2025年は趣味開発環境の変化が大きかったので備忘録として残しておく。
前提:
- 趣味開発はほぼ毎日している
- 開発するのはコマンドラインツールやライブラリが多い
- 言語はほぼRust
- 開発はほぼAndroid上
| blueprint: | |
| name: Low Battery Notifications & Actions | |
| description: > | |
| # 🪫 Low Battery Notifications & Actions | |
| **Version: 3.3** | |
| 🚀 Stay Charged, Stay Smart! Let's automate and take charge of your battery maintenance!🔋⚡ | |
| resource "aws_s3_bucket" "main" { | |
| bucket = "my-bucket-a9c8ae4e2" | |
| object_lock_enabled = true | |
| } | |
| resource "aws_s3_bucket_acl" "main" { | |
| bucket = aws_s3_bucket.main.id | |
| acl = "private" | |
| } |
| 000000 Officially Xerox | |
| 000001 SuperLAN-2U | |
| 000002 BBN (was internal usage only, no longer used) | |
| 000003 XEROX CORPORATION | |
| 000004 XEROX CORPORATION | |
| 000005 XEROX CORPORATION | |
| 000006 XEROX CORPORATION | |
| 000007 XEROX CORPORATION | |
| 000008 XEROX CORPORATION | |
| 000009 powerpipes? |
hi, i'm daniel. i'm a 16-year-old high school senior. in my free time, i hack billion dollar companies and build cool stuff.
about a month ago, a couple of friends and I found serious critical vulnerabilities on Mintlify, an AI documentation platform used by some of the top companies in the world.
i found a critical cross-site scripting vulnerability that, if abused, would let an attacker to inject malicious scripts into the documentation of numerous companies and steal credentials from users with a single link open.
(go read my friends' writeups (after this one))
how to hack discord, vercel, and more with one easy trick (eva)
Redacted by Counsel: A supply chain postmortem (MDL)
The core principle behind extracting a signature from a PDF involves identifying and isolating the signature's visual representation, whether it's a digitally embedded signature or a scanned image of a handwritten signature.
They are embedded within the PDF structure as data objects, often associated with a signature handler that uses Public/Private Key cryptography. These data objects include information about what parts of the document were signed, the signer’s identity, and a cryptographic hash. The extraction involves locating these fields, reading their content, and interpreting the digital certificate and signature metadata. Digital signatures are generally interactive with form field of type /Sig th