Optical Effects in User Interfaces
https://medium.muz.li/optical-effects-9fca82b4cd9a [medium.muz.li]
2017-10-06 15:04
tags:
design
graphics
ux
Our eyes are weird organs that often are telling lies to us. But if you know the peculiarities of human visual perception, you can build more approachable and clean designs. Not only do type designers utilize optical tricks for creating readable and well-balanced fonts, but it’s also helpful for interface designers, who build user-machine communication.
source: L
How I implemented MegaTextures on real Nintendo 64 hardware
https://www.youtube.com/watch?v=Sf036fO-ZUk [www.youtube.com]
2023-09-16 20:12
tags:
gaming
gl
graphics
programming
retro
video
This showcases a demo of megatextures running on n64 hardware. A “megatexture” for the n64 is really just a normal sized textured by modern standards but with that you can do some prebaked scenes that look like they don’t belong on the n64.
https://github.com/lambertjamesd/n64brew2023
About the security content of macOS High Sierra 10.13.3
https://support.apple.com/en-us/HT208465 [support.apple.com]
2018-01-24 15:29
tags:
bugfix
mac
release
security
A fun set of fixes, several for already known vulns.
Low-level thinking in high-level shading languages 2023
https://interplayoflight.wordpress.com/2023/12/29/low-level-thinking-in-high-level-shading-languages-2023/ [interplayoflight.wordpress.com]
2024-01-01 04:21
tags:
gl
perf
programming
This, and the followup, is a presentation that I recommend as required reading to people wanting to get deeper into shader programming, not just for the knowledge but also the attitude towards shader programming (check compiler output, never assume, always profile). It has been 10 years since it was released though; in those 10 years a lot of things have changed on the GPU/shader model/shader compiler front and not all the suggestions in those presentations are still valid. So I decided to do a refresh with a modern compiler and shader model to see what still holds true and what doesn’t. I will target the RDNA 2 GPU architecture on PC using HLSL, the 6.7 shader model and the DXC compiler (using https://godbolt.org/) in this blog post.
How a Decade of the iPhone Changed Global Kidnapping
https://warontherocks.com/2018/01/decade-iphone-changed-global-kidnapping/ [warontherocks.com]
2018-01-06 23:32
tags:
hoipolloi
opsec
tech
To understand the monumental change that technology has wrought on hostage-taking strategy, let’s first examine two other advances that changed global kidnapping: commercial airlines and the nightly news.
source: grugq
Two Bugs, One Func()
https://objective-see.com/blog/blog_0x1A.html [objective-see.com]
2017-04-12 15:53
tags:
bugfix
c
cpu
exploit
mac
programming
security
My $169 development Chromebook
https://blog.lessonslearned.org/building-a-more-secure-development-chromebook/ [blog.lessonslearned.org]
2017-07-27 19:22
tags:
admin
browser
development
hardware
linux
How Chrome OS, Termux, YubiKey & Duo Mobile make for great usable security
The real key here is termux.
source: L
More than passive defense
http://www.cerias.purdue.edu/site/blog/post/more_than_passive_defense/ [www.cerias.purdue.edu]
2018-02-22 17:20
tags:
auth
development
malware
networking
opsec
security
unix
Back in the late 1980s and early 1990s, I quietly built some counterhacking and beaconing tools that I installed in a “fake front” machine on our local network. People who tried to break into it might get surprises and leave me log info about what they were up to, and things they downloaded would not do what they thought or might beacon me to indicate where the code went. This was long before honeypots were formalized, and before firewalls were in common use.
This a very good and interesting read.
source: grugq
ruxcon 2017 slides
https://ruxcon.org.au/slides/ [ruxcon.org.au]
2017-11-15 02:58
tags:
archive
pdf
security
slides
Some of them anyway.
source: grugq
ARM immediate value encoding
https://alisdair.mcdiarmid.org/arm-immediate-value-encoding/ [alisdair.mcdiarmid.org]
2017-06-15 21:29
tags:
cpu
programming
Making up for lost bits.
source: grugq
A Tutorial on Portable Makefiles
http://nullprogram.com/blog/2017/08/20/ [nullprogram.com]
2017-08-20 16:47
tags:
development
intro-programming
swtools
unix
Not only has are my builds now portable across all unix-like systems, my Makefiles are cleaner and more robust. Many of the common make extensions — conditionals in particular — lead to fragile, complicated Makefiles and are best avoided anyway. It’s important to be able to trust your build system to do its job correctly.
Less is more.
Dissecting objc_msgSend on ARM64
http://www.mikeash.com/pyblog/friday-qa-2017-06-30-dissecting-objc_msgsend-on-arm64.html [www.mikeash.com]
2017-07-01 20:46
tags:
cpu
objc
perf
programming
systems
It’s always interesting to dive into framework internals. objc_msgSend in particular is a work of art, and delightful to read through.
Dr. Steve Gass, inventor of SawStop
https://www.machinepix.com/p/machinepix-weekly-30-dr-steve-gass [www.machinepix.com]
2021-02-10 22:59
tags:
hardware
interview
tech
This week’s interview features Dr. Steven Gass, the inventor of the SawStop—considered one of the best table saws (we love the one in our office!). SawStop has a unique safety feature that automatically brakes the blade if a finger touches it.
source: K
Relocatable Global Data on x86
http://nullprogram.com/blog/2016/12/23/ [nullprogram.com]
2016-12-25 00:50
tags:
c
compiler
cpu
perf
programming
Another good post looking at code generation and optimization.
Is the Square a Secure Polygon?
http://www.math3ma.com/mathema/2018/5/17/is-the-square-a-secure-polygon [www.math3ma.com]
2018-08-16 20:32
tags:
geometry
math
opsec
visualization
Consider a square in the xy-plane, and let A (an “assassin“) and T (a “target“) be two arbitrary-but-fixed points within the square. Suppose that the square behaves like a billiard table, so that any ray (a.k.a “shot“) from the assassin will bounce off the sides of the square, with the angle of incidence equaling the angle of reflection.
Puzzle: Is it possible to block any possible shot from A to T by placing a finite number of points in the square?
source: grugq
I can Haz TLS 1.3 ?
https://blogs.akamai.com/2017/10/i-can-haz-tls-13.html [blogs.akamai.com]
2017-11-01 15:14
tags:
networking
standard
web
Maybe, if you make the sausage yourself. Good luck.
source: green
507 Mechanical Movements
http://507movements.com/ [507movements.com]
2019-06-04 06:57
tags:
archive
hardware
reference
tech
visualization
This is an online edition of the classic technical reference Five Hundred and Seven Mechanical Movements by Henry T. Brown.
This site contains the original illustrations and text from the 21st edition of the book, published in 1908. It also includes animated versions of the illustrations, and occasional notes by the webmaster.
source: K
Hidden gems of xterm
https://lukas.zapletalovi.com/2013/07/hidden-gems-of-xterm.html [lukas.zapletalovi.com]
2018-09-11 22:23
tags:
admin
swtools
tty
x11
A setting for every config and a config for every setting.
source: Dfly
CC3000 Smart Config - transmitting SSID and keyphrase
http://depletionregion.blogspot.com/2013/10/cc3000-smart-config-transmitting-ssid.html [depletionregion.blogspot.com]
2018-09-20 18:29
tags:
networking
sidechannel
wifi
So let’s start at the start - we have a problem - we want to send two pieces of information, an SSID and the keyphrase, from one party that is already a member of the wifi network to an external party who can monitor all the encrypted wifi traffic but who cannot decrypt it.
So the solution to our problem is to encode the information in the size of the packets sent (the actual content is irrelevant). The party on the secured network just sends UDP packets with particular lengths to another party on the network. That the other party is not interested in receiving the packets is not important.
I believe this is possible. I am amazed it’s actually done.
source: solar
Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions
http://securephones.io/ [securephones.io]
2020-12-24 21:38
tags:
android
iphone
opsec
paper
security
tech
In this work we attempt a full accounting of the current and historical status of smartphone security measures. We focus on several of the most popular device types, and present a complete description of both the available security mechanisms in these devices, as well as a summary of the known public information on the state-of-the-art in bypass techniques for each. Our goal is to provide a single periodically updated guide that serves to detail the public state of data security in modern smartphones.
source: green