ponymontana💜⚡

Zero-JS Hypermedia Browser

avatar
ponymontana💜⚡
ponymontana@nostriches.club
npub185pu...36k8
drastically ungovernable taxes disrespector, ANCAP LIBER*

Notes (9)

#YESTR there's literally nothing beyond you and God, that is in you and all the other stuffs. Everything is fine if you align yourself to God, inside and outside. Everything is broken if you dont humbly embrace this power. nostr:nevent1qqs88qp455q0z4lpw9ha83s6pml8hzhyacwl6udtd6xj7da2z344xrspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsyg8q7kl5nzvmsncc6k9c75g0x54zdg3hjwed0qav5mmcpvafnml44ypsgqqqqqqsh2qv4a
2025-12-06 08:56:13 from 1 relay(s) View Thread →
user namespace is really a cool concept in #linux, basically an elegant way to permit to user processes to mount an entire filesystem where they can act as root. It is used in containers and browser sandboxes, to effectively isolate processes. But there are problems here: now, when user namespaces is activated in the kernel, ANY user process (so any random app) can access a gigantic amout of functions and kernel calls that was intended to be ran from a root user. These functions have bugs. These bugs wasnt a security threat before, because if you are already root and you are invoking a kernel function to trigger a bug that makes the kernel crash.... Well, you was already root. The process that invoked the function was already in total control of the machine, so the bug was basically useless for hackers to use in a chain of exploits. Now, with user namespaces, a user process can invoke these functions to trigger the bugs to crash the kernel or whatelse: these bugs now are security threats. Solutions? Seems there isnt a better alternative to do this kind of sandboxing in linux, so the solutions are [fixing the bugs®] and restrict the capability of use user namespaces to a whitelist of trusted apps (like containers, browsers, flatpak, systemd-something, and apps that in the future will start using it....)
2025-12-01 06:32:55 from 1 relay(s) View Thread →
S U P E R C Y C L E nostr:nevent1qqsz5a2gp740c3ukkv0djfyf2xh32se4d384cz3ddnvnm4dkjplravcpz9mhxue69uhkummnw3ezuamfdejj7q3qv9qy0ry6uyh36z65pe790qrxfye84ydsgzc877armmwr2l9tpkjsxpqqqqqqzszgmxg
2025-11-04 19:45:54 from 1 relay(s) View Thread →
S U P E R C Y C L E nostr:nevent1qqsyd0m5s322pgl7dwukvqy3unndz9987vjguskw9yy4rr2lmex5lzcpz9mhxue69uhkummnw3ezuamfdejj7q3qv9qy0ry6uyh36z65pe790qrxfye84ydsgzc877armmwr2l9tpkjsxpqqqqqqzxkw0h6
2025-10-23 10:34:38 from 1 relay(s) View Thread →
hi nostr:nprofile1qqsfmefa5zm0azxvmua3jagneczx9se94cj34tv4l4ltl0qk4zdxsqgpp4mhxue69uhkyunz9e5k7tcpr9mhxue69uhhyetvv9ujuumwdae8gtnnda3kjctv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0hafruz I'll be curious to have clarifications on how blitz is sovreign. How can I see and publish the pre-signed tx to unilaterally claim onchain my funds in case things go wrong with sparks? Thank you, amazing wallet!
2025-10-10 14:32:39 from 1 relay(s) View Thread →
unpopular opinion: the lowest the floor number, the highest the quality of the party nostr:nevent1qqsdkf95w6cl0kwgrnhze8sapnklcq655fky9nxpy6ny20vycdl5rwqpz9mhxue69uhkummnw3ezuamfdejj7q3qarkn0xxxll4llgy9qxkrncn3vc4l69s0dz8ef3zadykcwe7ax3dqxpqqqqqqzkxkquz
2025-09-24 18:52:40 from 1 relay(s) View Thread →
this is factual, things happening have no meanig unless you observe and project your expectations into it. So if something is good, bad, unfair, hard, and so on, you are already projecting your thoughts into it, so it is "happening for a reason" or, in other words, you are already started the coscient process of extracting events from chaos and projecting meaning trought it. nostr:nevent1qqsryqgcw7vegqm48pquptxf0syxathjephflcg5pkac89ljyg07y6qpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyqr0gcuwzeqwqx5839t4arefs4e8eg0ryfa22xxug2gu5wdkwp8zvqcyqqqqqqg8yfw8r
2025-09-16 18:58:32 from 1 relay(s) View Thread →