Kawaoneechan |
Posted on 19-08-30, 01:13
|
A very very naughty boy!
Post: #381 of 599 Since: 10-29-18 Last post: 195 days Last view: 45 min. |
...that video, because I'm on my phone now when I'm supposed to be asleep for the past two and a half hours. And even then, I'd sooner watch Kamen Rider, and that's on Sunday. |
CaptainJistuce |
Posted on 19-08-30, 02:28
|
Custom title here
Post: #664 of 1164 Since: 10-30-18 Last post: 63 days Last view: 5 hours |
Posted by KoiMaxxI was thinkin' Beast Morphers, actually. --- In UTF-16, where available. --- |
CaptainJistuce |
Posted on 19-09-01, 05:28
|
Custom title here
Post: #667 of 1164 Since: 10-30-18 Last post: 63 days Last view: 5 hours |
Posted by Kawa How do you feel about the new show being called Kamen Rider 01? It just seems needlessly confusing to me. --- In UTF-16, where available. --- |
Kawaoneechan |
Posted on 19-09-01, 07:01
|
20% cooler than thou art
Post: #383 of 599 Since: 10-29-18 Last post: 195 days Last view: 45 min. |
I have no strong feelings on that one way or the other. I do have strong feelings on the naming scheme of 01's finishers, all positive. |
CaptainJistuce |
Posted on 19-09-11, 10:49
|
Custom title here
Post: #689 of 1164 Since: 10-30-18 Last post: 63 days Last view: 5 hours |
Another day, another Intel processor vulnerability. This time it only hits Xeons, but it lets attackers copy data from the CPU cache out over the network, using a feature called Data-Direct I/O(DDIO) and Remote Direct Memory Access(RDMA). RDMA does what it says. It allows one computer to have direct memory access to another computer, instead of simply limiting DMA to peripherals attached to the computer. And what is DDIO, you ask? It is DMA on steroids. It lets hardware attached to a computer have direct memory access to the processor's cache. Basically, the conversation went like this... Security researchers: "DMA is a vulnerability, albeit a very useful one from a performance standpoint. You probably shouldn't just let any random piece of hardware take a DMA channel, certainly not without asking first." Intel: "But what if DMA could get outside main memory and into the CPU? Wouldn't that give it EVEN BETTER PERFORMANCE?" Security: "Maybe, but the vulnerability would be far worse." Intel: "And we could let OTHER COMPUTERS use DMA to talk to each other!" Security: "That is basically carte blanche to copy secure information from any Xeon system across the fucking internet. Are... are you even listening to us?" Intel: "DMA EVERYWHERE!" In short, it is a vulnerability that only exists because Intel is intentionally sacrificing security for performance, and has cranked that knob up to --- In UTF-16, where available. --- |
tomman |
Posted on 19-09-11, 12:01
|
Dinosaur
Post: #535 of 1315 Since: 10-30-18 Last post: 58 days Last view: 14 hours |
I'll take ALL THE NITROZZZ over sekuritah theater any day of the week, except for when my money is in the line. Why speculators are not shorting Intel stock!? Now seriously, every time I hear about a new external port with DMA, the very next stuff I hear are paranoids and security researchers claiming that the world is going to end in the next 3 days. Dude, noone wants another PIO port! But yeah, for hardware OEMs, security == money, and you know margins are razor thin on those $1500 cellphones and $5000 designer laptops, right? It's time for engineers to take back the industry from the stupid iron grip of beancounters, and that goes from Intel all the way up to Boeing. I'm still waiting for someone to take over my DANGER MINES full DMA capable Firewire ports. But then, I would need to find Firewire devices first, as those have always been very rare where I am located. Licensed Pirate® since 2006, 100% Buttcoin™-free, enemy of All Things JavaScript™ |
CaptainJistuce |
Posted on 19-09-11, 12:08
|
Custom title here
Post: #690 of 1164 Since: 10-30-18 Last post: 63 days Last view: 5 hours |
I have no problem with DMA within reason. One computer reaching through the network into another computer's cache is... not within reason. --- In UTF-16, where available. --- |
wertigon |
Posted on 19-09-11, 12:57
|
Post: #90 of 205
Since: 11-24-18 Last post: 155 days Last view: 27 days |
Holy... CRAP O_o That will seriously murder Intel in the server space! What were they thinking? |
Kawaoneechan |
Posted on 19-09-11, 13:34
|
SHOO-BE-DOO SHOO-SHOO-BE-DOO
Post: #391 of 599 Since: 10-29-18 Last post: 195 days Last view: 45 min. |
They were not. Or at least not enough. |
wertigon |
Posted on 19-09-11, 13:57
|
Post: #91 of 205
Since: 11-24-18 Last post: 155 days Last view: 27 days |
Posted by tomman I get what you're saying, however here we are talking about a vulnerability accessible through your RJ45 Ethernet port to bypass every other security mechanism. It's like you had a secret entrance to the throne room (or worse yet, royal bedroom) just outside your main gate. With a cover painted all red, and the text DO NOT OPEN. |
Duck Penis |
Posted on 19-09-12, 21:58
|
Stirrer of Shit
Post: #623 of 717 Since: 01-26-19 Last post: 1763 days Last view: 1761 days |
Posted by tomman Because this is a non-issue, as per the efficient market hypothesis. You could go buy all the puts you want, but the market simply does not care - neither did they for MELTDOWN or SPECTRE or CASINO ROYALE or whatever. You can reason about this backwards: if the market did react to announcements of security vulnerabilities, a lot of money could be made from announcing them while shorting the stock. Since you don't see too many of these announcements, not a lot of money could be made from announcing them, thus the market does not react strongly to them. The disclosure was on September 10, and the stock did enjoy a drop of 1.74% after what I assume was the disclosure before rebounding. So it's not as if the traders didn't know about it. There was a certain photograph about which you had a hallucination. You believed that you had actually held it in your hands. It was a photograph something like this. |
tomman |
Posted on 19-09-25, 19:56
|
Dinosaur
Post: #554 of 1315 Since: 10-30-18 Last post: 58 days Last view: 14 hours |
For those of you using Macs with Very Expensive Video Tools™: https://apple.slashdot.org/story/19/09/24/2039236/mysterious-avid-issue-knocks-out-mac-pro-workstations-across-hollywood Apparently some Avid users (mainly at Hollywood) have had their macOS setups turned unbootable, because of a combination of incredibly dumb decisions: - Avid tools can use the power of your expensive video cards for doing video stuff - Expensive video cards use GPUs made by a few OEMs in the world, among those being nVidia - nVidia drivers do support the latest expensive cards under Mac, except that for whatever reason, Apple is not willing to sign their newest drivers - This is not a problem, except that recent macOS versions ship with System Integrity Protection (SIP), a feature meant to make your computer safe from poorly coded software that could break it by performing really dumb operations, and as a side effect, it disallows the use of unsigned drivers (in other words, exactly what Windows does nowadays) - Those Avid users have paid $$$MUCHODINERO$$$ for both their Avid tools and the companion nVidia cards that are required to render their fancy Big Cinema blockbuster vomits, but since Apple is being Apple, they can't install the device drivers that would allov said expensive cards to actually work - In order to Get Shit Done™, you have to shoot yourself in the foot and go through security theatre to disable SIP, a core OS security feature (seriously, it requires booting to a separate partition or something just to uncheck that flag) so you can install the nVidia drivers - And this is where things get weird: the Mac version of Chrome just had a Steam "rm -rf ." brainfart on their latest version, by trying to remove the /var directory (which on the Unixoid macOS is actually a symlink to somewhere else). Normally this is the class of "system-breaking dumb" that SIP is meant to block (and the class of bugs that you simply don't get make into production unless you're actively trying to do evil)... except that thanks to Avid, Apple and nVidia, you've just fell into a booby trap. Oops. Enjoy your unbootable Mac! - Yes, you can actually boot from rescue media and re-add the broken symlink, restoring bootability. But those post-production shops are full of creative video wizards, not computer nerds! (Don't ask me how pros are wiring modern GPUs to their trashcan Mac Pros, as AFAIK noone is making videocards in whatever highly custom socket they're using) So much for It Just Works™, except that this is compounded by the fact that noone test their shit anymore before shipping to production :/ Licensed Pirate® since 2006, 100% Buttcoin™-free, enemy of All Things JavaScript™ |
Screwtape |
Posted on 19-09-25, 23:31
|
Full mod
Post: #349 of 443 Since: 10-30-18 Last post: 1101 days Last view: 172 days |
I'd heard there was a problem, I hadn't heard it had been diagnosed. Fascinating. > Don't ask me how pros are wiring modern GPUs to their trashcan Mac Pros As I understand it, the Trashcan has a bunch of Thunderbolt or USB-C ports or something, which can carry a PCI Express signal, so you can buy an external PCI enclosure. It's basically a box with a PCI slot in it, and a cable that connects to your Mac, much like an external hard-drive enclosure is a box with a SATA connector in it. The ending of the words is ALMSIVI. |
Nicholas Steel |
Posted on 19-09-26, 04:02
|
Post: #284 of 426
Since: 10-30-18 Last post: 498 days Last view: 13 days |
Please elaborate on Steam "rm -rf ." AMD Ryzen 3700X | MSI Gamer Geforce 1070Ti 8GB | 16GB 3600MHz DDR4 RAM | ASUS Crosshair VIII Hero (WiFi) Motherboard | Windows 10 x64 |
creaothceann |
Posted on 19-09-26, 05:10
|
Post: #201 of 456 Since: 10-29-18 Last post: 44 days Last view: 1 day |
Posted by Nicholas Steel https://linux.slashdot.org/story/15/01/16/1429201/steam-for-linux-bug-wipes-out-all-of-a-users-files My current setup: Super Famicom ("2/1/3" SNS-CPU-1CHIP-02) → SCART → OSSC → StarTech USB3HDCAP → AmaRecTV 3.10 |
Nicholas Steel |
Posted on 19-09-26, 09:05
|
Post: #285 of 426
Since: 10-30-18 Last post: 498 days Last view: 13 days |
Thank you. AMD Ryzen 3700X | MSI Gamer Geforce 1070Ti 8GB | 16GB 3600MHz DDR4 RAM | ASUS Crosshair VIII Hero (WiFi) Motherboard | Windows 10 x64 |
tomman |
Posted on 19-09-26, 10:50
|
Dinosaur
Post: #555 of 1315 Since: 10-30-18 Last post: 58 days Last view: 14 hours |
Some new findings on this case: https://it.slashdot.org/story/19/09/25/2152236/mysterious-mac-pro-shutdowns-likely-caused-by-chrome-update - Chrome itself it's not wrecking macOS, it's actually its autoupdater component, Keystone. Google is still to blame anyway. - Avid is also guilty on the "unsinged kernel-mode driver" fuckery, not only nVidia: their Very Expensive software seems to require USB dongles (yay DRM), for which special hardware-specific drivers are used. Drivers that are not signed, and therefore require to intentionally disable SIP. The joys of DRM, people, endangering your jobs since forever! Licensed Pirate® since 2006, 100% Buttcoin™-free, enemy of All Things JavaScript™ |
Kakashi |
Posted on 19-09-26, 11:36
|
Post: #206 of 210 Since: 10-29-18 Last post: 1876 days Last view: 1848 days |
https://spectrum.ieee.org/computing/hardware/goodbye-motherboard-hello-siliconinterconnect-fabric |
creaothceann |
Posted on 19-09-26, 12:22 (revision 1)
|
Post: #203 of 456 Since: 10-29-18 Last post: 44 days Last view: 1 day |
Posted by Kakashi https://www.reddit.com/r/electronics/comments/d99te9/goodbye_motherboard_hello_siliconinterconnect/ Nice idea, but... My current setup: Super Famicom ("2/1/3" SNS-CPU-1CHIP-02) → SCART → OSSC → StarTech USB3HDCAP → AmaRecTV 3.10 |
Screwtape |
Posted on 19-09-27, 02:44
|
Full mod
Post: #350 of 443 Since: 10-30-18 Last post: 1101 days Last view: 172 days |
That thread has a whole bunch of people who apparently assume that "silicon PCB" means "the entire computer has to be fabricated at the same time, on the same wafer, and with the same super-expensive process as the CPU". The ending of the words is ALMSIVI. |