mas.to is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hello! mas.to is a fast, up-to-date and fun Mastodon server.

Administered by:

Server stats:

12K
active users

#shim

0 posts0 participants0 posts today
Nicolas Fränkel 🇺🇦🇬🇪<p>Implementing <a href="https://mastodon.top/tags/Container" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Container</span></a> Runtime <a href="https://mastodon.top/tags/Shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shim</span></a>: <a href="https://mastodon.top/tags/runc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>runc</span></a></p><p><a href="https://iximiuz.com/en/posts/implementing-container-runtime-shim/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">iximiuz.com/en/posts/implement</span><span class="invisible">ing-container-runtime-shim/</span></a></p>
Alien BOB<p>Liveslak 1.8.2 re-adds Secure Boot support</p><p>When Slackware-current upgraded the Grub package to 2.12,&nbsp; liveslak lost the ability to boot on a computer with Secure Boot enabled.</p><p>Grub 2.12 is a lot stricter than the previous 2.06 release when it comes to trusting the files it loads and executes. The way it works now is as follows (step 1 and 2 a</p><p><a href="https://alien.slackbook.org/blog/liveslak-1-8-2-re-adds-secure-boot-support/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alien.slackbook.org/blog/lives</span><span class="invisible">lak-1-8-2-re-adds-secure-boot-support/</span></a></p><p><a href="https://fosstodon.org/tags/Slackware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Slackware</span></a> <a href="https://fosstodon.org/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://fosstodon.org/tags/certificate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>certificate</span></a> <a href="https://fosstodon.org/tags/gpg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gpg</span></a> <a href="https://fosstodon.org/tags/grub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>grub</span></a> <a href="https://fosstodon.org/tags/liveslak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>liveslak</span></a> <a href="https://fosstodon.org/tags/secureboot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureboot</span></a> <a href="https://fosstodon.org/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a></p>
josmit<a class="hashtag" href="https://cuyes.mooo.com/tag/linux" rel="nofollow noopener noreferrer" target="_blank">#Linux</a> <a class="hashtag" href="https://cuyes.mooo.com/tag/lmde" rel="nofollow noopener noreferrer" target="_blank">#LMDE</a> <a class="hashtag" href="https://cuyes.mooo.com/tag/mint" rel="nofollow noopener noreferrer" target="_blank">#Mint</a> / <a class="hashtag" href="https://cuyes.mooo.com/tag/problema" rel="nofollow noopener noreferrer" target="_blank">#Problema</a> <br><br>Llevo ya casi 2 semanas con un verdadero dolor de muelas... y es que el puto paquete <a class="hashtag" href="https://cuyes.mooo.com/tag/shim" rel="nofollow noopener noreferrer" target="_blank">#shim</a>-signed no se deja actualizar, ni remover.<br><br>Desactive <a class="hashtag" href="https://cuyes.mooo.com/tag/uefi" rel="nofollow noopener noreferrer" target="_blank">#UEFI</a> y borre la particion que contenia los archivos para el arranque (ya que esta tarea la deje subordinada a otra distro) y ahora no puedo quitar este pequete, porque seria indispensable para el sistema bajo ¿UEFI? <br><br>¿Como se puede remover algo que te dice "E: Removing essential system-critical packages is not permitted. This might break the system."?
🄻 🅂 🄳<p>I have the following <a href="https://mastodon.social/tags/problem" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>problem</span></a> in <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> <br>When I installed it on the <a href="https://mastodon.social/tags/Lenovo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lenovo</span></a> P50, I did not find the option to change the mode from <a href="https://mastodon.social/tags/UEFI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UEFI</span></a> to <a href="https://mastodon.social/tags/Legacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Legacy</span></a>, so I installed Ubuntu with UEFI mode enabled.<br>Is it possible to disable UEFI mode and remove the <a href="https://mastodon.social/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a>-signed package (and its dependencies) inside Ubuntu?</p>
IT News<p>“Something has gone seriously wrong,” dual-boot systems warn after Microsoft update - Enlarge (credit: Getty Images) </p><p>Last Tuesday, loads of Linux us... - <a href="https://arstechnica.com/?p=2044381" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2044381</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/securitypatches" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securitypatches</span></a> <a href="https://schleuss.online/tags/secureboot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureboot</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/sbat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sbat</span></a> <a href="https://schleuss.online/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a></p>
Thorsten Leemhuis (acct. 1/4)<p>Interesting detail in the description of the main EFI changes merged for <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> 6.9[1]:</p><p>"'"Avoid creating mappings that are both writable and executable while running in the EFI boot services. This is a prerequisite for getting the x86 <a href="https://fosstodon.org/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> loader signed by MicroSoft again, which allows the distros to install on x86 PCs that ship with EFI secure boot enabled."'"</p><p>[1] <a href="https://git.kernel.org/torvalds/c/70ef654469b371d0a71bcf967fa3dcbca05d4b25" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.kernel.org/torvalds/c/70ef</span><span class="invisible">654469b371d0a71bcf967fa3dcbca05d4b25</span></a></p><p><a href="https://fosstodon.org/tags/Kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kernel</span></a> <a href="https://fosstodon.org/tags/LinuxKernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxKernel</span></a> <a href="https://fosstodon.org/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a></p>
Linux Magazine<p>Patch Now: Shim vulnerability affects nearly all Linux distros <a href="https://www.linux-magazine.com/Online/News/Bootloader-Vulnerability-Affects-Nearly-All-Linux-Distributions" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linux-magazine.com/Online/News</span><span class="invisible">/Bootloader-Vulnerability-Affects-Nearly-All-Linux-Distributions</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/bootloader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bootloader</span></a> <a href="https://fosstodon.org/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> <a href="https://fosstodon.org/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://fosstodon.org/tags/CVSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVSS</span></a> <a href="https://fosstodon.org/tags/HTTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HTTP</span></a> <a href="https://fosstodon.org/tags/bug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bug</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/patch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patch</span></a> <a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Bootloader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bootloader</span></a>-Lücke: Viele <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>-Distributionen sind gefährdet | Security <a href="https://www.heise.de/news/Bootloader-Luecke-gefaehrdet-viele-Linux-Distributionen-9624201.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Bootloader-Lueck</span><span class="invisible">e-gefaehrdet-viele-Linux-Distributionen-9624201.html</span></a> <a href="https://social.tchncs.de/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a></p>
Christoph Schmees<p><span class="h-card" translate="no"><a href="https://milliways.social/@mcfly" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mcfly</span></a></span> <br>No, the <a href="https://social.tchncs.de/tags/SHIM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SHIM</span></a> vulnerability is NOT a "Remore Code Execution vulnerability" [sic]. Unless of course one would be so silly as to remote boot over the public internet. <br>It is a mere inside threat. Exploitation would need a quite sophisticated "evil maid". So in the end it is 'nothing to write home about'.</p>
Pyrzout :vm:<p>Vulnerabilidad crítica que afecta a la mayoría de las distribuciones de Linux permite bootkits <a href="https://blog.elhacker.net/2024/02/vulnerabilidad-critica-distros-linux-bootkit.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.elhacker.net/2024/02/vuln</span><span class="invisible">erabilidad-critica-distros-linux-bootkit.html</span></a> <a href="https://social.skynetcloud.site/tags/vulnerabilidad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilidad</span></a> <a href="https://social.skynetcloud.site/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://social.skynetcloud.site/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> <a href="https://social.skynetcloud.site/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a></p>
Richi Jennings<p>A Microsoft researcher found it—and it’s somehow Microsoft’s fault.</p><p>A critical vulnerability in most <a href="https://vmst.io/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> distributions now has a patch ready. Enterprise users especially need this if booting using HTTP or PXE.</p><p>So go get it. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SBBlogwatch</span></a>, we patch <a href="https://vmst.io/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> and update the DBX. At @TechstrongGroup’s @SecurityBlvd: <a href="https://securityboulevard.com/2024/02/linux-shim-bootkit-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/02/</span><span class="invisible">linux-shim-bootkit-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Thorsten Leemhuis (acct. 4/4)<p>"Shim macht auf Linux-Systemen Secure Boot nutzbar."[1] ist irgendwie wie "Nasse Straßen führen zu Regen", wie es Michael Crichton beim "Gell-Mann Amnesia Effect"[2] erwähnt. 🤔</p><p>Klar, irgendwie stimmt der Satz. Aber irgendwie auch nicht, denn ohne etwas wie <a href="https://social.tchncs.de/tags/Shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shim</span></a> ließen sich <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>-Distributionen auf modernen <a href="https://social.tchncs.de/tags/UEFI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UEFI</span></a>-Systemen out-of-the-box gar nicht erst nutzen, solange <a href="https://social.tchncs.de/tags/SecureBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureBoot</span></a> aktiv ist. 🤨</p><p>[1] <a href="https://www.golem.de/news/shim-kritische-schwachstelle-gefaehrdet-secure-boot-unter-linux-2402-181956.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/shim-kritische-s</span><span class="invisible">chwachstelle-gefaehrdet-secure-boot-unter-linux-2402-181956.html</span></a></p><p>[2] <a href="https://en.wikipedia.org/wiki/Michael_Crichton#Gell-Mann_amnesia_effect" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Michael_</span><span class="invisible">Crichton#Gell-Mann_amnesia_effect</span></a></p>
Hamish M<p>So the shim boot loader has a serious bug in its HTTP handling, but TIL that shim does HTTP (or in fact any networking at all) and I still have no idea why. <a href="https://mastodon.au/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> <a href="https://mastodon.au/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
securityaffairs<p>Critical <a href="https://infosec.exchange/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> bug impacts every <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> boot loader signed in the past decade<br><a href="https://securityaffairs.com/158792/hacking/critical-shim-bug-linux.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/158792/hac</span><span class="invisible">king/critical-shim-bug-linux.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Denis Laskov 🇮🇱<p>Hi, my name is Shim Shady! (NVD CVSS 9.8 - Critical)</p><p>Critical vulnerability <br>CVE-2023-40547 was identified in the <a href="https://mastodon.social/tags/Shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shim</span></a> software (used by most Linux distributions during the boot process). Particularly - to support Secure Boot.</p><p><a href="https://eclypsium.com/blog/the-real-shim-shady-how-cve-2023-40547-impacts-most-linux-systems/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eclypsium.com/blog/the-real-sh</span><span class="invisible">im-shady-how-cve-2023-40547-impacts-most-linux-systems/</span></a></p>
IT News<p>Critical vulnerability affecting most Linux distros allows for bootkits - Enlarge </p><p>Linux developers are in the process of patching a hig... - <a href="https://arstechnica.com/?p=2001542" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2001542</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/bootkits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bootkits</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://schleuss.online/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> <a href="https://schleuss.online/tags/uefi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uefi</span></a></p>
Pete Prodoehl 🍕<p>It's been nearly 8 years since I 3D printed a shim...</p><p>➡️ <a href="https://rasterweb.net/raster/2015/12/28/3d-printed-shim/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rasterweb.net/raster/2015/12/2</span><span class="invisible">8/3d-printed-shim/</span></a></p><p><a href="https://mastodon.social/tags/3DPrinting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>3DPrinting</span></a> <span class="h-card" translate="no"><a href="https://techhub.social/@3dprinting" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>3dprinting</span></a></span> <a href="https://mastodon.social/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> <a href="https://mastodon.social/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a></p>
Reshmi Aravind<p>Red Hat is <a href="https://mstdn.social/tags/hiring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hiring</span></a>!<br>The Bootloader Engineering Team(Core Platforms Engineering) in Red Hat is looking for the sheer talented and open to all with the suitable skills passion and dedication.</p><p><a href="https://mstdn.social/tags/Hiring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hiring</span></a> <a href="https://mstdn.social/tags/RedHat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedHat</span></a> <a href="https://mstdn.social/tags/Fedora" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fedora</span></a> <a href="https://mstdn.social/tags/bootloader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bootloader</span></a> <a href="https://mstdn.social/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> <a href="https://mstdn.social/tags/Grub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Grub</span></a> <a href="https://mstdn.social/tags/firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmware</span></a> <a href="https://mstdn.social/tags/uefi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uefi</span></a> <a href="https://mstdn.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <br> <br>🌎 Remote , Mexico<br>⏰ Full-time<br>🏢 Red Hat</p><p>Link to apply for this position on this diverse team:<br><a href="https://global-redhat.icims.com/jobs/100038/principal-software-engineer/job" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">global-redhat.icims.com/jobs/1</span><span class="invisible">00038/principal-software-engineer/job</span></a></p>
Boiling Steam<p>Carmack The Wise (Predicting that something like Proton would be the best fit for Linux Gaming, back in 2013): <a href="https://boilingsteam.com/carmack-the-wise/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">boilingsteam.com/carmack-the-w</span><span class="invisible">ise/</span></a><br> <a href="https://mastodon.cloud/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.cloud/tags/linuxgaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linuxgaming</span></a> <a href="https://mastodon.cloud/tags/proton" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proton</span></a> <a href="https://mastodon.cloud/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> <a href="https://mastodon.cloud/tags/carmack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>carmack</span></a> <a href="https://mastodon.cloud/tags/prediction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>prediction</span></a></p>
Simon Charbonneau<p>New video tonight... Enjoy!!</p><p><a href="https://youtu.be/diNrZ3ZYEq4" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/diNrZ3ZYEq4</span><span class="invisible"></span></a></p><p><a href="https://universeodon.com/tags/Aputik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Aputik</span></a> <a href="https://universeodon.com/tags/stone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stone</span></a> <a href="https://universeodon.com/tags/splitting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>splitting</span></a> <a href="https://universeodon.com/tags/learninghowto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>learninghowto</span></a> <a href="https://universeodon.com/tags/rock" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rock</span></a> <a href="https://universeodon.com/tags/breaking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>breaking</span></a> <a href="https://universeodon.com/tags/feathersandwedges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>feathersandwedges</span></a> <a href="https://universeodon.com/tags/plugsandfeathers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plugsandfeathers</span></a> <a href="https://universeodon.com/tags/wedgesandshims" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wedgesandshims</span></a> <a href="https://universeodon.com/tags/wedge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wedge</span></a> <a href="https://universeodon.com/tags/shim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shim</span></a> <a href="https://universeodon.com/tags/weboughtland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>weboughtland</span></a> <a href="https://universeodon.com/tags/learningtobreakstones" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>learningtobreakstones</span></a> <a href="https://universeodon.com/tags/howtobreakstones" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>howtobreakstones</span></a></p>