…just this guy, you know.

  • 0 Posts
  • 58 Comments
Joined 1 year ago
cake
Cake day: May 7th, 2023

help-circle

  • If you’re skeptical that this feat is possible with a raw 4004, you’re right: The 4004 itself is far too limited to run Linux directly. Instead, Grinberg created a solution that is equally impressive: an emulator that runs on the 4004 and emulates a MIPS R3000 processor—the architecture used in the DECstation 2100 workstation that Linux was originally ported to. This emulator, along with minimal hardware emulation, allows a stripped-down Debian Linux to boot to a command prompt.

    that is 2^8 levels of insane! and of course its Debian.

    edit: 4bit data 12bit addressing make it an 8bit processor ; -)

    I will slowly corrode on this hill.



  • someone genuinely interested for intellectual reasons would likely not fall for it. I would imagine that a non-trivial percentage of “antiquity enjoyers” are very light on history substance and heavy on history feelz.

    once the appropriate brain tickles have been pushed into their heads their “history substance” feed content becomes decidedly propagandized.





  • no worries.

    the net effect of client separation is that your device sees no other layer 2 devices on the wlan besides the gateway. this would typically be enforced at the frame level by the APs and is separate from any radio privacy cryptography.

    a properly configured wireless setup would assume every client is compromised and would also disallow local client-client via source routing or proxy ARP or any other escape options. 100% secure? probably not, but its a non trivial barrier that would have to be circumvented.

    as with e.g. broken WEP years ago, there are still options to mess with clients at ~Layer 1 but I dont believe its currently as trivial as it used to be.








  • I know this may be pedantic, but

    it’s just that the newer phones are secure… For now.

    that statement suggests that other recovery techniques (e.g. hardware decaping, state zero-days, etc), dont already make absolutely current devices insecure.

    it would not surprise me that a TLA with physical access could not recover enclave information and completely expose naked storage in 2 days or less - its just a matter of how urgent is. a former president nearly loosing their head might count as pretty damn urgent. meddle with the us power structure and it will protect itself - if not the particular individuals.

    if you noticed any power dips in your area right after the attempt on trump, that was probably the local NSA cluster firing up.