洪 民憙 (Hong Minhee) :nonbinary:'s avatar

洪 民憙 (Hong Minhee) :nonbinary:

@hongminhee@hollo.social

1,075 following1,886 followers

An intersectionalist, feminist, and socialist living in Seoul (UTC+09:00). @tokolovesme's spouse. Who's behind @fedify, @hollo, and @botkit. Write some free software in , , , & . They/them.

서울에 사는 交叉女性主義者이자 社會主義者. 金剛兔(@tokolovesme)의 配偶者. @fedify, @hollo, @botkit 메인테이너. , , , 等으로 自由 소프트웨어 만듦.

()

Pinned

@hongminhee@hollo.social

Hello! I'm Hong Minhee (洪 民憙), an open source software engineer in my late 30s, living in Seoul, Korea. I'm bisexual and non-binary (they/them), and an enthusiastic advocate of free/open source software and the fediverse.

I work full-time on @fedify, an ActivityPub server framework in TypeScript, funded by @sovtechfund. I'm also the creator of @hollo, a single-user ActivityPub microblog; @botkit, an ActivityPub bot framework; Hackers' Pub, a fediverse platform for software developers; and LogTape, a logging library for JavaScript and TypeScript.

I have a long interest in East Asian languages (CJK) and Unicode. I post mostly in English here, though occasionally in Japanese or in mixed-script Korean (國漢文混用體), a traditional writing style that interleaves Chinese characters with the native Korean alphabet. Wanting to write in that style was actually one of the reasons I joined the fediverse. Feel free to talk to me in English, Korean, Japanese, or even Literary Chinese!

en.wikipedia.org

Korean mixed script - Wikipedia

Pinned

はじめまして!ソウル在住の30代後半のオープンソースソフトウェアエンジニア、洪 民憙ホン・ミンヒと申します。バイセクシュアル(bisexual)・ノンバイナリー(non-binary)で、自由・オープンソースソフトウェア(F/OSS)とフェディバース(fediverse)の熱烈な支持者です。

STF(@sovtechfund)の支援を受け、TypeScript用ActivityPubサーバーフレームワーク「@fedify」の開発に専念しています。他にも、おひとり様向けのActivityPubマイクロブログ「@hollo」、ActivityPubボットフレームワーク「@botkit」、ソフトウェア開発者向けフェディバースプラットフォームHackers' Pub、JavaScript・TypeScript用ロギングライブラリLogTapeなどの制作者でもあります。

東アジア言語(いわゆるCJK)とUnicodeにも興味があります。このアカウントでは主に英語で投稿していますが、時々日本語や国漢文混用体(漢字ハングル混じり文)の韓国語でも書いています。実はこの文体で書きたくてフェディバースを始めた、という経緯もあります。日本語、英語、韓国語、漢文でも気軽に話しかけてください!

speakerdeck.com

国漢文混用体からHolloまで

本発表では、韓国語の「国漢文混用体」(漢字ハングル混じり文)を自分のフェディバース投稿に実装したいという小さな目標から始まった旅路を共有します。 この目標を達成するために、ActivityPubのJSON-LDの複雑さやHTTP Signatures、WebFingerなどの仕様を理解する必要性に…

Pinned

安寧(안녕)하세요! 저는 서울에 살고 있는 30() 後半(후반)의 오픈 소스 소프트웨어 엔지니어 洪民憙(홍민희)입니다. 兩性愛者(양성애자)(bisexual)이자 논바이너리(non-binary)이며, 自由(자유)·오픈 소스 소프트웨어(F/OSS)와 聯合宇宙(연합우주)(fediverse)의 熱烈(열렬)支持者(지지자)이기도 합니다.

STF(@sovtechfund)의 支援(지원)을 받아 TypeScript() ActivityPub 서버 프레임워크 @fedify 開發(개발)專業(전업)으로 ()하고 있습니다. 그 ()에도 싱글 유저() ActivityPub 마이크로블로그 @hollo, ActivityPub 봇 프레임워크 @botkit, 소프트웨어 開發者(개발자)를 위한 聯合宇宙(연합우주) 플랫폼 Hackers' Pub, JavaScript·TypeScript() 로깅 라이브러리 LogTape ()製作者(제작자)이기도 합니다.

()아시아 言語(언어)(이른바 CJK)와 Unicode에도 關心(관심)이 많습니다. 이 計定(계정)에서는 ()英語(영어)로 포스팅하지만, 때때로 日本語(일본어)國漢文混用體(국한문 혼용체) 韓國語(한국어)로도 씁니다. 聯合宇宙(연합우주)에 오게 된 動機(동기) () 하나가 바로 國漢文混用體(국한문 혼용체)로 글을 쓰고 싶었기 때문이기도 하고요. 韓國語(한국어), 英語(영어), 日本語(일본어), 아니면 漢文(한문)으로도 말을 걸어주세요!

logtape.org

LogTape

Unobtrusive logging library with zero dependencies—library-first design for Deno, Node.js, Bun, browsers, and edge functions

@rio@kawane.misskey.online

This is the CUTEST kawaii Ai-chan ((あい)"Ai" is a normal female Japanese name meaning "Indigo" both the color and the plant; "Ai"-chan, the mascot of Misskey, has nothing to do with Large Language Models) I have ever seen from a technical literature titled like "Practical Fedify: An Introduction to ActivityPub Microblog Development"! I even see other mascots in the Fediverse too, like Don the Mastodon and that Blue Dinosaur mascot of Fedify (I don't know its name).
Huge thanks to
@hongminhee@hollo.social https://hollo.social/@hongminhee for their work on authoring this amazing book and developing Fedify itself! And if you can read Japanese and are interested in Fedify and ActivityPub Development, then definitely check this one out! You can pre-order the book on Amazon Japan → https://amzn.asia/d/0hQSKBmI (The book will be printed on May 22)

Book cover "Practical Fedify" (実践Fedify) featuring anime-style girl, elephant, and blue creature. Subtitle: "Introduction to Microblog Development" (マイクロブログ開発入門). Technical guide covering decentralized social network mechanisms for microblog development.
ALT text

Book cover "Practical Fedify" (実践Fedify) featuring anime-style girl, elephant, and blue creature. Subtitle: "Introduction to Microblog Development" (マイクロブログ開発入門). Technical guide covering decentralized social network mechanisms for microblog development.

日本で世界初のFedifyの書籍「実践Fedify——ActivityPubマイクロブログ開発入門」が出版されました。この本は私にとって初めての著書でもありますが、最初の本が母語の韓国語ではなく日本語だというのは、なんだかとても不思議な気分ですね。本書は、英語で書かれたFedifyの公式チュートリアル「Creating your own federated microblog」をベースに、様々な加筆を行ったものです。Fedifyのマスコットの恐竜と、Misskeyのマスコットである三須木みすき あい、Mastodonのマスコットが一緒に描かれた可愛い表紙のイラストは、ゆめつきママさんが描いてくださいました。電子書籍と紙の書籍の両方で、来る22日にインプレス NextPublishingから出版される予定です。

インプレス NextPublishing刊、洪 民憙(ホン・ミンヒ)著「実践Fedify——ActivityPubマイクロブログ開発入門」の表紙。セーラー服を着たMisskeyの猫耳マスコット・藍ちゃんが、Fedifyの青い恐竜マスコットとMastodonの黄色い象マスコットの上でジャンプしながら指を差しており、周囲にはカラフルな星や幾何学模様が散りばめられている。
ALT text

インプレス NextPublishing刊、洪 民憙(ホン・ミンヒ)著「実践Fedify——ActivityPubマイクロブログ開発入門」の表紙。セーラー服を着たMisskeyの猫耳マスコット・藍ちゃんが、Fedifyの青い恐竜マスコットとMastodonの黄色い象マスコットの上でジャンプしながら指を差しており、周囲にはカラフルな星や幾何学模様が散りばめられている。

@hongminhee@hollo.social

The world's first Fedify book, Practical Fedify: Introduction to ActivityPub Microblog Development (実践Fedify——ActivityPubマイクロブログ開発入門), has been published in Japan. This is also the first book I have ever published, and it feels quite surreal that my first book is in Japanese rather than my native language, Korean. This book is an expanded version based on the official English Fedify tutorial, Creating your own federated microblog, with various additions. Yumetsuki Mama (ゆめつきママ) worked on the cute book cover illustration, which features the Fedify dinosaur mascot, Misskey's mascot Ai-chan, and the Mastodon mascot together. It is scheduled to be published in both e-book and print formats on the 22nd by Impress NextPublishing. See also the Amazon Japan.

Cover of Practical Fedify: Introduction to ActivityPub Microblog Development (実践Fedify——ActivityPubマイクロブログ開発入門) by Hong Minhee (洪 民憙), published by Impress NextPublishing. Ai-chan, Misskey's cat-eared mascot in a sailor uniform, jumps and points upward above Fedify's blue dinosaur mascot and Mastodon's small golden mascot, with colorful stars and geometric shapes scattered around.
ALT text

Cover of Practical Fedify: Introduction to ActivityPub Microblog Development (実践Fedify——ActivityPubマイクロブログ開発入門) by Hong Minhee (洪 民憙), published by Impress NextPublishing. Ai-chan, Misskey's cat-eared mascot in a sailor uniform, jumps and points upward above Fedify's blue dinosaur mascot and Mastodon's small golden mascot, with colorful stars and geometric shapes scattered around.

@noellabo@fedibird.com

お、洪民憙さんの本でてるじゃん。

みんなActivityPubの自力実装で挫折するぐらいなら、この本を買ってFedify組み込んで開発するといいよ。

実践Fedify ActivityPubマイクロブログ開発入門
nextpublishing.jp/book/19496.h

nextpublishing.jp

実践Fedify ActivityPubマイクロブログ開発入門 | インプレス NextPublishing

本書は、JavaScript/TypeScriptの基礎知識を有する読者を対象に、分散型ソーシャルネットワークであるフェディバースを支えるActivi...

@prtimes@rss-mstdn.studiofreesia.com
@makanomoyaki@qdon.space

실천 Fedify

- 일단 대표로 아이 쨩(미스키 마스코트)가 대문짝만한게 그려져있음 (귀여워)
- 마스토돈도 뒤에 그려져있음
- 한국이 아니라 일본임
- 저자 이름이 가타카나로 홍민희가 아니라 한자 그대로 써있음

hackers.pub/@hongminhee/019e3e

hackers.pub

일본에서 제가 쓴 Fedify 책 〈실천 Fedify: ActivityPub 마이크로블로그 개발 입문〉(実践Fedify——ActivityPubマイクロブログ開発入門)이 나왔어요! 정식 출판된 책은 처음 써보는데, 그게 한국어가 아니라 일본어라는 게 뭔가 신기하네요…! 출판사 페이지: https://nextpublishing.jp/book/19496.htmlAmazon Japan: https://amzn.asia/d/0hA3KTeQ

일본에서 제가 쓴 Fedify 책 〈실천 Fedify: ActivityPub 마이크로블로그 개발 입문〉(実践Fedify——ActivityPubマイクロブログ開発入門)이 나왔어요! 정식 출판된 책은 처음 써보는데, 그게 한국어가 아니라 일본어라는 게 뭔가 신기하네요…! 출판사 페이지: https://nextpublishing.jp/book/19496.htmlAmazon Japan: https://amzn.asia/d/0hA3KTeQ

@hongminhee@hackers.pub

일본에서 제가 쓴 Fedify 책 〈실천 Fedify: ActivityPub 마이크로블로그 개발 입문〉(実践Fedify——ActivityPubマイクロブログ開発入門)이 나왔어요! 정식 출판된 책은 처음 써보는데, 그게 한국어가 아니라 일본어라는 게 뭔가 신기하네요…!

출판사 페이지: https://nextpublishing.jp/book/19496.html Amazon Japan: https://amzn.asia/d/0hA3KTeQ



RE: https://fedibird.com/@noellabo/116599256677289467

〈실천 Fedify: ActivityPub 마이크로블로그 개발 입문〉(実践Fedify——ActivityPubマイクロブログ開発入門)이라는 일본어 기술 서적 표지입니다. 고양이 귀를 한 소녀가 캐릭터들과 함께 활기차게 달리는 모습이 그려져 있으며, 파스텔 톤의 별과 도형들이 배경에 장식되어 있습니다. 하단에는 분산형 소셜 네트워크의 구조를 이해하라는 문구가 적혀 있습니다.
ALT text

〈실천 Fedify: ActivityPub 마이크로블로그 개발 입문〉(実践Fedify——ActivityPubマイクロブログ開発入門)이라는 일본어 기술 서적 표지입니다. 고양이 귀를 한 소녀가 캐릭터들과 함께 활기차게 달리는 모습이 그려져 있으며, 파스텔 톤의 별과 도형들이 배경에 장식되어 있습니다. 하단에는 분산형 소셜 네트워크의 구조를 이해하라는 문구가 적혀 있습니다.

@hongminhee@hackers.pub

일본에서 제가 쓴 Fedify 책 〈실천 Fedify: ActivityPub 마이크로블로그 개발 입문〉(実践Fedify——ActivityPubマイクロブログ開発入門)이 나왔어요! 정식 출판된 책은 처음 써보는데, 그게 한국어가 아니라 일본어라는 게 뭔가 신기하네요…!

출판사 페이지: https://nextpublishing.jp/book/19496.html Amazon Japan: https://amzn.asia/d/0hA3KTeQ



RE: https://fedibird.com/@noellabo/116599256677289467

〈실천 Fedify: ActivityPub 마이크로블로그 개발 입문〉(実践Fedify——ActivityPubマイクロブログ開発入門)이라는 일본어 기술 서적 표지입니다. 고양이 귀를 한 소녀가 캐릭터들과 함께 활기차게 달리는 모습이 그려져 있으며, 파스텔 톤의 별과 도형들이 배경에 장식되어 있습니다. 하단에는 분산형 소셜 네트워크의 구조를 이해하라는 문구가 적혀 있습니다.
ALT text

〈실천 Fedify: ActivityPub 마이크로블로그 개발 입문〉(実践Fedify——ActivityPubマイクロブログ開発入門)이라는 일본어 기술 서적 표지입니다. 고양이 귀를 한 소녀가 캐릭터들과 함께 활기차게 달리는 모습이 그려져 있으며, 파스텔 톤의 별과 도형들이 배경에 장식되어 있습니다. 하단에는 분산형 소셜 네트워크의 구조를 이해하라는 문구가 적혀 있습니다.

This quote was not authorized by the quoted post's author.

Hollo 0.7.16および0.8.5のセキュリティパッチをリリースしました。かなり多くの脆弱性を一度に修正するパッチです。早急にアップデートしてください。

@hollo@hollo.social

Hollo security updates: 0.7.16 and 0.8.5

If you run Hollo, update to a patched release now. Hollo 0.7.16 and 0.8.5 fix several security issues in ActivityPub federation, the web admin UI, OAuth, and the transitive fast-xml-parser dependency.

On the federation side, three inbox handlers were missing authorization checks. Any remote actor could send a Delete to remove any cached post by IRI, an Update to overwrite or first-materialize a cached post under another actor's name, or a cross-origin Announce whose attacker-controlled embedded body materialized as someone else's post. The checks now differ by activity type. A Delete is ignored unless the deleter's origin matches the cached post author's origin. An Update is ignored unless the activity actor, the embedded object's id, and its attributedTo all share an origin. For Announce, Hollo no longer trusts attacker-supplied embedded content to create or overwrite the original post: unknown cross-origin objects are fetched from their canonical URL, and any newly cached object must have matching id and attributedTo origins. Separately, Follow, Like, EmojiReact, and Announce from a blocked actor were processed normally and still produced notifications; they are now silently dropped at the inbox.

On the web admin side, login and OTP cookies were set without HttpOnly, SameSite, or Secure, and state-changing forms had no Origin or Sec-Fetch-Site check. A single reflected XSS could exfiltrate the admin session, and a malicious page could submit a hidden cross-site form to disable 2FA, delete an account, or silently authorize a rogue OAuth application. The affected dashboard routes and POST /oauth/authorize now run Hono's CSRF middleware, and the login and OTP cookies now carry those attributes.

The transitive fast-xml-parser (carried in via the AWS SDK that backs S3 storage) is now pinned to patched versions, closing one critical and several high-severity advisories. Hollo also now uses constant-time comparison for the OAuth PKCE check and the multi-credential client-secret consistency check, and it warns at startup when LOG_QUERY=true is set, because drizzle-orm logs bound parameter values, including OAuth tokens and other secrets.

All Hollo versions up to and including 0.7.15 and 0.8.4 are affected. Patched releases are 0.7.16 for the 0.7.x series and 0.8.5 for the 0.8.x series. CHANGES.md has the longer notes, including the availability trade-off for cross-origin Announce validation when the canonical origin is unreachable.

For 0.7.x deployments, update to 0.7.16:

docker pull ghcr.io/fedify-dev/hollo:0.7.16

For 0.8.x deployments, update to 0.8.5:

docker pull ghcr.io/fedify-dev/hollo:0.8.5

After pulling the new image, restart your Hollo container. If you deploy from source, pull the corresponding release tag and restart.

If anything is unclear, ask below.

Release Hollo 0.8.5 · fedify-dev/hollo

Released on May 19, 2026. Fixed a security vulnerability where any federated actor could send a Delete activity to remove cached remote posts authored by any other actor, because the inbox handle...

Hollo 0.7.16 및 0.8.5 保安(보안) 패치를 릴리스했습니다. 相當(상당)히 많은 保安(보안) 脆弱點(취약점)을 한 ()에 고치는 패치입니다. 早速(조속)히 업데이트 하시기 바랍니다.

@hollo@hollo.social

Hollo security updates: 0.7.16 and 0.8.5

If you run Hollo, update to a patched release now. Hollo 0.7.16 and 0.8.5 fix several security issues in ActivityPub federation, the web admin UI, OAuth, and the transitive fast-xml-parser dependency.

On the federation side, three inbox handlers were missing authorization checks. Any remote actor could send a Delete to remove any cached post by IRI, an Update to overwrite or first-materialize a cached post under another actor's name, or a cross-origin Announce whose attacker-controlled embedded body materialized as someone else's post. The checks now differ by activity type. A Delete is ignored unless the deleter's origin matches the cached post author's origin. An Update is ignored unless the activity actor, the embedded object's id, and its attributedTo all share an origin. For Announce, Hollo no longer trusts attacker-supplied embedded content to create or overwrite the original post: unknown cross-origin objects are fetched from their canonical URL, and any newly cached object must have matching id and attributedTo origins. Separately, Follow, Like, EmojiReact, and Announce from a blocked actor were processed normally and still produced notifications; they are now silently dropped at the inbox.

On the web admin side, login and OTP cookies were set without HttpOnly, SameSite, or Secure, and state-changing forms had no Origin or Sec-Fetch-Site check. A single reflected XSS could exfiltrate the admin session, and a malicious page could submit a hidden cross-site form to disable 2FA, delete an account, or silently authorize a rogue OAuth application. The affected dashboard routes and POST /oauth/authorize now run Hono's CSRF middleware, and the login and OTP cookies now carry those attributes.

The transitive fast-xml-parser (carried in via the AWS SDK that backs S3 storage) is now pinned to patched versions, closing one critical and several high-severity advisories. Hollo also now uses constant-time comparison for the OAuth PKCE check and the multi-credential client-secret consistency check, and it warns at startup when LOG_QUERY=true is set, because drizzle-orm logs bound parameter values, including OAuth tokens and other secrets.

All Hollo versions up to and including 0.7.15 and 0.8.4 are affected. Patched releases are 0.7.16 for the 0.7.x series and 0.8.5 for the 0.8.x series. CHANGES.md has the longer notes, including the availability trade-off for cross-origin Announce validation when the canonical origin is unreachable.

For 0.7.x deployments, update to 0.7.16:

docker pull ghcr.io/fedify-dev/hollo:0.7.16

For 0.8.x deployments, update to 0.8.5:

docker pull ghcr.io/fedify-dev/hollo:0.8.5

After pulling the new image, restart your Hollo container. If you deploy from source, pull the corresponding release tag and restart.

If anything is unclear, ask below.

Release Hollo 0.8.5 · fedify-dev/hollo

Released on May 19, 2026. Fixed a security vulnerability where any federated actor could send a Delete activity to remove cached remote posts authored by any other actor, because the inbox handle...

@hongminhee@hollo.social

We have released security patches for Hollo 0.7.16 and 0.8.5. This update addresses a significant number of security vulnerabilities at once. Please update your software as soon as possible.

@hollo@hollo.social

Hollo security updates: 0.7.16 and 0.8.5

If you run Hollo, update to a patched release now. Hollo 0.7.16 and 0.8.5 fix several security issues in ActivityPub federation, the web admin UI, OAuth, and the transitive fast-xml-parser dependency.

On the federation side, three inbox handlers were missing authorization checks. Any remote actor could send a Delete to remove any cached post by IRI, an Update to overwrite or first-materialize a cached post under another actor's name, or a cross-origin Announce whose attacker-controlled embedded body materialized as someone else's post. The checks now differ by activity type. A Delete is ignored unless the deleter's origin matches the cached post author's origin. An Update is ignored unless the activity actor, the embedded object's id, and its attributedTo all share an origin. For Announce, Hollo no longer trusts attacker-supplied embedded content to create or overwrite the original post: unknown cross-origin objects are fetched from their canonical URL, and any newly cached object must have matching id and attributedTo origins. Separately, Follow, Like, EmojiReact, and Announce from a blocked actor were processed normally and still produced notifications; they are now silently dropped at the inbox.

On the web admin side, login and OTP cookies were set without HttpOnly, SameSite, or Secure, and state-changing forms had no Origin or Sec-Fetch-Site check. A single reflected XSS could exfiltrate the admin session, and a malicious page could submit a hidden cross-site form to disable 2FA, delete an account, or silently authorize a rogue OAuth application. The affected dashboard routes and POST /oauth/authorize now run Hono's CSRF middleware, and the login and OTP cookies now carry those attributes.

The transitive fast-xml-parser (carried in via the AWS SDK that backs S3 storage) is now pinned to patched versions, closing one critical and several high-severity advisories. Hollo also now uses constant-time comparison for the OAuth PKCE check and the multi-credential client-secret consistency check, and it warns at startup when LOG_QUERY=true is set, because drizzle-orm logs bound parameter values, including OAuth tokens and other secrets.

All Hollo versions up to and including 0.7.15 and 0.8.4 are affected. Patched releases are 0.7.16 for the 0.7.x series and 0.8.5 for the 0.8.x series. CHANGES.md has the longer notes, including the availability trade-off for cross-origin Announce validation when the canonical origin is unreachable.

For 0.7.x deployments, update to 0.7.16:

docker pull ghcr.io/fedify-dev/hollo:0.7.16

For 0.8.x deployments, update to 0.8.5:

docker pull ghcr.io/fedify-dev/hollo:0.8.5

After pulling the new image, restart your Hollo container. If you deploy from source, pull the corresponding release tag and restart.

If anything is unclear, ask below.

Release Hollo 0.8.5 · fedify-dev/hollo

Released on May 19, 2026. Fixed a security vulnerability where any federated actor could send a Delete activity to remove cached remote posts authored by any other actor, because the inbox handle...

@hollo@hollo.social

Hollo security updates: 0.7.16 and 0.8.5

If you run Hollo, update to a patched release now. Hollo 0.7.16 and 0.8.5 fix several security issues in ActivityPub federation, the web admin UI, OAuth, and the transitive fast-xml-parser dependency.

On the federation side, three inbox handlers were missing authorization checks. Any remote actor could send a Delete to remove any cached post by IRI, an Update to overwrite or first-materialize a cached post under another actor's name, or a cross-origin Announce whose attacker-controlled embedded body materialized as someone else's post. The checks now differ by activity type. A Delete is ignored unless the deleter's origin matches the cached post author's origin. An Update is ignored unless the activity actor, the embedded object's id, and its attributedTo all share an origin. For Announce, Hollo no longer trusts attacker-supplied embedded content to create or overwrite the original post: unknown cross-origin objects are fetched from their canonical URL, and any newly cached object must have matching id and attributedTo origins. Separately, Follow, Like, EmojiReact, and Announce from a blocked actor were processed normally and still produced notifications; they are now silently dropped at the inbox.

On the web admin side, login and OTP cookies were set without HttpOnly, SameSite, or Secure, and state-changing forms had no Origin or Sec-Fetch-Site check. A single reflected XSS could exfiltrate the admin session, and a malicious page could submit a hidden cross-site form to disable 2FA, delete an account, or silently authorize a rogue OAuth application. The affected dashboard routes and POST /oauth/authorize now run Hono's CSRF middleware, and the login and OTP cookies now carry those attributes.

The transitive fast-xml-parser (carried in via the AWS SDK that backs S3 storage) is now pinned to patched versions, closing one critical and several high-severity advisories. Hollo also now uses constant-time comparison for the OAuth PKCE check and the multi-credential client-secret consistency check, and it warns at startup when LOG_QUERY=true is set, because drizzle-orm logs bound parameter values, including OAuth tokens and other secrets.

All Hollo versions up to and including 0.7.15 and 0.8.4 are affected. Patched releases are 0.7.16 for the 0.7.x series and 0.8.5 for the 0.8.x series. CHANGES.md has the longer notes, including the availability trade-off for cross-origin Announce validation when the canonical origin is unreachable.

For 0.7.x deployments, update to 0.7.16:

docker pull ghcr.io/fedify-dev/hollo:0.7.16

For 0.8.x deployments, update to 0.8.5:

docker pull ghcr.io/fedify-dev/hollo:0.8.5

After pulling the new image, restart your Hollo container. If you deploy from source, pull the corresponding release tag and restart.

If anything is unclear, ask below.

Release Hollo 0.8.5 · fedify-dev/hollo

Released on May 19, 2026. Fixed a security vulnerability where any federated actor could send a Delete activity to remove cached remote posts authored by any other actor, because the inbox handle...

@matt@toot.cafe

I just read about a blind person vibe-coding a new email client for Windows. Not linking because I don't want people to pile onto this person, who is a veteran of the software industry and a respected, persistent accessibility advocate and contributor to assistive technology. Instead, I want to point out how badly the commercial software industry, particularly Microsoft in this case, has failed us such that an individual feels the need to do this. Don't know what to do instead though.

@siliconsjang@siliconbeest.sjang.dev

Again, this service is to develop and test siliconbeest.
Soon, maybe in few days or something, I am going to make a MAIN siliconbeest service with new domain, (and yes, keep this service up and running) so you can use this service but also keep on eye on the new domain!

@hongminhee@hollo.social

FEP-044f consent-respecting quote posts, so-called Mastodon-style quotes, has been implemented on Hackers' Pub. Now, when writing a post, you can choose who is allowed to quote it. Even if it has already been quoted, you can retroactively revoke it if it's an unwanted quote. Revoking a quote will remove your post from the post that quoted it.

The implementation of FEP-044f is also the first step toward implementing GoToSocial-style interaction controls. Interaction controls are literally a specification that lets you control all interactions on your posts, such as shares and comments, and FEP-044f is defined as an extension of this specification. Therefore, it's safe to say that the groundwork for interaction controls has been somewhat laid.

Of course, since there were many security-related aspects to consider while implementing FEP-044f, implementing the interaction control feature probably won't be very easy, but I still think it's a challenge worth taking on.

docs.gotosocial.org

Interaction Controls - GoToSocial Documentation

None

@hongminhee@hackers.pub

Hackers' Pub에 FEP-044f 인용 승낙 기능, 이른바 Mastodon 스타일 인용 기능이 구현되었습니다. 이제 콘텐츠를 작성할 때 누가 그 콘텐츠를 인용하도록 허용할 지 정할 수 있습니다. 이미 인용된 경우에도, 원하지 않는 인용의 경우 사후에 그 인용을 취소(revoke)할 수도 있습니다. 인용을 취소하면 해당 단문에서 인용되었던 자신의 콘텐츠가 빠지게 됩니다.

FEP-044f 규격 구현은 GoToSocial 스타일 상호작용 제어 구현의 첫걸음이기도 합니다. 상호작용 제어란 말 그대로 공유나 댓글과 같은 자신의 콘텐츠에 대한 상호작용 전반을 통제할 수 있는 규격으로, FEP-044f 규격이 해당 규격의 한 확장으로 정의된 것입니다. 따라서 상호작용 제어를 위한 기반은 어느 정도 마련되었다고 볼 수 있습니다.

물론, FEP-044f를 구현하면서도 보안과 관련해 신경 쓸 부분이 많았기에, 상호작용 제어 기능을 구현하는 게 아주 쉽지는 않을 것 같긴 합니다만, 그럼에도 도전할 가치가 있다고 생각합니다.

아, 그리고 인용 승낙 기능은 새 프런트엔드(web-next)에서만 사용 가능합니다. 레거시 프런트엔드에서 작성한 단문이나 게시글은 모두 디폴트 인용 권한(공개 및 조용히 공개 → 누구나 인용 가능, 팔로워만 및 언급된 사용자만 → 나만 인용 가능)을 따르게 됩니다.

콘텐츠의 공개 범위와 인용 권한을 설정하는 드롭다운 메뉴입니다. 공개 범위 항목에는 공개, 조용히 공개, 팔로워만, 언급된 사용자만 설정이 있고, 인용 권한 항목에는 누구나 인용 가능, 팔로워만 인용 가능, 나만 인용 가능 설정이 나열되어 있습니다.
ALT text

콘텐츠의 공개 범위와 인용 권한을 설정하는 드롭다운 메뉴입니다. 공개 범위 항목에는 공개, 조용히 공개, 팔로워만, 언급된 사용자만 설정이 있고, 인용 권한 항목에는 누구나 인용 가능, 팔로워만 인용 가능, 나만 인용 가능 설정이 나열되어 있습니다.

왼쪽에 금지 표시 아이콘이 있고 오른쪽에 인용 취소라는 텍스트가 적힌 직사각형 모양의 버튼입니다.
ALT text

왼쪽에 금지 표시 아이콘이 있고 오른쪽에 인용 취소라는 텍스트가 적힌 직사각형 모양의 버튼입니다.

@hongminhee@hollo.social

FEP-044f consent-respecting quote posts, so-called Mastodon-style quotes, has been implemented on Hackers' Pub. Now, when writing a post, you can choose who is allowed to quote it. Even if it has already been quoted, you can retroactively revoke it if it's an unwanted quote. Revoking a quote will remove your post from the post that quoted it.

The implementation of FEP-044f is also the first step toward implementing GoToSocial-style interaction controls. Interaction controls are literally a specification that lets you control all interactions on your posts, such as shares and comments, and FEP-044f is defined as an extension of this specification. Therefore, it's safe to say that the groundwork for interaction controls has been somewhat laid.

Of course, since there were many security-related aspects to consider while implementing FEP-044f, implementing the interaction control feature probably won't be very easy, but I still think it's a challenge worth taking on.

docs.gotosocial.org

Interaction Controls - GoToSocial Documentation

None

@hongminhee@hackers.pub

Hackers' Pub에 FEP-044f 인용 승낙 기능, 이른바 Mastodon 스타일 인용 기능이 구현되었습니다. 이제 콘텐츠를 작성할 때 누가 그 콘텐츠를 인용하도록 허용할 지 정할 수 있습니다. 이미 인용된 경우에도, 원하지 않는 인용의 경우 사후에 그 인용을 취소(revoke)할 수도 있습니다. 인용을 취소하면 해당 단문에서 인용되었던 자신의 콘텐츠가 빠지게 됩니다.

FEP-044f 규격 구현은 GoToSocial 스타일 상호작용 제어 구현의 첫걸음이기도 합니다. 상호작용 제어란 말 그대로 공유나 댓글과 같은 자신의 콘텐츠에 대한 상호작용 전반을 통제할 수 있는 규격으로, FEP-044f 규격이 해당 규격의 한 확장으로 정의된 것입니다. 따라서 상호작용 제어를 위한 기반은 어느 정도 마련되었다고 볼 수 있습니다.

물론, FEP-044f를 구현하면서도 보안과 관련해 신경 쓸 부분이 많았기에, 상호작용 제어 기능을 구현하는 게 아주 쉽지는 않을 것 같긴 합니다만, 그럼에도 도전할 가치가 있다고 생각합니다.

아, 그리고 인용 승낙 기능은 새 프런트엔드(web-next)에서만 사용 가능합니다. 레거시 프런트엔드에서 작성한 단문이나 게시글은 모두 디폴트 인용 권한(공개 및 조용히 공개 → 누구나 인용 가능, 팔로워만 및 언급된 사용자만 → 나만 인용 가능)을 따르게 됩니다.

콘텐츠의 공개 범위와 인용 권한을 설정하는 드롭다운 메뉴입니다. 공개 범위 항목에는 공개, 조용히 공개, 팔로워만, 언급된 사용자만 설정이 있고, 인용 권한 항목에는 누구나 인용 가능, 팔로워만 인용 가능, 나만 인용 가능 설정이 나열되어 있습니다.
ALT text

콘텐츠의 공개 범위와 인용 권한을 설정하는 드롭다운 메뉴입니다. 공개 범위 항목에는 공개, 조용히 공개, 팔로워만, 언급된 사용자만 설정이 있고, 인용 권한 항목에는 누구나 인용 가능, 팔로워만 인용 가능, 나만 인용 가능 설정이 나열되어 있습니다.

왼쪽에 금지 표시 아이콘이 있고 오른쪽에 인용 취소라는 텍스트가 적힌 직사각형 모양의 버튼입니다.
ALT text

왼쪽에 금지 표시 아이콘이 있고 오른쪽에 인용 취소라는 텍스트가 적힌 직사각형 모양의 버튼입니다.

@hongminhee@hackers.pub

Hackers' Pub에 FEP-044f 인용 승낙 기능, 이른바 Mastodon 스타일 인용 기능이 구현되었습니다. 이제 콘텐츠를 작성할 때 누가 그 콘텐츠를 인용하도록 허용할 지 정할 수 있습니다. 이미 인용된 경우에도, 원하지 않는 인용의 경우 사후에 그 인용을 취소(revoke)할 수도 있습니다. 인용을 취소하면 해당 단문에서 인용되었던 자신의 콘텐츠가 빠지게 됩니다.

FEP-044f 규격 구현은 GoToSocial 스타일 상호작용 제어 구현의 첫걸음이기도 합니다. 상호작용 제어란 말 그대로 공유나 댓글과 같은 자신의 콘텐츠에 대한 상호작용 전반을 통제할 수 있는 규격으로, FEP-044f 규격이 해당 규격의 한 확장으로 정의된 것입니다. 따라서 상호작용 제어를 위한 기반은 어느 정도 마련되었다고 볼 수 있습니다.

물론, FEP-044f를 구현하면서도 보안과 관련해 신경 쓸 부분이 많았기에, 상호작용 제어 기능을 구현하는 게 아주 쉽지는 않을 것 같긴 합니다만, 그럼에도 도전할 가치가 있다고 생각합니다.

아, 그리고 인용 승낙 기능은 새 프런트엔드(web-next)에서만 사용 가능합니다. 레거시 프런트엔드에서 작성한 단문이나 게시글은 모두 디폴트 인용 권한(공개 및 조용히 공개 → 누구나 인용 가능, 팔로워만 및 언급된 사용자만 → 나만 인용 가능)을 따르게 됩니다.

콘텐츠의 공개 범위와 인용 권한을 설정하는 드롭다운 메뉴입니다. 공개 범위 항목에는 공개, 조용히 공개, 팔로워만, 언급된 사용자만 설정이 있고, 인용 권한 항목에는 누구나 인용 가능, 팔로워만 인용 가능, 나만 인용 가능 설정이 나열되어 있습니다.
ALT text

콘텐츠의 공개 범위와 인용 권한을 설정하는 드롭다운 메뉴입니다. 공개 범위 항목에는 공개, 조용히 공개, 팔로워만, 언급된 사용자만 설정이 있고, 인용 권한 항목에는 누구나 인용 가능, 팔로워만 인용 가능, 나만 인용 가능 설정이 나열되어 있습니다.

왼쪽에 금지 표시 아이콘이 있고 오른쪽에 인용 취소라는 텍스트가 적힌 직사각형 모양의 버튼입니다.
ALT text

왼쪽에 금지 표시 아이콘이 있고 오른쪽에 인용 취소라는 텍스트가 적힌 직사각형 모양의 버튼입니다.

@hongminhee@hollo.social

Released LogTape 2.1.0. The headline feature is a throttling filter—when the same log message fires thousands of times a second during an outage, it suppresses the flood and optionally emits a summary. Also new: logfmt formatter, timezone-aware timestamps, and HMAC pseudonymization for privacy-preserving log correlation.

https://github.com/dahlia/logtape/discussions/165

github.com

LogTape 2.1.0: Throttling, logfmt, and smarter redaction · dahlia/logtape · Discussion #165

LogTape is a logging library for JavaScript and TypeScript that works across Deno, Node.js, Bun, and browsers. It's built around structured logging, has zero dependencies, and is designed to work a...

@hongminhee@hollo.social

BunのZig → Rustへの移植がそこそこ動いているという話を聞いて、それならMisskeyのフェデレーション部分をFedifyに差し替えるのもやってみる価値があるかなと思った。