Brutkey

Matthew Garrett
@mjg59@nondeterministic.computer

Former biologist. Actual PhD in genetics. Security at Nvidia, OS security teaching at https://www.ischool.berkeley.edu. Blog: https://mjg59.dreamwidth.org. He/him.


Notes
5263
Following
0
Followers
0
Blog
https://mjg59.dreamwidth.org/
Signal
@mjg.59

Matthew Garrett
@mjg59@nondeterministic.computer

It doesn't matter whether C is good or not. It matters that if I write code in two languages that aren't C, and I want it to all be part of the same process, I need to care about C. C pervades all. You cannot escape it. C will outlive all of us. The language will die and the ABI will persist. The far future will involve students learning about C just to explain their present day. Our robot overlords will use null terminated strings. C will outlive fungi.

Matthew Garrett
@mjg59@nondeterministic.computer

https://faultlore.com/blah/c-isnt-a-language/ deserves a fucking record for managing to trigger people into being extremely upset while also demonstrating that they don't understand the actual point being made

Matthew Garrett
@mjg59@nondeterministic.computer

It is actually kind of wild that we're simultaneously in an era of people complaining that Wayland is destroying choice and also maybe the greatest number of high-quality desktop environments aimed at different use cases the free software world has ever had

Matthew Garrett
@mjg59@nondeterministic.computer

iRobot apparently just declared bankruptcy, so if you have an internet connected one and want to retain control if the cloud platform vanishes, take a look at https://github.com/koalazak/dorita980#how-to-get-your-usernameblid-and-password and stash that information somewhere safe (and note that it changes if you ever factory reset the device, so try not to do that)

Matthew Garrett
@mjg59@nondeterministic.computer

For Reasons that I cannot discuss I had the opportunity some years ago to review the security of some source code that was used in both an internet access device and also a crewed spacecraft and discovered a (minor) flaw that based on the memory layout of the device located on Earth was unexploitable but could have been exploited if you had the ability to rewrite flash on a device in orbit and well that feels like a conversation about whether Bond movies are realistic threat models

Matthew Garrett
@mjg59@nondeterministic.computer

True love is fixing your spouse's email server

Matthew Garrett
@mjg59@nondeterministic.computer

Is there a diagram anywhere of exactly where the DMA cycles occur during horizontal scanout?

Matthew Garrett
@mjg59@nondeterministic.computer

I suddenly need to care about Amiga DMA cycle timings and this isn't an improvement in my quality of life

Matthew Garrett
@mjg59@nondeterministic.computer

This whole Battlefield 6 thing is going to generate a fascinating market for firmware that lets you just configure whatever you want as measurement values

Matthew Garrett
@mjg59@nondeterministic.computer

Two weird LTE auth questions that I'm sure someone here knows:

1) My understanding is that the mutual auth means relying on a SIM private key. But can't phones without SIMs get onto networks for emergency calls? Or can that be done without full authentication?

2) Is there anything at the protocol level stopping multiple identical SIMs joining the same network (private, unfederated) network? Multiple devices with different IMEIs but the same IMSI and cryptographic material