art (6 posts)

    Sensor noise art

    2023 Jul 12 #art

    I was playing around with Open Camera with a very long exposure (10 seconds), with a somewhat high ISO (3000ish), with my camera placed against a flat object so it doesn’t see any outside light. This is a great way of capturing sensor noise, though it does seem to be brighter around the outside, and less in the middle. Light leakage? Or just how the sensor works?

    Anyways, I did that, and then played around with every nearly filter the stock photos app on my phone had, which results in some neat wallpapers.

    some pictures i took today

    2023 Apr 18 #art

    I was going into town today, and took the chance to take some pictures.

    You can click them to open them as a JPEG XL for the original size and higher quality. If your browser doesn’t support JPEG XL, try opening it in something that does.

    This was my first time using darktable. I don’t know what I’m doing in it, but at least I managed to nicely censor out the license plates.

    (also, these were taken on the 17th, but i’ve not slept since for it is nearly 1AM, so i still consider that today)

    Trans rights blend

    2021 Feb 07 #art

    I made a trans flag wallpaper in blender!

    I actually made this like a year ago but I’m publishing it now.


    2020 Dec 31 #art

    When writing a box blur implementation, initially I had a fun bug where the rolling sum for values on the left were incorrect, since I did not include early values in the blur. It looks really cool so I kept the code for it.

    If you just want to try it out on your own images, I wrote a JS version.

    Below is the code, with the required fix commented out. This does a box blur on a single row of the image, with a specified width.

    µ [sic]

    2020 Nov 12 #art

    here you go have a full on album ig,,,

    as always source embedded in the files

    music made with (a non-trivial amount of) C

    2020 Nov 10 #art

    There’s a better post to be made about making music with bitshifting but that post is still due to be released on the year of the linux desktop.

    Volume Warning: Is reasonable on my machine. Check yours.

    Source Code: Run strings on the file.

rant (2 posts)

    Your machine isn't turing complete, so why are you mentioning the halting problem?

    2023 May 01 #rant

    Sometimes I will be part of exchanges such as:

    Me: It would be cool if you could prove the lack of stack overflows in code!

    Someone: Proving that code will not stack overflow is the same as solving the halting problem though.

    Which is very much true, if you demand no false positives. But rather pointless. It’s being overly pedantic as a way of (intentionally or otherwise) being dismissive about useful feature ideas.

    C#'s broken type system

    2020 Jul 02 #rant

    C# has a broken type system. And by that I mean the vast majority of function signatures that you write in C# are lies, and your function won’t be able to do meaningful work with all values that compile, and that there’s nothing you can do to fix this.

security (3 posts)

    Spot the bug: Bad Escape

    2023 Jul 19 #security

    Hi! I wrote some Excellent Javascript that lets you change an image based on the funny little characters you type in the box at the bottom. I’ve vaguely heard of XSS, so I know that I should escape the characters, so I copied the escaping rules from Tera.

    Namely, replacing &, <, >, ", \``, and /` with their associated HTML entities.

    Your task is to call submitFlag with the string value <>. If you succeed, I will alert a fun message for you :)

    PoC Watermark Attack on Restic

    2023 May 20 #security

    First off, does this matter to you? No. No it doesn’t. Unless you’re backing up gigabytes of completely attacker controlled data, to an attacker controlled service, and need to ensure they don’t know you’re backing up said data, it Doesn’t Fucking Matter.

    With that said, it’s a somewhat neat attack!

    A watermarking attack is when an attacker who can get you to store an attacker-controlled piece of data can then detect the presence of that attacker controlled data. It’s not a huge deal, but is a concern if someone is able to inject a watermark into, say, copywritten or leaked content, and then automatically terminate the cloud storage/backup accounts of users that can be shown to have that data on their drive.