This is a far larger problem than most people realize (not specifically the GM situation). Password reuse is so pervasive that these password stuffing attacks are usually wildly successful unless the online service mandates 2FA, which many services are hesitant to do because of the negative user experience. https://www.theregister.com/2022/05/25/gm-credential-stuffing-attack/
Use a password manager. Use unique passwords for each site/service, turn on 2FA/two step auth when available.
Dear open source users,
If the author of your favorite open source app has announced they stopped developing and supporting the app (because they're frustrated and possibly burned out), please don't suggest they do more free work so that you can continue using the app.
Instead, consider thanking them for their past work and let them know that you enjoyed their app.
another open source developer
Today starts the staged roll-out of the #Android 11 OTA Upgrade for the #Fairphone 3 and 3+. Manual installation files are supposed to arrive in a couple of days.
More info at
I just noticed "foreach" on npm is controlled by a single maintainer.
I also noticed they let their personal email domain expire, so I bought it before someone else did.
I now control "foreach" on NPM, and the 36826 projects that depend on it.
Hatte bis eben keine Ahnung von der Existenz von Weiße-Schoko-Blaubeer-Himbeer-Crumble-Eclairs. Aber nun bin ich fest entschlossen, dieses Phänomen genauer zu untersuchen. 🤓#cakefacts
I've made a deliberate choice against a quoting feature because it inevitably adds toxicity to people's behaviours. You are tempted to quote when you should be replying, and so you speak at your audience instead of with the person you are talking to. It becomes performative. Even when doing it for "good" like ridiculing awful comments, you are giving awful comments more eyeballs that way. No quote toots. Thank's
The most important thing to understand about Twitter is that they're an investment vehicle. That's their first function. It's not to serve the common good, or protect speech, it's to delivery on the needs of investors.
⚠️ We are planning to release important security fixes for #Mastodon on February 3rd, between 13:00 and 15:00 UTC.
To make sure that most servers can upgrade swiftly, we will release the fixes both as v3.3.2 and v3.4.6 (they will, of course, be also available on the main branch).
To make sure the upgrades on those older versions require the least intervention, with just a process restart, we have just released preparatory releases v3.3.1 and v3.4.5.