Daniel Appelquist
@torgo.mastodon.social.ap.brid.gy
78 followers 11 following 430 posts
Open Source Strategist at Samsung and general Open Web Curmudgeon. Co-chair of the W3C @ab and ex-chair of W3C @tag; @openwebdocs co-founder; @openssf […] 🌉 bridged from https://mastodon.social/@torgo on the fediverse by https://fed.brid.gy/
Posts Media Videos Starter Packs
Reposted by Daniel Appelquist
bagder.mastodon.social.ap.brid.gy
The European Open Source Awards marks a celebration and one of a kind recognition of open source excellence in Europe.

Open Call for Nominations: https://europeanopensource.academy/open-call-nominations-european-open-source-awards-2026
torgo.mastodon.social.ap.brid.gy
Getting a flu jab. (Already had a covid booster this year.) 💉
torgo.mastodon.social.ap.brid.gy
Current status : submitting a complaint to the postal regulatory authority because Royal Mail has informed me that they do not support the Safari browser for their web sites. 🙄
torgo.mastodon.social.ap.brid.gy
Heading in to Lon-don today to learn about MCP. Keeping an open mind.
torgo.mastodon.social.ap.brid.gy
Managed to renew my NY Driver License! I'm still officially a New Yorker.
Reposted by Daniel Appelquist
openwebdocs.front-end.social.ap.brid.gy
We're happy to share that @sovtechfund invests in Web Security and Privacy Documentation!

Over the coming year, Open Web Docs will be working on creating and updating Security and Privacy documentation for web developers on @mdn.

Full announcement […]
Original post on front-end.social
front-end.social
torgo.mastodon.social.ap.brid.gy
I'm mentoring three students! What have I got myself into.
torgo.mastodon.social.ap.brid.gy
I'm constantly inspired to do better by the amazing people I get to work with in this job.
torgo.mastodon.social.ap.brid.gy
Visiting the amazing Do Ho Suh exhibit at the Tate Modern today.
Part of the exhibit - a wall created in transparent colored fabric including an air conditioner and fan.
torgo.mastodon.social.ap.brid.gy
What a world we live in. I have been on the phone for a half hour to arrange a call-out visit for a faulty *light* inside my (ahem) Samsung fridge - which is a bespoke part and not user serviceable. Call me old fashioned but I remember a time when you could unscrew a fridge lightbulb and replace […]
Original post on mastodon.social
mastodon.social
torgo.mastodon.social.ap.brid.gy
Oh look … a UK government e-petition demanding the government not introduce Digital ID cards. 🪪 https://petition.parliament.uk/petitions/730194
torgo.mastodon.social.ap.brid.gy
It goes without saying that London is not “under Sharia law.” However, the statement itself is (also obviously) a xenophobic dog whistle in the first place. To their credit, BBC did a good piece picking this apart https://www.bbc.com/news/articles/cre53qn8v07o and putting it in context.
Sir Sadiq Khan hits back at Donald Trump's Sharia London claim
The Mayor of London responds to the US president's speech to the United Nations.
www.bbc.com
torgo.mastodon.social.ap.brid.gy
It may be time to re-green my Lego bonsai. 🌸
A Lego bonsai tree in its "pink blossoms" mode.
Reposted by Daniel Appelquist
bagder.mastodon.social.ap.brid.gy
From suspicion to published #curl #cve. The process.

https://daniel.haxx.se/blog/2025/09/18/from-suspicion-to-published-curl-cve/
From suspicion to published curl CVE
Every curl security report starts out with someone submitting an issue to us on https://hackerone.com/curl. The reporter tells us what they suspect and what they think the problem is. This report is kept private, visible only to the curl security team and the reporter while we work on it. In recent months we have gotten 3-4 security reports per week. The program has run for over six years now, with almost 600 reports accumulated. On average, someone in the team makes a first response to that report already within the first hour. ## Assess The curl security team right now consists of seven long time and experienced curl maintainers. We immediately start to analyze and assess the received issue and its claims. Most reports are not identifying actual security problems and are instead quickly dismissed and closed. Some of them identify plain bugs that are not security issues and then we move the discussion over to the public bug tracker instead. This part can take anything from hours up to multiple days and usually involves several curl security team members. If we think the issue might have merit, we ask follow-up questions, test reproducible code and discuss with the reporter. ## Valid A small fraction of the incoming reports is actually considered valid security vulnerabilities. We work together with the reporter to reach a good understanding of what exactly is required for the bug to trigger and what the flaw can lead to. Together we set a _severity_ for the problem (low, medium, high, critical) and we work out a first patch – which also helps to make sure we understand the issue. Unless the problem is deemed serious we tend to sync the publication of the new vulnerability with the pending next release. Our normal release cycle is eight weeks so we are never farther than 56 days away from the next release. ## Fix For security issues we deem to be severity low or medium we create a pull request for the problem in the public repository – but we don’t mention the security angle of the problem in the public communication of it. This way, we also make sure that the fix gets added test exposure and time to get polished before the pending next release. Over the last five or so years, only two in about eighty confirmed security vulnerabilities have been rated a higher severity than medium. Fixes for vulnerabilities we consider to be severity high or critical are instead merged into the git repository when there is approximately 48 hours left to the pending release – to limit the exposure time before it is announced properly. We need to merge it into the public before the release because our entire test infrastructure and verification system is based on public source code. ## Advisory Next, we write up a detailed security advisory that explains the problem and exactly what the mistake is and how it can lead to something bad – including all the relevant details we can think of. This includes version ranges for affected curl versions and the exact git commits that introduced the problem as well as which commit that fixed the issue – plus credits to the reporter and to the patch author etc. We have the ambition to provide the best security advisories you can find in the industry. (We also provide them in JSON format etc on the site for the rare few users who care about that.) We of course want the original reporter involved as well so that we make sure that we get all the angles of the problem covered accurately. ## CVE As we are a CNA (CVE Numbering Authority), we reserve and manage CVE Ids for our own issues ourselves. ## Pre-notify About a week before the pending release when we also will publish the CVE, we inform the distros@openwall mailing list about the issue, including the fix, and when it is going to be released. It gives Open Source operating systems a little time to prepare their releases and adjust for the CVE we will publish. ## Publish On the release day we publish the CVE details and we ship the release. We then also close the HackerOne report and disclose it to the world. We disclose all HackerOne reports once closed for maximum transparency and openness. We also inform all the curl mailing lists and the oss-security mailing list about the new CVE. Sometimes we of course publish more than one CVE for the same release. ## Bounty Once the HackerOne report is closed and disclosed to the world, the vulnerability reporter can claim a bug bounty from the Internet Bug Bounty which pays the researcher a certain amount of money based on the severity level of the curl vulnerability. (The original text I used for this blog post was previously provided to the interview I made for Help Net Security. Tweaked and slightly extended here.) ## The team The heroes in the curl security team who usually work on all this in silence and without much ado, are currently (in no particular order): * Max Dymond * Dan Fandrich * Daniel Gustafsson * James Fuller * Viktor Szakats * Stefan Eissing * Daniel Stenberg
daniel.haxx.se
torgo.mastodon.social.ap.brid.gy
Activated accessibility features across my Apple devices just now: "reduce transparency" and "reduce motion". That's much better.
torgo.mastodon.social.ap.brid.gy
Going from pillar to post today.
torgo.mastodon.social.ap.brid.gy
Loving the Liquid Glass UI makeover for @IceCubesApp.
Reposted by Daniel Appelquist
Reposted by Daniel Appelquist
evan.cosocial.ca.ap.brid.gy
I don't know if modern Web developers are aware how much of a struggle it was to get to the HTML5 stack we use today. There was a loooooooooot of bullshit to wade through. VBScript, Java applets, browser plugins, Flash. It was a fight every step of the way.
torgo.mastodon.social.ap.brid.gy
Doing some diversity & inclusion training. Watch out, fascists!