@kreyren Curiosity is suspicious.
@Pat Where do I enlist?
After many hours of feeling like an idiot, I have found that my earlier intuition was more valuable than I thought. I thought that the code was too different to be ported. I see now that is not the case. I'm not doing reverse engineering on the overhyped future proof code that was developed to make cheaper iot devices.
I've got 2 separate RTOS that I can port to the BL602. They have their own implementations of a hal and were doing this work long before Rivierawaves. Mission critical applications are where they were developed and still used
I need to rest now, it's been a rough day. I know that these systems will work because they were used on previous generations of hardware for the same or a similar purpose.
I finally understand how the BL602 uses Rivierawaves IP. It's not blatant plagiarism nor something I would have thought about. It's the Wifi and Bluetooth implementation together. This is hardware and code RE. It uses an SDR effectively. The IP has diagrams showing where open source code is used. It only appears to be easy to RE full stack and OS.
I remember hearing President Kennedy speak about going to the moon. "We do these things not because they are easy but because they are hard."
I still feel dumb for not getting it sooner and this has been an effort before now. Now I'm still without the goal, my best wasn't good enough and it's been over a year.
It wasn't pointless as I made progress. I'm going back in for another round.
I've stayed up for days while working on this RE project. For me it has been going on for a little over a year. Some might say that it's bad for me to be doing this work as much as I am. I live to be absorbed by my work. Perhaps I am just a Mathematician doing different work. ;)
I couldn't get the specific SiFive GCC binutils to work a little over a year ago. I did know how to use GCC back then, not rigging a sketchy GCC version by a company to be called like it was a kosher version to cross disassemble. I did it to do it and for hardware addresses/black box.
I ran a few utilities on the objects to determine what architecture, calls to existing code and other fun information.
I discovered how it has dual existence. Waveforming is being used and this is the first I've heard of it being used for this frequency range. That's fascinating but most likely patented.
Many files that are required to build the blobs are in the release or available. Some code is custom made and Mr. Wang is a beast with his code. I'm still trying to put everything together so I can get some documentation out for clean room.
This has been a very long and infuriating project. I've learned a lot. Hopefully I can find enough information.
I'm had some recent developments on the BL602. One being the community, bella gerant alli.
I have been digging through the official source code and found many things. The Atcommands are Haynes Instructions and more importantly, required for the other blobs. The atcoms link the entire system together. This isn't news to the few people who deal with modems.
I did some more RE work recently too. I finally managed to get the archives to disassemble.
@PawelK @Virgin @mathlover I do questionable things for money and entertainment.
@PawelK @Virgin @mathlover Cryptography can be detected by monitoring power use as each feature produces different signals and utilization. Even SDRs have been used to to detect encrypting.
I've been involved in pentesting activities. For one, a comrade said that a certain panel couldn't be tampered with normally and the accessible part, in an elevator shaft, was heavily monitored. IE, it couldn't be tapped with conventional methods without it setting off alarms. I came up with a way but we were never able to get the contract.
@AmpBenzScientist @Virgin @mathlover
Hw hacking vs algo and crypto hacking. Two very separate areas.
@PawelK @mathlover Sweet Serendipity.
Icchak won big in lottery.
Moshe asks him: how did you know to bet on 42?
Icchak says you see I was born on 7th and lottery was on 8th and 7x8 makes 42.
Moshe goes wait wait 7x8 is 56.
Icchak goes, you know what Moshe, you stick to maths if you like it.
@PawelK @Virgin @mathlover In my experience, Comp Sci Majors don't know about JTAG, UART,...,etc or how to solder. If they were the older classes when they knew ASM and hardware, they could hack esp if they had a background in Mathematics. Mathematics is why a lot of Ruskie Hackers have been able to break encryption. They were the best at one point.
@mathlover I hope that this makes you feel better. Mathematics is one of the only pure fields. No one can question something that doesn't become outdated because it was proven by the strongest and most powerful proofs in existence. The purity of the field is what makes it immune.
Go with Computer Science. Did you know that you have a CompSci background? You likely used \LaTeX and Beamer to create your dissertation presentation. Maple, Mathematica or Sage Mathematics to demonstrate it. You've used typesetting and programming in the most intensively investigated and professional settings, presenting a Doctoral Dissertation in Mathematics.
If they say that isn't applicable, tell them to ask someone who could properly screen an applicant like you.
@mathlover I built my former University's Cybersecurity Laboratory and did research there. No record of that exists.
So Cybersecurity is a bastard field that leverages the general incompetence of CompSci and uses outdated information to teach about outdated threats. The certification groups exist to write outdated material and collect their massive fees. They are malevolent groups who have made all jobs in Cybersecurity answer to them and get whatever plunder they want.
SOLARWINDS123 was approved by a highly certificated and educated individual.
@mathlover Universities have no real authority. Some professors are pillars of light but they are the only purity in Universities.
Universities have a heritage going back to antiquity that gives them credibility. IE, a University has to be a descendant of another University. This is the way it has been since God created the Earth and the first University from which all others originate.
It's based in flawed logic that either derives authority from a fairytale lineage or goes back to the days when learning was free and subsequently enslaved.
Toughbook fan, Mathematician and Locksmith with limited success in other areas.
Political stance is far right and far left. Proponent of First Aid Kits and PPE. Easily disheartened by big tech. Partially hinged personality and stubborn enough to not write this in the First Person.
Distrust of Psychology and a fan of satire. I love a good joke and contradict myself. Somewhat serious but easily distracted.