Joachim Viide's Avatar

Joachim Viide

@jviide.iki.fi

https://jviide.iki.fi

307
Followers
27
Following
106
Posts
16.01.2024
Joined
Posts Following

Latest posts by Joachim Viide @jviide.iki.fi

A grey hoodie with text which reads:

“Buy a man eat fish,
He day, teach fish man
To a lifetime.”

A grey hoodie with text which reads: “Buy a man eat fish, He day, teach fish man To a lifetime.”

Wise words

27.02.2026 23:53 👍 7946 🔁 1900 💬 157 📌 141
Video thumbnail

Not that this is very surprising. But people are using these things for everything, so it'd probably be good to be aware of this sort of behavior.

19.02.2026 15:56 👍 1 🔁 0 💬 0 📌 0

Well, I'll be!

19.02.2026 15:39 👍 1 🔁 0 💬 1 📌 0

Within three to six months, 9000% of all new code will be written by AI.

12.02.2026 18:49 👍 6 🔁 0 💬 1 📌 0
Preview
Denial of Service and Source Code Exposure in React Server Components – React The library for web and native user interfaces

New @react.dev patches released today for CVE-2026-23864. Fixes for DoS issues reported by several people, including Yours Truly 🙂

The blog post at react.dev/blog/2025/12... has been updated with the new info.

26.01.2026 19:54 👍 12 🔁 4 💬 0 📌 0

O(n²) works great until n+1.

26.01.2026 12:10 👍 8 🔁 0 💬 0 📌 0

me: move fast and break things

my dentist: what

20.01.2026 13:46 👍 5 🔁 0 💬 0 📌 0

scoreboard

19.01.2026 23:10 👍 5935 🔁 959 💬 121 📌 33

The way you handled my semi-coherent devalue reports only reinforced my already high opinion of the Svelte team.

16.01.2026 11:58 👍 7 🔁 0 💬 1 📌 0

Huge props to the @svelte.dev team for an exceptionally well-handled vulnerability process, despite my terrible timing of reporting the devalue issues just before New Year’s Eve 🙂

15.01.2026 19:36 👍 25 🔁 3 💬 0 📌 0
A graph by National Agriculture Statistics service: "Actual and Trend Yields for Corn" (with the years 1886-2022 crudely crossed over).

A graph by National Agriculture Statistics service: "Actual and Trend Yields for Corn" (with the years 1886-2022 crudely crossed over).

AND THEY EXPECT US TO BELEIVE THIS IS "JUST A COINCIDENCE" ?? !?

12.01.2026 14:53 👍 4 🔁 0 💬 0 📌 0
Two graphs, the first one being "Preact.js downloads over time" 2015-2025, the other being "UFO sightings over time" 1940-2015, showing a vaguely similar increasing trend over time.

Two graphs, the first one being "Preact.js downloads over time" 2015-2025, the other being "UFO sightings over time" 1940-2015, showing a vaguely similar increasing trend over time.

OPEN YOU'RE EYES 👁️👄👁️

12.01.2026 11:50 👍 67 🔁 7 💬 1 📌 0
Post image

◉‿◉

06.11.2025 11:27 👍 506 🔁 66 💬 4 📌 1
Meta's "Want to subscribe or contibue using our Producs free of charge with ads?" dialog that forces you to choose between subscribing for 5.99€/month and having your data being processed for ads.

Meta's "Want to subscribe or contibue using our Producs free of charge with ads?" dialog that forces you to choose between subscribing for 5.99€/month and having your data being processed for ads.

Pretty cool that you have to create a Facebook account to file a vulnerability report to Meta.

08.01.2026 15:22 👍 5 🔁 0 💬 0 📌 0
VSCode Settings tab with chat.disableAIFeatures feature toggled on.

VSCode Settings tab with chat.disableAIFeatures feature toggled on.

TIL there's a VSCode setting called chat.disableAIFeatures.

06.01.2026 00:43 👍 4 🔁 1 💬 0 📌 0
Preview
Starberry Jam Listen to Starberry Jam by Extralight Semibold #np on #SoundCloud

Wishing you all an Extralight Semibold New Year! soundcloud.com/extralight-s...

04.01.2026 19:40 👍 2 🔁 0 💬 0 📌 0

Merry Glutmas! ✨

30.12.2025 23:00 👍 1 🔁 0 💬 0 📌 0
A screenshot of the gym app telling "your strongest muscle group is glutes", accompanied by a diagram highlighting those muscles.

A screenshot of the gym app telling "your strongest muscle group is glutes", accompanied by a diagram highlighting those muscles.

Turns out that the gym app has a Year in Review feature, and I'm now contemplating a side hustle as a part-time nutcracker.

30.12.2025 22:27 👍 3 🔁 0 💬 1 📌 0

Merriam-Webster’s human editors have chosen ‘slop’ as the 2025 Word of the Year.

15.12.2025 14:07 👍 24058 🔁 7283 💬 361 📌 941

Last month was one of those years that feel like a decade.

15.12.2025 10:35 👍 1 🔁 0 💬 0 📌 0
A quote from RFC 6238: "The verifier MUST NOT accept the second attempt of the OTP after the successful validation has been issued for the first OTP, which ensures one-time only use of an OTP."

A quote from RFC 6238: "The verifier MUST NOT accept the second attempt of the OTP after the successful validation has been issued for the first OTP, which ensures one-time only use of an OTP."

In the end, it would be best if NPM just blocked TOTP reuse.

TOTP stands for “Time-based One-Time Password,” after all. The “one-time” property is important enough to account for 50% of the acronym. 🙂

Even the spec explicitly calls for blocking reuse: datatracker.ietf.org/doc/html/rfc... 6/6

12.12.2025 13:08 👍 9 🔁 2 💬 0 📌 0
Preview
Configuring two-factor authentication | npm Docs Documentation for the npm registry, website, and command-line interface

What should you do as a package maintainer?

I’d argue that “don’t get phished” isn’t very constructive advice. To err is human.

Upgrading to phishing-resistant 2FA methods such as passkeys is a good idea. See docs.npmjs.com/configuring-...

But this would require all maintainers to act. 5/

12.12.2025 13:08 👍 2 🔁 0 💬 1 📌 0

So, with a single phished NPM TOTP token + password combo, a well-prepared (automated?) attacker can quickly list your packages, downgrade some of their publishing requirements, and then create a granular token.

This extends the attacker's window for publishing nasty versions of your packages. 4/

12.12.2025 13:08 👍 2 🔁 0 💬 1 📌 0

The “require 2FA for publishing” setting can’t be downgraded without a 2FA check.

But the attacker can reuse the phished TOTP code to perform a downgrade and allow publishing with “a granular access token with bypass 2FA enabled.”

Granular access tokens can be created without any 2FA checks. 3/

12.12.2025 13:08 👍 2 🔁 0 💬 1 📌 0

In NPM, a package can be configured to require 2FA for publishing (“Require two-factor authentication and disallow tokens”).

However, if an attacker phishes your password and a valid TOTP code, they can reuse them to publish packages in your name.

But at least the time window is limited, right? 2/

12.12.2025 13:08 👍 2 🔁 0 💬 1 📌 0

To recap, NPM allows 2FA TOTP token reuse within the token’s validity window.

I reported this and was told it’s a “known low-risk issue” and that they “don’t consider this to present a significant security risk.”

So, let’s look at how this seemingly small issue could be leveraged by a phisher. 1/

12.12.2025 13:08 👍 22 🔁 13 💬 3 📌 0

Update on React Server Components CVE-2025-55182: over 165K IPs & 644K domains with vulnerable code found on 2025-12-08 after scan targeting improvements!

See: dashboard.shadowserver.org/statistics/c...

Check for compromise & patch!

Thank you to Validin & LeakIX for the collaboration!

09.12.2025 16:24 👍 14 🔁 7 💬 1 📌 2

From the thread: "Attacks from bot compromised Next.js assets spiked on 2025-12-05 from the usual 100 IP baseline to close to a 1000."

If you're not 100% sure you're NOT vulnerable, you should patch your Next.js apps ASAP.

And if you're 100% sure... patch anyway.

08.12.2025 18:12 👍 14 🔁 7 💬 0 📌 0
Super Mario style warp pipe, with two feet sticking out of it.

Super Mario style warp pipe, with two feet sticking out of it.

I must go, my people need me.

(Nintendo Museum, Kyoto)

02.12.2025 13:54 👍 3 🔁 0 💬 0 📌 0

There are things I will not let go of, but I also don't want to become one of those permanently aggrieved people whose personality has been wholly replaced by three grudges in a trenchcoat.

01.12.2025 00:42 👍 25 🔁 1 💬 2 📌 0