To others who follow me and who think my hatred of UEFI is unjustified, . . .
To reiterate, I personally refuse to run UEFI on my Kestrel computers, and I refuse to trust ANY computer with UEFI baked into firmware, now and forever more.
Any computer equipped with UEFI is to be considered no more than a mere appliance, a convenient means to an end at best. This includes all Linux and BSD machines as well. They are not to be trusted otherwise.
JP Barlow was the kind of cat who convinced me that I didn't need to be stuck in any pigeonholes that were not of my own devising.
He told me through his words and works that I could be a weirdo without concern for those who didn't understand me.
He gave that gift to me and to multitudes and for that he will always be a major voice ringing in my soul.
Roll on merrily, old man, and thanks for the trip.
@akkartik To a large extent, this is what motivates the Kestrel -- if I can't hack on my PC with off-the-shelf resources (either in a book somewhere or online), especially without fear of bricking my hardware, then I have no choice but to roll my own.
Today's PCs are appliances. Thanks Intel, thanks Microsoft.
More good news from Intel
“In practice, it can give an attacker complete control over an individual’s work laptop, despite even the most extensive security measures.”
“The essence of the security issue is that setting a BIOS password, which normally prevents an unauthorized user from booting up the device or making low-level changes to it, does not prevent unauthorized access to the AMT BIOS extension.“
Convenience is starting to look like a bad idea
acoustic side channel attacks Show more
Most of the acoustic cryptanalysis attacks https://en.wikipedia.org/wiki/Acoustic_cryptanalysis I've seen involve having a microphone nearby someone's computer. Some of them are severe, and even can read encryption keys off the CPU: https://www.pcworld.com/article/2082200/listen-up-rsa-keys-snatched-by-recording-cpu-sounds-with-a-phone.html
But lots of programs can get access to the microphone relatively easily. It should be easy as a process using a computer's own microphone to do these attacks too, right?
I trained a neural network on the list of thesis titles from MIT. Need a research topic? http://aiweirdness.com/post/169581821297/thesis-titles-generated-by-neural-network
Speaking of memory protection, I rather like the base-and-bounds model of protected regions - a whole lot simpler than an MMU!
As we know, Amiga worked pretty well without any relocation or protection, and the core of it was built on Tripos. As simple as possible, and no simpler...
Heck The Planet
Fast, secure and up-to-date instance, welcoming everyone around the world. Join us! 🌍
Up since 04/04/2017. ✅
Why should you sign up on mstdn.io?
This instance is not focused on any theme or subject, feel free to talk about whatever you want. Although the main language is english, we accept every single language and country.
We're connected to the whole ActivityPub fediverse and we do not block any foreign instance nor user.
We do have rules, but the goal is to have responsible users.
The instance uses a powerful server to ensure speed and stability, and it has good uptime. We follow state-of-the-art security practices.
Also, we have over 300 custom emojis to unleash your meming potential!
Looking for a Kpop themed instance? Try kpop.social