@PawelK @Virgin @mathlover I do questionable things for money and entertainment.
@PawelK @Virgin @mathlover Cryptography can be detected by monitoring power use as each feature produces different signals and utilization. Even SDRs have been used to to detect encrypting.
I've been involved in pentesting activities. For one, a comrade said that a certain panel couldn't be tampered with normally and the accessible part, in an elevator shaft, was heavily monitored. IE, it couldn't be tapped with conventional methods without it setting off alarms. I came up with a way but we were never able to get the contract.
@AmpBenzScientist @Virgin @mathlover
Hw hacking vs algo and crypto hacking. Two very separate areas.
@PawelK @mathlover Sweet Serendipity.
Icchak won big in lottery.
Moshe asks him: how did you know to bet on 42?
Icchak says you see I was born on 7th and lottery was on 8th and 7x8 makes 42.
Moshe goes wait wait 7x8 is 56.
Icchak goes, you know what Moshe, you stick to maths if you like it.
@PawelK @Virgin @mathlover In my experience, Comp Sci Majors don't know about JTAG, UART,...,etc or how to solder. If they were the older classes when they knew ASM and hardware, they could hack esp if they had a background in Mathematics. Mathematics is why a lot of Ruskie Hackers have been able to break encryption. They were the best at one point.
@mathlover I hope that this makes you feel better. Mathematics is one of the only pure fields. No one can question something that doesn't become outdated because it was proven by the strongest and most powerful proofs in existence. The purity of the field is what makes it immune.
Go with Computer Science. Did you know that you have a CompSci background? You likely used \LaTeX and Beamer to create your dissertation presentation. Maple, Mathematica or Sage Mathematics to demonstrate it. You've used typesetting and programming in the most intensively investigated and professional settings, presenting a Doctoral Dissertation in Mathematics.
If they say that isn't applicable, tell them to ask someone who could properly screen an applicant like you.
@mathlover I built my former University's Cybersecurity Laboratory and did research there. No record of that exists.
So Cybersecurity is a bastard field that leverages the general incompetence of CompSci and uses outdated information to teach about outdated threats. The certification groups exist to write outdated material and collect their massive fees. They are malevolent groups who have made all jobs in Cybersecurity answer to them and get whatever plunder they want.
SOLARWINDS123 was approved by a highly certificated and educated individual.
@mathlover Universities have no real authority. Some professors are pillars of light but they are the only purity in Universities.
Universities have a heritage going back to antiquity that gives them credibility. IE, a University has to be a descendant of another University. This is the way it has been since God created the Earth and the first University from which all others originate.
It's based in flawed logic that either derives authority from a fairytale lineage or goes back to the days when learning was free and subsequently enslaved.
Many years ago I was jokingly called Will Hunting because I was a talented Mathematician who worked as a Custodian. How about them apples?
I've been going through a rough period for the past couple of years and all the small things are catching up with me. I did research on RISC-V for my former University without pay or credit and it was alongside a doctor. I stirred up a different department on collaboration with CompSci and kept pushing FLOSS. I was effectively forced out before the talks could start so someone likely got credited with what I did.
In life I'm looked at as a failure, someone who had a bright future from a bad background. Sometimes I look back at those who ended up being successful and wonder what factors played a role in their success.
I'm not eligible for many careers because of my lack of a BS Degree. For a double Major in Mathematics and Computer Science with a minor in Cybersecurity with experience in the fields of all the above. I wasn't able to pay tuition or get a good paying job and had to quit during my senior year.
@PawelK @hn50 The USA and China have a lot to benefit from this if they wanted such a system. China could use a similar module as their Hypersonic missile, which was operational before Russia's missile, to provide multi role strikes, targeting and guidance. The USA might develop a more sophisticated version as a yeet defense against Hypersonic missiles. The B2 was thought to be unstoppable too but filling the air with AA flack brought it down.
I gave the information about the original source code to Nutcracker members. I'm going to let them have this one. I got asked if I had uploaded any source code and I said no. Luckily I have time stamped information from here and posts. They will give credit.
I also found Nordic Semiconductor code in the Bluetooth stack, same with Intel. It makes sense that it's APLV2. The question remains whether it's right to be able to use open source software to create closed source software. Morally it's worse than theft, it's salting the earth.
Sometimes companies need to learn how hard the FLOSS community can hit back. I saw an impressive amalgamation of several different RTOS projects and resources that were mostly licensed by APLV2 or BSD. The collective work of these being ported is not open source.
A private company recruited volunteers to Reverse Engineer the firmware and it has been about 2 years of work without being completed.
"You should be reading academic Computer Science papers"
https://stackoverflow.blog/2022/04/07/you-should-be-reading-academic-computer-science-papers/
@PawelK @hn50 The CCCP did the same thing with an American designed Sidewinder. It advanced their missile technology by at least a decade according to the Soviet Scientists.
The trick is to Reverse Engineer, document and make the system far more capable than the design could have ever been. But yes, it's fair game and so is Russia's new tank technology. Possibly their Kalashnikov weapons too, seems dumb but the modern AK 100 series makes the the AK74 look like a
XRadio Technology for the at blob source. FreeRTOS, lwip and others for wifi blob. Zephyr for Bluetooth blob.
That's the answer. There's more to it than that but I don't want to type away. I don't know why this wasn't made available sooner. XRadio makes Wifi and bluetooth MCUs and SOCs. Their code was used in the source code of the BL602. Nearly everything is licensed as Apache License v2.0 so if some code was proprietary then it's not an issue.
I cared a lot about this project and it meant a lot to me. Now it's over. There is no reason why the code couldn't be released.
All or most of the object files are from various open source firmware projects. The source code available and the object file names will almost perfectly match the original source.
Why are the object files not released? I don't know why but they are mostly available on github with the correct License. They have been modified for this project.
The strange part is looking at what is missing. The blobs are essential parts of their roles but the source is mostly available from the projects they were based on. Some of the code would need to patch it together. I think it was deliberately made to be not fully open source.
Toughbook fan, Mathematician and Locksmith with limited success in other areas.
Political stance is far right and far left. Proponent of First Aid Kits and PPE. Easily disheartened by big tech. Partially hinged personality and stubborn enough to not write this in the First Person.
Distrust of Psychology and a fan of satire. I love a good joke and contradict myself. Somewhat serious but easily distracted.