2025-48605, CVE-2025-48609, CVE-2025-48612, CVE-2025-48614, CVE-2025-48615, CVE-2025-48616, CVE-2025-48617, CVE-2025-48618, CVE-2025-48619, CVE-2025-48620, CVE-2025-48621, CVE-2025-48622, CVE-2025-48626, CVE-2025-48628, CVE-2025-48629, CVE-2025-48630, CVE-2025-48632, CVE-2025-48633, CVE-2025-48634

2025100901 provides at least the full 2025-11-01 patch level and the Android 2025-11-05 patch level (Pixel Update Bulletin could have fixes we don't get early) but will remain marked as providing 2025-10-05.

For detailed information on security preview releases, see our post about it.