Western Digital Stuns Storage Industry with MAMR Breakthrough for Next-Gen HDDs
https://www.anandtech.com/show/11925/western-digital-stuns-storage-industry-with-mamr-breakthrough-for-nextgen-hdds [www.anandtech.com]
2017-10-12 21:18
tags:
hardware
storage
vapor
Western Digital’s Microwave Assisted Magnetic Recording (MAMR) drives use platters very similar to those in the current-generation PMR drives*. This means that the innovation to enable MAMR is mainly to do with the heads that perform read and write operations.
Production-level HDDs based on MAMR technology are expected to start shipping in 2019.
CVE-2017-2416 Remote code execution triggered by malformed GIF in ImageIO framework, affecting most iOS/macOS apps
https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/ [blog.flanker017.me]
2017-04-12 15:29
tags:
c
exploit
iphone
mac
programming
security
What make things worse is that many clients will automatically reload and reparse the image on open, triggering the vulnerability again and again, lead to infinite loop and eliminating the need for attacker to persistent.
Sigh.
An attacker can craft an image of negative height and weight, thus bypassing the check comparing to file size, lead to following out-of-bound.
Sigh.
However they do not have check on PNG extension, allowing me to upload the malformed GIF image in PNG extension, bypassing the check and crashes whoever receives it.
Sigh. Sigh. Sigh.
Becoming a modifier
http://languagelog.ldc.upenn.edu/nll/?p=33570 [languagelog.ldc.upenn.edu]
2017-07-09 00:07
tags:
compsci
retro
Dick Hamming once told me ruefully that if he’d only had the sense not to be limited by the hardware available to him at the time, the Fast Fourier Transform might have been named after him.
Titan in depth: Security in plaintext
https://cloudplatform.googleblog.com/2017/08/Titan-in-depth-security-in-plaintext.html [cloudplatform.googleblog.com]
2017-08-24 22:03
tags:
cloud
cpu
crypto
hardware
security
systems
In this post, we provide details of the mechanisms of how we will establish a hardware root of trust using our custom chip, Titan.
t2k19 Hackathon Report: Putting the hack(6) in hackathon, and other stories
https://undeadly.org/cgi?action=article&sid=20190407152052 [undeadly.org]
2019-04-08 14:54
tags:
development
openbsd
update
The difference in behavior between my system and the OpenBSD project’s package build machines resulted from that plague of ports developers, hidden dependencies.
source: L
How fast are Linux pipes anyway?
https://mazzo.li/posts/fast-pipes.html [mazzo.li]
2022-06-02 22:56
tags:
concurrency
linux
malloc
perf
programming
systems
In this post, we will explore how Unix pipes are implemented in Linux by iteratively optimizing a test program that writes and reads data through a pipe.
We will proceed as follows:
A first slow version of our pipe test bench;
How pipes are implemented internally, and why writing and reading from them is slow;
How the vmsplice and splice syscalls let us get around some (but not all!) of the slowness;
A description of Linux paging, leading up to a faster version using huge pages;
The final optimization, replacing polling with busy looping;
Some closing thoughts.
source: L
When The Dubs Hit The Turbo Button
http://www.espn.com/espn/feature/story/_/id/23453684/nba-secret-warriors-dominance [www.espn.com]
2018-05-11 19:47
tags:
basketball
sports
By the time opponents know what’s hit them, it’s already too late. This is how the Warriors crush -- and how the NBA fails to fight back.
No actual answer of course, just some interesting stats. The team that scores more points usually wins.
A few more thoughts on the vulnerabilities in St Jude Medical's implantable cardiac devices
https://twitter.com/matthew_d_green/status/818816372637650948 [twitter.com]
2017-01-12 05:32
tags:
ioshit
security
tech
tweet
When I say “these devices don’t use strong authentication” I’m not joking. The core defense is 24-bit RSA. No, that’s not a typo.
Update on TLS 1.3 Middlebox Issues
https://www.ietf.org/mail-archive/web/tls/current/msg24517.html [www.ietf.org]
2017-10-07 21:56
tags:
networking
security
standard
turtles
update
web
it does seem like there is a nontrivial failure rate
source: green
Large scale GAN training for high fidelity natural image synthesis
https://blog.acolyer.org/2019/03/01/large-scale-gan-training-for-high-fidelity-natural-image-synthesis/ [blog.acolyer.org]
2019-03-01 17:59
tags:
ai
graphics
paper
I was drawn to this paper to try and find out what’s behind the stunning rate of progress. The large-scale GANs (can I say LS-GAN?) trained here set a new state-of-the-art in class-conditional image synthesis.
So what’s the secret to LS-GANs success? Partly of course it’s just a result of scaling up the models – but interestingly by going wide rather than deep. However, GANs were already notoriously difficult to train (‘unstable’), and scaling things up magnifies the training issues too. So the other part of the innovation here is figuring out how to maintain stability at scale. It’s less one big silver bullet, and more a clever aggregation of techniques from the deep learning parts bin. All in all, it has the feel to me of reaching the upper slopes of an ‘s’-curve such that we might need something new to get us onto the next curve. But hey, with the amazing rates of progress we’ve been seeing I could well be wrong about that.
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
https://pwning.tech/nftables/ [pwning.tech]
2024-03-26 23:33
tags:
best
cpu
exploit
linux
malloc
paper
programming
security
systems
In this blogpost I present several novel techniques I used to exploit a 0-day double-free bug in hardened Linux kernels (i.e. KernelCTF mitigation instances) with 93%-99% success rate. The underlying bug is input sanitization failure of netfilter verdicts. Hence, the requirements for the exploit are that nf_tables is enabled and unprivileged user namespaces are enabled. The exploit is data-only and performs an kernel-space mirroring attack (KSMA) from userland with the novel Dirty Pagedirectory technique (pagetable confusion), where it is able to link any physical address (and its permissions) to virtual memory addresses by performing just read/writes to userland addresses.
Also: https://github.com/Notselwyn/CVE-2024-1086
source: HN
McMoon: How the Earliest Images of the Moon Were so Much Better than we Realised
http://www.worldofindie.co.uk/?p=682 [www.worldofindie.co.uk]
2018-06-15 17:22
tags:
graphics
hardware
history
photos
retro
space
Fifty years ago, 5 unmanned lunar orbiters circled the moon, taking extremely high resolution photos of the surface. They were trying to find the perfect landing site for the Apollo missions. They would be good enough to blow up to 40 x 54ft images that the astronauts would walk across looking for the great spot. After their use, the images were locked away from the public, as at the time they would have revealed the superior technology of the USA’s spy satellite cameras, which the orbiters cameras were designed from. Instead the images from that time were grainy and low resolution, made to be so by NASA.
source: HN
Cryptographically Secure PHP Development
https://paragonie.com/blog/2017/02/cryptographically-secure-php-development [paragonie.com]
2017-02-11 00:48
tags:
php
programming
security
web
While working on sodium_compat, our pure-PHP implementation of libsodium, it has come to our attention that a lot of the engineering decisions we’ve made to minimize the risk of side-channels aren’t well-known outside of our development team.
source: HN
Six maps that show the anatomy of America’s vast infrastructure
https://www.washingtonpost.com/graphics/national/maps-of-american-infrastrucure/ [www.washingtonpost.com]
2016-12-02 04:08
tags:
archive
energy
maps
policy
tech
transport
urban
visualization
I wish there was better zoom support. You can open the images directly to see them at full size, but then the labels disappear.
Ending PHP Support, and The Future Of Hack
https://hhvm.com/blog/2018/09/12/end-of-php-support-future-of-hack.html [hhvm.com]
2018-09-13 17:40
tags:
php
update
Ultimately, we recommend that projects either migrate entirely to the Hack language, or entirely to PHP7 and the PHP runtime.
source: L
Why sorting an array makes a python loop faster
https://rickystewart.wordpress.com/2013/09/03/why-sorting-an-array-makes-a-python-loop-faster/ [rickystewart.wordpress.com]
2016-11-12 19:23
tags:
perf
programming
python
Not actually sorting, but not shuffling, which may have been a hint, but an interesting investigation.
It's Too Complicated: Electronic Surveillance Law
https://www.cs.columbia.edu/~smb/papers/internet-3rd-party.pdf [www.cs.columbia.edu]
2016-11-09 23:34
tags:
life
networking
opsec
paper
pdf
policy
turtles
The third party doctrine is obsolete. 88 pages of legal commentary and citations.
Alignment requirements for memory management functions
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2018/november/alignment-requirements-for-memory-management-functions/ [www.nccgroup.trust]
2018-11-17 18:57
tags:
c
malloc
standard
The alignment requirements are ambiguous in how they affect small allocations (sizes less than _Alignof(max_align_t)). Some implementations interpret this sentence to require _Alignof(max_align_t)-alignment even for allocation sizes that could not hold an object with that alignment. This is referred to as the strong-alignment reading. Other implementations interpret this sentence as requiring the returned memory to be aligned only enough to accommodate those types that could inhabit the returned memory. In particular, because sizeof(T) >= _Alignof(T) for all portably defined types T, allocations with sizes smaller than _Alignof(max_align_t) need only be aligned to the largest power of two less than or equal to the requested size. This is referred to as the weak-alignment reading.
Ironies of automation
https://blog.acolyer.org/2020/01/08/ironies-of-automation/ [blog.acolyer.org]
2020-01-11 23:45
tags:
development
dupe
paper
tech
turtles
The central irony (‘combination of circumstances, the result of which is the direct opposite of what might be expected’) referred to in this paper is that the more we automate, and the more sophisticated we make that automation, the more we become dependent on a highly skilled human operator.
The Scientific Intelligencer
https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol6no4/html/v06i4a05p_0001.htm [www.cia.gov]
2017-10-24 21:53
tags:
article
best
development
history
ideas
physics
science
tech