It started with an attempt to fix a flaky unit test, which expanded into deleting some unused code which expanded into deleting almost 4000 lines of code. A nice PR to finish off with before vacation starts!

“Lines updated: +1 -3888”

A fox showed up in our backyard while we were grilling

Eating one of these is like eating a whole bag of Djungelvrål, it’s completely insane and I can’t stop

A hand holding a jar of black, powder-coated candies with a white label featuring the large text "SVENSKJÄVLAR!" in Swedish. The background shows an outdoor scene with green trees and several buildings, indicating the jar is being held near a window.

(I don’t know how Sparkle operates; if it only does the extraction after signature validation I guess an attack would be pretty hard to pull off even if you have a zero day in the archive decompressor.)

Step 1: find zero day vulnerability in obscure archive format
Step 2: add said archive format to the most popular 3rd party macOS software update framework
Step 3: ???

Add support for extracting Apple Archives (.aar files) by zorgiepoo · Pull Request #2586 · sparkle-project/Sparkle

Useful things I own, part 82768492

Voted in a building with this weird structure in it

Also this one

Cleaning day at the office. Found this old beauty.