Show newer
modrobert boosted
modrobert boosted
modrobert boosted

Are you a parent of a (in your own opinion) gifted child? Then this video is for you: youtube.com/watch?v=y37BlbviL6

-"Those who would give up essential Liberty to purchase a little temporary Safety, deserve neither Liberty nor Safety and will lose both." [Benjamin Franklin]

modrobert boosted
modrobert boosted

Finally got my internal clock 6809 in the mail. Now I can finish up my little computer

modrobert boosted

Are there any snake experts here? I saw this in a tree while biking. Is there anyone that knows what species this is?

modrobert boosted
modrobert boosted
modrobert boosted
modrobert boosted
modrobert boosted
modrobert boosted
modrobert boosted

> We discover ÆPIC Leak, the first [...] CPU bug that leaks stale data from the microarchitecture WITHOUT using a side channel. [...] leaks stale data incorrectly returned by reading undefined APIC-register ranges.
> ÆPIC Leak is like an uninitialized memory read in the CPU itself.

What a wonderful time to be alive. aepicleak.com/

modrobert boosted

ImHex: A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM

github.com/WerWolv/ImHex

modrobert boosted

Is it just me being old-fashioned? Or is this a common opinion these days?

So I was listening to an episode of Open Source Security Podcast. This is not a bad podcast, but sometimes I'm wondering what they are thinking.

So despite the name of the show, they went on and on about how terrible Linux is, and how Windows has caught up, etc, etc.

In another episode they were talking about how security issues are solved by rewriting things in Rust (I'm pretty sure the hosts are not programmers).

I'm confused. These people are supposed to be professionals but I hear far too much regurgitated nonsense.

modrobert boosted

" Impact

With these vulnerabilities, it is possible to ship pirated games on bluray discs. That is possible even without a kernel exploit as we have JIT capabilities."

Show thread

PS4/PS5: bd-j exploit chain

"Below are 5 vulnerabilities chained together that allows an attacker to gain JIT capabilities and execute arbitrary payloads."

hackerone.com/reports/1379975

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.