Ace: aceofspadeshq at gee mail.com
Buck: buck.throckmorton at protonmail.com
CBD: cbd at cutjibnewsletter.com
joe mannix: mannix2024 at proton.me
MisHum: petmorons at gee mail.com
J.J. Sefton: sefton at cutjibnewsletter.com
Jay Guevara 2025 Jim Sunk New Dawn 2025
Jewells45 2025 Bandersnatch 2024
GnuBreed 2024
Captain Hate 2023
moon_over_vermont 2023
westminsterdogshow 2023
Ann Wilson(Empire1) 2022 Dave In Texas 2022
Jesse in D.C. 2022 OregonMuse 2022
redc1c4 2021
Tami 2021
Chavez the Hugo 2020
Ibguy 2020
Rickl 2019
Joffen 2014
AoSHQ Writers Group
A site for members of the Horde to post their stories seeking beta readers, editing help, brainstorming, and story ideas. Also to share links to potential publishing outlets, writing help sites, and videos posting tips to get published.
Contact OrangeEnt for info: maildrop62 at proton dot me
The FTC has a rule that if a proposed regulation would have an impact of more than $100 million it must first go through a regulatory analysis process.
The FTC deemed the impact less than $100 million and so skipped that process, but the Eight Circuit disagreed, requiring the FTC to go back, if not to square one, then at least to square four.
Not a fatal hole, by my reading. The underlying technique - called Fiat-Shamir transforms - has been proven to be secure if the random numbers used are truly random. The trick here is that if you know how the random numbers are generated, a malicious program can use that information to "prove" things that aren't true.
If you require that the program code be less complicated than your random number generator, though, this attack is foiled.
Severity is ranked as "medium" and BIOS updates are on their way.
There are also two low-severity issues that leak data that technically should be leaked but which doesn't really matter. Only the low-severity leaks affect older Zen 1 and Zen 2 chips.