RT @[email protected]: Ever wonder what happens when you yank the pull cord on an aircraft emergency slide?
Wonder no more.
To others who follow me and who think my hatred of UEFI is unjustified, . . .
To reiterate, I personally refuse to run UEFI on my Kestrel computers, and I refuse to trust ANY computer with UEFI baked into firmware, now and forever more.
Any computer equipped with UEFI is to be considered no more than a mere appliance, a convenient means to an end at best. This includes all Linux and BSD machines as well. They are not to be trusted otherwise.
JP Barlow was the kind of cat who convinced me that I didn't need to be stuck in any pigeonholes that were not of my own devising.
He told me through his words and works that I could be a weirdo without concern for those who didn't understand me.
He gave that gift to me and to multitudes and for that he will always be a major voice ringing in my soul.
Roll on merrily, old man, and thanks for the trip.
@akkartik To a large extent, this is what motivates the Kestrel -- if I can't hack on my PC with off-the-shelf resources (either in a book somewhere or online), especially without fear of bricking my hardware, then I have no choice but to roll my own.
Today's PCs are appliances. Thanks Intel, thanks Microsoft.
More good news from Intel
“In practice, it can give an attacker complete control over an individual’s work laptop, despite even the most extensive security measures.”
“The essence of the security issue is that setting a BIOS password, which normally prevents an unauthorized user from booting up the device or making low-level changes to it, does not prevent unauthorized access to the AMT BIOS extension.“
Convenience is starting to look like a bad idea
acoustic side channel attacks
Most of the acoustic cryptanalysis attacks https://en.wikipedia.org/wiki/Acoustic_cryptanalysis I've seen involve having a microphone nearby someone's computer. Some of them are severe, and even can read encryption keys off the CPU: https://www.pcworld.com/article/2082200/listen-up-rsa-keys-snatched-by-recording-cpu-sounds-with-a-phone.html
But lots of programs can get access to the microphone relatively easily. It should be easy as a process using a computer's own microphone to do these attacks too, right?
I trained a neural network on the list of thesis titles from MIT. Need a research topic? http://aiweirdness.com/post/169581821297/thesis-titles-generated-by-neural-network
Speaking of memory protection, I rather like the base-and-bounds model of protected regions - a whole lot simpler than an MMU!
As we know, Amiga worked pretty well without any relocation or protection, and the core of it was built on Tripos. As simple as possible, and no simpler...
Heck The Planet
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!