• 0 Posts
  • 22 Comments
Joined 3 years ago
cake
Cake day: December 20th, 2021

help-circle







  • I lost my earbuds in a remote town in Chile, so tried buying a new pair at the airport before flying out.

    True Apple lightning devices are more expensive to make.

    I wish @Apple would devote an employee or two to cracking down on such a technological, psychological abomination as this.

    He wants to take away a budget option from developing countries where people can’t afford the expensive version of the proprietary technology, and he wants Apple to be the one to do it?

    Fuck this guy.


  • Why not post your blogs to a fediverse platform? Do they need to be on a separate hosted system? You’ll probably get more people reading and engaging with your posts if you are just posting to a Mastodon instance rather than hosting on a separate web platform and hoping that people stumble across it.








  • The author’s own solution is not even sufficient to meet their own criteria:

    2. Hand assemble the GNU stage0 hex0 monitor (280 bytes) (or a spiritual equivalent for the SBC’s ISA) from printed source assembly using pen and paper and an ISA manual.

    6. By using the terminal to communicate with the hex0 monitor, type in more sophisticated monitors as hexdecimal after hand-assembling them on pen and paper.

    The source code to these programs was obtained through requirement (2):

    (2) … You may request any of the following resources:

    Source code to any open source code, printed on paper

    This code does not specify that it has been signed or has had its authenticity verified. Only code received digitally through requirement (3) is cryptographically verified:

    (3) … You may request further open source code (e.g. the Linux kernel) to be delivered in some digital form … however data delivered in this manner may only be used where:

    the user can verify the cryptographic identity of that data, where that verification process itself does not rely on any data obtained using this clause, and …

    So already at the start of the process, the author is using tools to bootstrap the system which could contain backdoors.

    I would change the requirements so that source code printouts are already verified by the person supplying them, or that the solver has to write their own bootstrap tools to get to the point of being able to verify cryptographic hashes/signatures before they can even use any third party source code.