Avatar
nout
deba271e547767bd6d8eec75eece5615db317a03b07f459134b03e7236005655
Chief user experience complainer. Head of FOMO.

No, check out that transaction. The limits for script witness are currently 4MBs by consensus and 400kBs by standardness.

(Please correct me if I'm wrong, but this is my read of it)

https://bitcoin.stackexchange.com/questions/117594/what-are-bitcoins-transaction-and-script-limits

Raw bytes of data (probably incl CSAM) are already on your hard drive, because people have been putting these into witness for years as inscriptions, since these bytes are actually discounted in terms of fees.

E.g. Transaction: 521f8eccffa4c41a3a7728dd012ea5a4a02feed81f41159231251ecf1e5c79da - mempool - Bitcoin Explorer https://share.google/yr7OQxAgC6XNThp7w

Fixes get backported usually in couple versions back. Again, up to you whether you update your node or not.

Brave and disable the shitcoin

"Note: A 4% convenience fee will be charged when processing your payment with a credit or debit card."

Thank you! Very convenient. It would be even more convenient if you set all your systems on fire and just switch to bitcoin already.

Luckily the Ethernet MTU limit is 1500 bytes, so no CSAM is possible. Oh, wait.

Replying to Avatar Final

We have early access to Android Security Bulletin patches and will be able to set up a workflow where we can have releases already built and tested prior to the embargo ending. For now, we've still been doing the builds after the embargo ends. It will mainly help when they screw up pushing to AOSP.

We're in the process of obtaining early access to the major quarterly and yearly releases. This is a much bigger deal and will substantially help us. There's an immense workload with a lot of time pressure for porting to new major releases without early access which gets worse the more we change.

We did not have early access to Android 16 QPR1 and have not been able to start porting yet. We should have early access prior to Android 16 QPR2.

We're going to need to make private repositories for working on this stuff internally. We can potentially make special preview releases based on these.

Google recently made incredibly misguided changes to Android security updates. Android security patches are almost entirely quarterly instead of monthly to make it easier for OEMs. They're giving OEMs 3-4 months of early access which we know for a fact is being widely leaked including to attackers.

We can't break the embargo ourselves but if someone posted the patches publicly we would be able to ship them months early, as would others. The patches are broadly distributed to OEMs where most of their engineers have access. Companies like NSO can easily obtain access. It's not a safe system.

Google's existing system for distributing security patches to OEMs was already incredibly problematic. Extending 1 month of early access to 4 months is atrocious. This applies to all of the patches in the bulletins. This is harming Android security to make OEMs look better by lowering the bar.

The existing system should have been moving towards shorter broad disclosure of patches instead of 30 days. Moving in the opposite direction with 4 months of early access is extraordinarily irresponsible. Google has also abandoned pretending it's private by allowing binary-only embargo breaches.

Android's management has clearly overruled the concerns of their security team and chosen to significantly harm Android security for marketing reasons. Lowering the bar for OEMs to pretend things are fine while reducing security for everyone is a ridiculous approach and should be quickly reversed.

Android is very understaffed due to layoffs/buyouts and insufficient hiring. This is impacting Linux kernel and Android security. Google hasn't fixed http://taptrap.click which is a serious issue privately disclosed to them in October 2024. We were informed in June 2025 and it took us a few hours to fix...

Google does a massive portion of the security work on the Linux kernel, LLVM and other projects including implementing exploit protections, bug finding tools and doing fuzzing. They're providing the resources and infrastructure for Linux kernel LTS releases. Others aren't stepping up to the plate.

We don't expect there to be much pushback against this via tech media despite how obscene it is to provide 4 months of patch access to sophisticated attackers. They can easily get it from OEMs or even make an OEM. Whistleblowers should publicly post the signed zips since attackers have it already.

Security patch backports were pushed to the Android Open Source Project on September 2nd but it wasn't done properly. Android 16 QPR1 was also supposed to be pushed to the AOSP on September 3rd and it was even confirmed they'd still be doing that but it hasn't happened. Perhaps too many layoffs...

Even if no whistleblowers leak the signed zips we can still bring this system down ourselves without breaking any embargo. Our plan is to make special releases with the patches which are otherwise identical to our regular releases. External developers can reverse it from that for regular GrapheneOS.

We're allowed to make a release with currently available revision of the December 2025 Android security patches right now but we wouldn't be allowed to publish sources. Therefore, we'd need to do this separately from regular GrapheneOS. We could special release channels for it with delayed tags...

The purpose of this approach is for someone to reverse the Java and Kotlin patches to source code within an hour of us releasing that. They could then submit security patches elsewhere including to GrapheneOS that is open source. This clearly isn't something Google's technical security people came up with as it's completety nonsensical.

It's probably a good idea to implement/expand good open source tooling for reverse engineering of the security patches and provide very clear automated guidelines/scripts for how to use it 😉

Why would anyone buy the nft from this guy for that much?

There are many folks in the space that have a gap or two in their communication skills and that's often the root cause of the conflicts in my opinion.

If someone is in such situation (on either side), pls chat with Rusty or I'm also happy to jump on a call and talk through it, maybe give some tips and tricks.

I have been helping resolve conflicts between engineering teams for the last 12 years.

I'm still amazed how good Jellyfin is. Simple clean UI, no garbage, no ads, it works on my Samsung TV controlled with Samsung remote, it has IMDB score integrated, can download subtitles directly from it, it automatically pulls images for each movie in the Library, I just need to upload the movie to the right folder over scp and it indexes everything automatically, it works on my phone and laptop anywhere (over Tailscale), each movie has description, trivia on the actors...

#jellyfin #selfhosting

Yep, both correct. If the concentration would go higher people will get measurably stupider. If the concentration goes lower, then plants will die.

Very cool! Although there are small changes I'd recommend... like using keyd instead of input remmaper. And I'd probably switch the bigger apps to flatpak instead. I understand installing Signal and Brave natively though.

I have PopOS, but my plan is to just switch to plain Debian now...

Geyser now creates nostr profiles and posts for the campaigns, so the integration via nostr may not be that far. I don't know enough details about either though.

Idea: Wouldn't it be cool if nostr:nprofile1qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7qpq0r8xl2njyepcw2zwv3a6dyufj4e4ajx86hz6v4ehu4gnpupxxp7s85uvay has integration with nostr:nprofile1qyt8wue69uhkummnw3ezuer9d3hhgett9e6xktcpremhxue69uhkgetk9ehx7um5wfcxcctevaex7atwvshxxmmd9uqzpdkumh0cve6jslg6f6rzpkf24yzuykxc2zlcejfr6wwlrm07uhh878n2y8 to have a streamlined way for app authors to create a crowdfunding projects? From app author perspective I could upload to Zapstore and then click on a button to "create crowdfunding" and that would give me full experience of having a campaign, profile, etc.

Just let it out on us for no good reason, so we get the full experience 😅

When you are in a room with more than 1000, you get measurably more stupid. Over 2000 your performance on standard tests goes down to something like 50%.

Of course there is. Bitcoin chain has been used for all sorts of stupid data for many years.

Replying to Avatar Final

We've received the Pixel 10 we ordered and have confirmed it supports unlocking, flashing another verified boot key and locking again.

Our Pixel 10 support will likely only be possible to complete after we finish porting to Android 16 QPR1 which is being released in September.

A second Pixel 10 we ordered has arrived at a package forwarding service in the US to be shipped to a country without Pixels available.

We'll order a Pixel 10 Pro (XL) and Pixel 10 Pro Fold for our main device testing farm today too since we'll supporting all 4 variants of them.

Previously, we likely would have been able to implement support for the Pixel 10, Pixel 10 Pro and Pixel 10 Pro XL in the next 48 hours. However, we likely need to wait for Android 16 QPR1 and our port to it since we don't expect a Pixel 10 device branch will be pushed to AOSP.

We've received confirmation that Android is switching to having quarterly releases across devices. There will be 3 quarterly and 1 yearly release of Android and the Android Open Source Project. Monthly releases are Pixel exclusive and will have far fewer changes than before.

Previously, only Pixels shipped the quarterly releases in practice. Other OEMs will now be pushed to ship those, but not the monthly releases which are now officially Pixel exclusive. Please note monthly Android Security Bulletins are a different thing from the monthly releases.

Android Security Bulletins are backports of a subset of patches deemed High/Critical severity to older Android releases. That currently means the initial yearly releases of Android 13, 14, 15 and 16 without the monthly/quarterly updates for those. This will need to change now.

The changes are acceptable for us and we can deal with it. We're currently working with a major OEM towards future generations of their devices meeting our requirements and providing official GrapheneOS support. #GrapheneOS on both Pixels and these future non-Pixels will be fine.

Pixels are still the most secure Android devices and the only ones combining a high level of security with proper support for an alternate OS. However, it's clear they don't value alternate OS support and won't remain the best devices for GrapheneOS once we have official ones.

We could continue supporting future Pixels such as the Pixel 11 and Pixel 12 after we have another option available but we won't depend on them continuing to provide alternate OS support. It's good that the Pixel 10 still provides it since our alternative is a year or two away.

Great summary, thank you for the insights.

Yeah, absolutely bonkers, makes no sense.

Replying to Avatar leon_21

GM

Is this picture from the trash fence when they played? ;)

New Debian 13 is great!! I really enjoy the new GNOME, and I like the fact that now I actually only a small number of extras/addons on top of the baseline. That gives me comfort that if I'm installing this from scratch it would do well out of the box.

I recklessly installed this over existing Debian 12. The install wasn't as smooth as hoped - it bricked it a bit during installation and GnomeSession wouldn't start, since I had some old config in `~/.config/xkb/`, but nothing that ctrl+alt+F2 wouldn't solve 😉

If you are reckless like me, then you just need to replace the word

"bookworm" in `/etc/apt/sources.list` with the word "trixie", save and then run

`sudo apt update && sudo apt full-upgrade && sudo apt autoremove` and reboot.

#debian #trixie