Articles
Long-form writing on tech, culture, and the edges of the internet.
Your perimeter is not absorbing this
AISLE published 38 CVEs against OpenEMR. What the volume confirms, what remains unconfirmed, and what operators must verify per deployment.
AI costs more than humans
Nvidia says AI costs more than human workers. The real issue is architecture, not compute price. Here is how to fix the unit economics.
cat is now an exploit
MAD Bugs establishes that cat readme.txt is not a passive read. The terminal is an interpreter and untrusted bytes are program input.
Chat message steals your credentials
CVE-2026-44843 reduces credential theft to message receipt. The failure is identity boundary enforcement, not chat parsing. Operator breakdown.
Copilot's new 27x Opus multiplier breaks your budget
Copilot's 9x Sonnet and 27x Opus multipliers turned model selection into a governed engineering decision. Most teams have no routing layer.
CVE-2026-31337: Dirty Frag roots every major distro
Technical analysis of CVE-2026-31337 'Dirty Frag': a Linux kernel UAF in IP fragment reassembly giving local root across major distros.
CVE-2026-44843 turns one message into credential theft
CVE-2026-44843 collapses the boundary between chat message receipt and credential disclosure. What failed, what is not confirmed, and what must change.
Dirty Frag roots every kernel
Technical analysis of CVE-2026-3490 'Dirty Frag' - a page_frag refcount UAF in the Linux kernel enabling local root on stock 5.15-6.8 kernels.
Every field in the Canvas tenant is lit
The Canvas LMS incident lacks field-level disclosure. Treat every identity attribute, message, and uploaded file as exposed until the platform proves otherwise.
Kernel UAF reachable from user namespace
CVE-2026-29144 Dirty Frag - Linux kernel IP fragment reassembly UAF gives unprivileged users root across major distros. Mechanism, exploitation path, telemetry gaps.
One message, credentials gone
CVE-2026-44843 enables credential theft on inbound chat message receipt. Operator breakdown of the failure boundary and required posture changes.
The Canvas breach numbers are not real yet
Analysis of the referenced Canvas breach: what is confirmed, what is not, and why disclosure scope determines real user exposure in tenant-administered systems.