__stack_chk_guard = U'π€';
__stack_chk_guard = U'π€';
The manufacturer data is Lego Wireless Protocol 3 data for family 3, device 0: lego.github.io/lego-ble-wir...)
The UUID is what the app's source calls the WirelessDataExchange protocol.
This is as much as I can do before the real Lego Smart Brick releases tomorrow. I'll write up what I have.
#Lego
Screenshot: Lego Smart Assist app's "Searching" screen displaying a Smart Brick named "sdk_gphone64_arm64"
Screenshot: nRF Connect showing the "Edit advertising packet" screen
I can make a fake Lego Smart Brick show up in the Lego Smart Assist app, using this nRF Connect config:
Advertising data:
- Manufacturer data:
- Company ID: 0x0397
- Data: 006003FFFF00
- 16-bit service UUID: 0xfef6
Scan response data:
- Complete local name
Options: Connectable, Discoverable
Lego built the Smart Assist app (the firmware updater for the Lego Smart Brick) in... Unity.
The Lego Smart Assist app is out:
play.google.com/store/apps/d...
I expect homebrewers to run Doom on the Lego Smart Brick at 1x1 resolution, a week before its officially release.
Men's shirts: buttons on the right
Men's pants: buttons on the right
Women's pants: buttons on the right
Women's shirts: buttons on the left
buttons-on-the-left is big endian clothing
last call at the resizable bar
It shouldnβt have taken me 2 years to realize why the main character of "Wish" is named Asha.
www.behindthename.com/name/asha-1
Wait, mystery girl who fled from the royal ball at the stroke of midnight!
You dropped your...
left AirPod?
Note that Meta has an official SDK that lets you access the camera from a paired phone app (no running code on the glasses itself, unfortunately): developers.meta.com/wearables/
I don't think they've enabled it for the Display yet, though (it requires OS 21 and the Display's only up to OS 20?)
If you want to capture network traffic from the Meta AI app, you'll need a rooted Android with Frida: (notnow.dev/notice/AzcBs...)
There's an archive of firmwares in cocaine.trade/Ray-Ban_Disp... .
As far as I know, there's no way to install apps on real hardware yet.
You can emulate a Display in the Android Emulator with github.com/zhuowei/meta...
GORDON'S ALIVE?!
bsky.app/profile/thev...
Flash memory shortage hits the animation industry
bsky.app/profile/thev...
Graydon! Graydon! It's Tony! Your cousin, Tony Hoare! You know that compile-time check you're looking for?
Gen Alpha smashes the stack with "gggggggggggggggggggggggggggggggggggggggggggggggggggggggggggggggg"... (0x67676767)
I ported Starcruiser (my attempt at talking to a Meta Ray-Ban) to Python/Bumble.
Still doesn't work, and connecting to my Android emulator running Meta Ray-Ban firmware doesn't seem to help.
Based on the logcat, it seems the Meta Ray-Ban never reads the EnableEncryption packet. Time to run Frida..
A20-line skirt
Thank you, GDPR, for protecting our right to amnesia plots in TV shows
(AFAIK, EU does not allow countries to store biometrics collected for national identity cards in a central database (fra.europa.eu/sites/defaul...), so shows can still have an EU citizen wake up with no memory of their name)
People who can read Chinese or Japanese, looking at GenAI output:
"Ha, ha, ha: δΈ"
WinRAR extraction shooter
As far as I know, libslirp is the only remaining FreeBSD-derived networking stack that doesn't include the CVE-1999-0001 patch.
RTEMS, which used to have a legacy libnetworking stack forked from FreeBSD before the patch, removed that stack in 2021.
Anything else I should look at?
Aww, libslirp canβt be exploited by CVE-1999-0001 (OpenBSD patch), as far as I can tell after spending a month researching the CVE and a whole day testing libslirp.
www.cve.org/CVERecord?id...
github.com/openbsd/src/...
gitlab.freedesktop.org/slirp/libsli...
Waking up in a Las Vegas hotel room with no memory of what happened in 2009 that caused all movies/books/TV shows to begin with the protagonist waking up with no memory of what happened.
If I wanted in medias res I would just skip your book and read the sequel.
"com/facebook/wearable/datax/JniHell.class"
Me too, Meta, me too
I wrote a blog post on CVE-2025-48593, an issue patched in Android's November Security Bulletin that only affected devices which act as Bluetooth headphones, such as smartwatches, smart glasses, and cars.
I examined the patch and wrote a proof-of-concept:
worthdoingbadly.com/bluetooth/
I got a write to 0x0041414141414141 with my proof-of-concept for CVE-2025-48593.
github.com/zhuowei/blue...
What can I do with this? Getting an infoleak is probably possible, but hard. For a proof-of-concept, I wonβt bother defeating ASLR: Iβll just arbitrary-write to hardcoded memory addresses.
Amazing floats in the Macy Thanksgiving Parade yesterday:
-0.0, 1.1920929e-7, even 1.3211836e19!
I'm not the author of DynamicCow, and I'm not too familiar with modifying the dynamic island. You're probably looking for x.com/aboutzeph .
Petition to replace "ARC Raiders"βs AI voice with Morshu