Cover photo
Robert Quattlebaum (darco)
Works at Nest Labs
Attended DigiPen Institute of Technology
Lives in San Jose, CA
4,271 followers|576,832 views


The struggle continues. In this case, what was a step forward became a step backward when a teacher found out he was born without a penis. After using the boys room for years, with none of the other students knowing he was trans, he was forced to use the girls room or use the distant nurses restroom. Horrible.

But he's fighting back. Not for him, but for everyone who will follow in his footsteps that just wants to pee in peace.

After years of treating him like a boy, the school was effectively outing him.
Add a comment...
Travis Owens's profile photoMichael Ireland's profile photo
Or maybe it's our eyeballs??? ;)
Add a comment...
If only we had a wall. Oh wait...
U.S. authorities on Wednesday seized a cross-border tunnel that ran the length of four football fields from a restaurant in Mexicali, Mexico, to a newly built house in Calexico, California, following an investigation that netted more than a ton of marijuana and resulted in four arrests.
Michael Hartman's profile photo
Alternatively, I'm starting a ladder business that sells 31' ladders and ropes. It'll be yuuuge. 
Add a comment...
The explanation seems plausible, considering that it centers around confusion over the difference between "And Justice For All" in Florida, "And Justice For All" in Utah, and "Justice For All" in Kansas—all entirely different organizations.
The donation that Trump’s foundation made to a group backing Pam Bondi was a potential violation of federal rules.
Add a comment...
This is a news story that hasn't gotten enough press attention. Earlier today at Belgrade airport, bomb-sniffing dogs alerted on a pair of wooden coffins which had been shipped as cargo from Beirut, with a manifest bound for Portland. Inside were a pair of AGM-114 "Hellfire" missiles. (Fully live: it was the explosives in the warhead which the dogs spotted)

The FBI is investigating, and there aren't many details yet, but questions like just who was trying to get Hellfire missiles in Portland, and why come up pretty quickly. There is pretty much no use for these which isn't dangerously alarming.

Hellfire missiles were originally designed as air-to-surface missiles to be fired from helicopters, and are a major part of the loadout of Predator drones. However, they can also be fired as surface-to-surface weapons, as e.g. when they are mounted on assault boats. They come in a few variants, with anti-tank, blast-fragmentation, and thermobaric warheads, and various aiming and guidance options; the precise variant in the cargo has not been announced. (However, it's a fair guess that it's a laser-guided missile, where the operator "paints" the target with a laser dot which the missile homes in on; all other guidance types only work if they're coupled with something else pretty sophisticated, like an Apache helicopter's "Longbow" system) They have a range of 8km.

The good news, such as it is, is that the Hellfire was not designed for surface-to-air use, and so it's unlikely that the plan involved firing on civilian aircraft. (Or if that was the plan, it's unlikely to have succeeded)

From a practical smuggling perspective, this route makes good sense: Beirut is a place where you could get missiles (likely transported to there from active war zones in Syria or Iraq), and by routing it through a country where security may be lax enough for something to get through, but not so lax that security at the arriving country will be extra-tight, you maximize the odds. Hiding them in coffins similarly is a way to distract attention. So this definitely has the air of professional arms smugglers trying to get a shipment to someone. But who?
Documents listed the final destination for the AGM-114 Hellfire missiles as Portland.
123 comments on original post
Add a comment...
Have him in circles
4,271 people
Ap- Plomberie's profile photo
Pascal Anglade's profile photo
Javier Cepeda's profile photo
The Elon Musk Fan Club's profile photo
Oussama Sabri's profile photo
Melissa Bissardon's profile photo
Rudye McGlothlin's profile photo
Allthings Trendy's profile photo
Paul Cohen's profile photo
Reminds me of some of my old fractal stuff from the ancient predecessor of #Synfig:
billtavis: I just completed the finishing touches on my new poster, a detailed map of the Mandelbrot Set in a vintage style. I’m calling it the Mandelmap. The Mandelbrot Set is a fractal shape with infinite detail that you can zoom in on. I often explore the Mandelbrot Set to find trippy patterns to create gifs with, but when I started I felt like I was just poking around at random. So I wanted to create a printed guide for myself to fin...
4 comments on original post
Add a comment...
Quick tutorial I threw together today (largely so I wouldn't forget):

"This tutorial will walk you through the steps needed to get root SSH access on an Engenius EAP600 dual-band WiFi access point. SSH doesn't come enabled out of the box on these things, so if you want to SSH into the device (which is running an old version of OpenWRT), keep reading."
Enabling SSH on Engenius EAP600
Add a comment...
Last night I managed to perform a successful exploit of a previously undocumented input sanitization bug in an off-the-shelf network device (An enterprise-class Wi-Fi access point). Using this bug I was able to execute shell commands on the device as root, and enabled SSH access. This is classic vulnerability that is very easy to both exploit and prevent.

The attack targeted the diagnostics page on the access point, which includes common diagnostic tools like ping and traceroute. I could tell that they were basically passing inputs from the web page directly as command line arguments to the ping command. The attack leverages the fact that input sanitization on the diagnostics page only occurs inside of the browser—not on the server, where it really matters. By bypassing the web interface and setting malicious inputs directly, I was able to insert additional shell commands into a string which was executed as root.

There were three arguments to the ping command: the ip address, the count, and the packet size. For example, the arguments "", "4", and "64" would lead to the command "ping -c 4 -s 64" being executed. By changing the packet size to instead be the value "; find /", I could make the line that gets executed be "ping -c 4 -s ; find /". Instead of getting ping results, I then got a list of every file on the device. As an added bonus, this command runs as root! Game over.

The severity of the issue isn't huge because it requires that you be logged-in to the management page in order to perform the attack, but I figured its presence was an indication of sloppiness that likely indicates that there are additional flaws. I've already found one that exposes the management web interface for the access point to the entire IPv6 internet (even after limiting management access to a specific VLAN that doesn't have internet access). Oops.

Security should not be an afterthought, folks.
Add a comment...
If you ever want experience with wrapping your brain around the justification of an anachronistic, unsustainable, and outright dangerous idea, Google for "Why is contraception immoral".

I remain throughly unconvinced.
Add a comment...
A group of hackers, previously involved in various hacktivism campaigns, have accidentally made their way into an ICS/SCADA system installed at a water treatment facility and have altered crucial settings that controlled the amount of chemicals used to treat tap water. ... After Verizon finished their investigation, the RISK team reassured that there was no malevolence from the hackers' side. They also informed the water treatment company that the hackers had access to over 2.5 million customer personal and financial records and provided technical expertise on how KWC could fix their IT system to prevent similar incidents.
Bad network design exposes water treatment plant to hacking
Add a comment...
Well said, Yonatan.
This is a short but interesting article on the origins of Trump's popularity. It highlights an important point: while economic issues make people more open to outsiders who want to "overturn the system," the root of his support isn't economic at all, but social and cultural. The "liberal elites" who people rail against aren't economic elites, but rather social ones. That is, a lot of the people from whom he is mining his followers are "people who believe they... deserve to be at the center of American life and culture," and who see a culture which instead of treating with respect and deference, often treats them with mockery.

This is a very important point to understand, especially for those who would reduce politics to simple economics. People ultimately value their self-identification very profoundly, often even more than their physical survival. When this is threatened, it can animate extremely violent passions.

Alas, when the self-identification is based on one's identification relative to others -- as in, "at least we're better than those bastards" -- then the risk of implosion is far higher, since sometimes those bastards end up not playing the role required by your script. The result is inevitably powerful conflict.

via +Jennifer Freeman 
Trump's running to get revenge on everyone who laughed at him, and that's why his supporters identify with him
154 comments on original post
Add a comment...
Have him in circles
4,271 people
Ap- Plomberie's profile photo
Pascal Anglade's profile photo
Javier Cepeda's profile photo
The Elon Musk Fan Club's profile photo
Oussama Sabri's profile photo
Melissa Bissardon's profile photo
Rudye McGlothlin's profile photo
Allthings Trendy's profile photo
Paul Cohen's profile photo
Software Engineer
  • Nest Labs
    Embedded Platform Connectivity Engineer, 2013 - present
  • Apple Inc.
    Display Systems Engineer, 2007 - 2013
  • Crystal Dynamics
    Art Tools Engineer, 2005 - 2007
  • Voria Studios
    Co-Founder, 2002 - 2005
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
San Jose, CA
Valdosta, GA - Bellevue, WA - Sammamish, WA - Redwood City, CA - Campbell, CA - Beech Mountain, NC
Maker of Things
My full name is Robert S. Quattlebaum.

I live in San Jose, California. I grew up in a small city in south Georgia called Valdosta.

My amateur radio call sign is N6DRC.

Bragging rights
Original author of Synfig, Made the ybox2 kit, Did some cool stuff with Christmas lights, Doing lots of Internet-of-Things stuff, Built a 3D printer, Looking for the next project
  • DigiPen Institute of Technology
    Science of Real-Time Interactive Simulation, 2000 - 2002
Basic Information
Looking for
Friends, Dating, A relationship, Networking
Other names
Robert Quattlebaum (darco)'s +1's are the things they like, agree with, or want to recommend.
Gmail thinks my PGP-signed or S/MIME-signed emails are spam - Google Pro...

Google Product Forums > Gmail Help Forum >. Categories: Fix an issue or problem : Managing Settings and Mail : Mac : Other Browser (please s

Nest is moving again. And again.

A look back at where Nest Labs started - a leaky garage in Palo Alto - to where we are now.


We're Nest, makers of the Nest Learning Thermostat.


Synfig Studio is a free and open-source 2D animation software

Finally, A Watchable Version of Dora

As a parent, I am constantly forced to use television to distract my children for brief (extended) intervals so that I can work (play video


Pants are Optional.

Missing Hiker Huddled With Cat

To survive almost a month in cold.

Technical Notes: Desktop Drives in a RAID

Desktop Drives in a RAID. I read a post today that reminded me of something I've seen far too often, and something that I was guilty of

Look at this exploding copper wire » BuildLounge

Look at this exploding copper wire. Categories: Electricity,; Explosions. by Mark. I know, this looks like just another light painting doesn

STM32 Toolchain on Mac OS X « curious

STM32 Toolchain on Mac OS X. Here is a quick start to getting an STM32 toolchain built on Mac OS X with Mac Ports. You'll be able to com

Siri Meets Eliza |

Siri Meets Eliza. Since I got my iPhone 4S, I've been intrigued, fascinated and alarmed by Siri's fast-growing capabilities. I thoug