Show newer

RTEMS and eCoS are both used in embedded systems. The latter was the full stack Qualcomm Atheros wifi embedded SoC. The source is there, open and ready to be ported to this little menace.

After many hours of feeling like an idiot, I have found that my earlier intuition was more valuable than I thought. I thought that the code was too different to be ported. I see now that is not the case. I'm not doing reverse engineering on the overhyped future proof code that was developed to make cheaper iot devices.

I've got 2 separate RTOS that I can port to the BL602. They have their own implementations of a hal and were doing this work long before Rivierawaves. Mission critical applications are where they were developed and still used

I need to rest now, it's been a rough day. I know that these systems will work because they were used on previous generations of hardware for the same or a similar purpose.

I finally understand how the BL602 uses Rivierawaves IP. It's not blatant plagiarism nor something I would have thought about. It's the Wifi and Bluetooth implementation together. This is hardware and code RE. It uses an SDR effectively. The IP has diagrams showing where open source code is used. It only appears to be easy to RE full stack and OS.

I remember hearing President Kennedy speak about going to the moon. "We do these things not because they are easy but because they are hard."

I still feel dumb for not getting it sooner and this has been an effort before now. Now I'm still without the goal, my best wasn't good enough and it's been over a year.

It wasn't pointless as I made progress. I'm going back in for another round.

I've stayed up for days while working on this RE project. For me it has been going on for a little over a year. Some might say that it's bad for me to be doing this work as much as I am. I live to be absorbed by my work. Perhaps I am just a Mathematician doing different work. ;)

Show thread

I couldn't get the specific SiFive GCC binutils to work a little over a year ago. I did know how to use GCC back then, not rigging a sketchy GCC version by a company to be called like it was a kosher version to cross disassemble. I did it to do it and for hardware addresses/black box.

I ran a few utilities on the objects to determine what architecture, calls to existing code and other fun information.

I discovered how it has dual existence. Waveforming is being used and this is the first I've heard of it being used for this frequency range. That's fascinating but most likely patented.

Many files that are required to build the blobs are in the release or available. Some code is custom made and Mr. Wang is a beast with his code. I'm still trying to put everything together so I can get some documentation out for clean room.

This has been a very long and infuriating project. I've learned a lot. Hopefully I can find enough information.

Show thread

I'm had some recent developments on the BL602. One being the community, bella gerant alli.

I have been digging through the official source code and found many things. The Atcommands are Haynes Instructions and more importantly, required for the other blobs. The atcoms link the entire system together. This isn't news to the few people who deal with modems.

I did some more RE work recently too. I finally managed to get the archives to disassemble.

My device died and I had to recover so many accounts. More to go but at least I'm back. I have a lot of good news and a new device.

@PawelK @Virgin @mathlover Cryptography can be detected by monitoring power use as each feature produces different signals and utilization. Even SDRs have been used to to detect encrypting.

I've been involved in pentesting activities. For one, a comrade said that a certain panel couldn't be tampered with normally and the accessible part, in an elevator shaft, was heavily monitored. IE, it couldn't be tapped with conventional methods without it setting off alarms. I came up with a way but we were never able to get the contract.

@mathlover @AmpBenzScientist

Icchak won big in lottery.
Moshe asks him: how did you know to bet on 42?
Icchak says you see I was born on 7th and lottery was on 8th and 7x8 makes 42.
Moshe goes wait wait 7x8 is 56.
Icchak goes, you know what Moshe, you stick to maths if you like it.

@PawelK @Virgin @mathlover In my experience, Comp Sci Majors don't know about JTAG, UART,...,etc or how to solder. If they were the older classes when they knew ASM and hardware, they could hack esp if they had a background in Mathematics. Mathematics is why a lot of Ruskie Hackers have been able to break encryption. They were the best at one point.

I just looked at my heart rate and it was 61 bpm. This is my normal resting heart rate down to 58 bpm. I took my medication for ADHD recently. If this seems unrelated, see the next paragraph.

My resting HR is 61 bpm on amphetamine and my blood pressure is perfect.

@AmpBenzScientist @mathlover People with Computer Science Backgrounds don't make good hackers though. They would get owned by drunk russians.

I don't need math. I got wits.

@mathlover I hope that this makes you feel better. Mathematics is one of the only pure fields. No one can question something that doesn't become outdated because it was proven by the strongest and most powerful proofs in existence. The purity of the field is what makes it immune.

Go with Computer Science. Did you know that you have a CompSci background? You likely used \LaTeX and Beamer to create your dissertation presentation. Maple, Mathematica or Sage Mathematics to demonstrate it. You've used typesetting and programming in the most intensively investigated and professional settings, presenting a Doctoral Dissertation in Mathematics.
If they say that isn't applicable, tell them to ask someone who could properly screen an applicant like you.

@mathlover I built my former University's Cybersecurity Laboratory and did research there. No record of that exists.

So Cybersecurity is a bastard field that leverages the general incompetence of CompSci and uses outdated information to teach about outdated threats. The certification groups exist to write outdated material and collect their massive fees. They are malevolent groups who have made all jobs in Cybersecurity answer to them and get whatever plunder they want.

SOLARWINDS123 was approved by a highly certificated and educated individual.

@mathlover Universities have no real authority. Some professors are pillars of light but they are the only purity in Universities.

Universities have a heritage going back to antiquity that gives them credibility. IE, a University has to be a descendant of another University. This is the way it has been since God created the Earth and the first University from which all others originate.

It's based in flawed logic that either derives authority from a fairytale lineage or goes back to the days when learning was free and subsequently enslaved.

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.