Author Archives: pappp

SSH protects the world’s most sensitive networks. It just got a lot weaker

Source: Ars Technica

Article note: It's a really interesting attack. The attacker is basically manipulating the sequence numbers during the handshake with IGNORE packets, allowing them to cancel parts of the handshake. Also interesting that it was an attack vector that was considered and deemed theoretically impossible.
Terrapin is coming for your data.

Enlarge / Terrapin is coming for your data. (credit: Aurich Lawson | Getty Images)

Sometime around the start of 1995, an unknown person planted a password sniffer on the network backbone of Finland’s Helsinki University of Technology (now known as Aalto University). Once in place, this piece of dedicated hardware surreptitiously inhaled thousands of user names and passwords before it was finally discovered. Some of the credentials belonged to employees of a company run by Tatu Ylönen, who was also a database researcher at the university.

The event proved to be seminal, not just for Ylönen's company but for the entire world. Until that point, people like Ylönen connected to networks using tools which implemented protocols such as Telnet, rlogin, rcp, and rsh. All of these transmitted passwords (and all other data) as plaintext, providing an endless stream of valuable information to sniffers. Ylönen, who at the time knew little about implementing strong cryptography in code, set out to develop the Secure Shell Protocol (SSH) in early 1995, about three months after the discovery of the password sniffer.

As one of the first network tools to route traffic through an impregnable tunnel fortified with a still-esoteric feature known as "public key encryption," SSH quickly caught on around the world. Besides its unprecedented security guarantees, SSH was easy to install on a wide array of operating systems, including the myriad ones that powered the devices administrators used—and the servers those devices connected to remotely. SSH also supported X11 forwarding, which allowed users to run graphical applications on a remote server.

Read 30 remaining paragraphs | Comments

Posted in News | Leave a comment

Google moves to end geofence warrants, a surveillance problem it largely created

Source: Hacker News

Article note: We're finally moving toward the long predicted "Holding on to large data siloes is a liability, not a potential source of profit" situation. It was kind of assumed it would be because of intentional legislation rather than widespread law enforcement malfeasance, though.
Comments
Posted in News | Leave a comment

Tortured conference series thriving in computer science

Source: Hacker News

Article note: No shortage of nonsense and fraud in academia. I do wonder how much of this particular case is regular individual nonsense and fraud, and how much is structural nonsense, defeating shitty plagiarism detectors that freak out if you reuse background material in a series of papers on the same topic.
Comments
Posted in News | Leave a comment

VMware by Broadcom transition to subscription, end of sale of perpetual licenses

Source: Hacker News

Article note: Oh look, Broadcom, having just received regulatory approval to do so, has decided to squeeze their inherited VMWare customers hard enough that they'll hopefully fund open-source virtualization tooling so they can't get locked in again.
Comments
Posted in News | Leave a comment

Epic win: Jury decides Google has illegal monopoly in app store fight

Source: The Verge - All Posts

Article note: Huh. Apple who are even more locked in and locked down got away with theirs, but Google's visible collaboration with suppliers lost.
Illustration of the Epic Games logo and Google logo inside of a Google Play logo.
Illustration by Cath Virginia / The Verge

Three years after Fortnite-maker Epic Games sued Apple and Google for allegedly running illegal app store monopolies, Epic has a win. The jury in Epic v. Google has just delivered its verdict — and it found that Google turned its Google Play app store and Google Play Billing service into an illegal monopoly.

After just a few hours of deliberation, the jury unanimously answered yes to every question put before them — that Google has monopoly power in the Android app distribution markets and in-app billing services markets, that Google did anticompetitive things in those markets, and that Epic was injured by that behavior. They decided Google has an illegal tie between its Google Play app store and its Google Play Billing payment services,...

Continue reading…

Posted in News | Leave a comment

CAMM standard published, opening door for thin, speedy RAM to overtake SO-DIMM

Source: Ars Technica

Article note: ... I ignored the first version of this story I saw because I assumed CAMM was about frequently talked about but rarely delivering "Content Addressable Memory" not "Compression Attached Memory." Overloaded acronym. I see why vendors would like it now that I see a picture; it's thinner than SODIMM sockets and is a full-replacement-only upgrade. Widespread adoption would at least be an improvement to soldered-in RAM.
Front of a 128GB CAMM.

Enlarge / The front of a 128GB Dell CAMM. (credit: Dell)

Move over, SO-DIMM. A new type of memory module has been made official, and backers like Dell are hoping that it eventually replaces SO-DIMM (small outline dual in-line memory module) entirely.

This month, JEDEC, a semiconductor engineering trade organization, announced that it had published the JESD318: Compression Attached Memory Module (CAMM2) standard, as spotted by Tom's Hardware.

CAMM2 was originally introduced as CAMM via Dell, which has been pushing for standardization since it announced the technology at CES 2022. Dell released the only laptops with CAMM in 2022, the Dell Precision 7670 and 7770 workstations.

Read 11 remaining paragraphs | Comments

Posted in News | Leave a comment

Nvidia emerges as leading investor in AI companies

Source: Hacker News

Article note: That's charmingly circular. They're investing in their own market driver.
Comments
Posted in News | Leave a comment

Nvidia emerges as leading investor in AI companies

Source: Hacker News

Article note: That's charmingly circular. They're investing in their own market driver.
Comments
Posted in News | Leave a comment

Cowgol Development Environment Comes to Z80 and CP/M

Source: Hack a Day

Article note: The thing I like about cowgol and a bunch of the related projects is they're headed toward self-hosting environments. Simple self-hosting computers are - intellectually speaking - important for learning to reason about systems, and almost an extinct species except for actually historical systems.

Cowgol on Z80 running CP/M ties together everything needed to provide a Cowgol development environment (including C and assembler) on a Z80 running the CP/M operating system, making it easier to get up and running with a language aimed to be small, bootstrapped, and modern.

Cowgol is an experimental modern language for (very) small systems.

The Zilog Z80 was an 8-bit microprocessor common in embedded systems of the 1970s and 1980s, and CP/M was a contemporary mass-market operating system. As for Cowgol? It’s an Ada-inspired compiler toolchain and programming language aimed at very small systems, such as the Z80.

What’s different about Cowgol is that it is intended to be self-hosted on these small systems; Cowgol is written in itself, and is able to compile itself. Once one has compiled the compiler for a particular target architecture (for example, the Z80) one could then use that compiler on the target system to compile and run programs for itself.

Thankfully, there’s no need to start from scratch. The Cowgol on Z80 running CP/M repository (see the first link of this post) contains the pre-compiled binaries and guidance on using them.

Cowgol is still under development, but it works. It is a modern language well-suited to (very) small systems, and thanks to this project, getting it up and running on a Z80 running CP/M is about as easy as such things can get.

Thanks to [feinfinger] for the tip!

Posted in News | Leave a comment

BSD on Windows: things I wish I knew existed

Source: OSNews

Article note: That is a supremely weird artifact. It was a set of libraries that ran on Windows 3.1 (or later 95) and used winmem32.dll to touch real memory, which provided (most of) the interfaces to run 386 a.out BSD binaries and a unix userland. From right in the 386BSD/BSDi Lawsuit 4.3BSD era, sort of before Linux and after Coherent or Xenix as low-cost x86 unix options.

It’s 1995 and I’ve been nearly two years in the professional workspace. OS/2 is the dominant workstation product, Netware servers rule the world, and the year of the Linux desktop is going to happen any moment now. If you weren’t running OS/2, you were probably running Windows 3.1, only very few people were using that Linux thing. What would have been the prefect OS at the time would have been NT with a competent POSIX subsystem, but since we were denied that, enter Hiroshi Oota with BSD on Windows.

↫ neozeed at Virtually Fun

This is absolutely wild.

Posted in News | Leave a comment