While Jason and I were driving cross-country late last year, we tried to clear two states a day to make sure that we'd get to the west coast on time. This usually meant setting out at 1000 hours local time, loading our luggage into the TARDIS, and putting the pedal to the metal. This usually wan't too big a deal because we usually started a day's travel from a half to a third of the way across a given state to begin with. Near the end of our journey, however, the only viable route meant clearing the state of Arizona …
The next phase of the trusted open computer project is actually manufacturing usable integrated circuits that you can plug into a circuit board, apply power to, and use to do whatever it is that you do. In other words, processing information.
I hate to be a killjoy, but this is really hard. A vital question that we have to ask at this point is whether or not this is the point at which the project is pwnable by a determined third party. Fabbing integrated circuitry on silicon wafers is, to be gentle, a nontrivial process. Here are a couple of …
Late last year, known and respected information security researcher Dragos Ruiu began tweeting about something he called #badBIOS - a malware agent of some kind that he says jacks the BIOS of a machine and sets itself up as a hypervisor-cum-backdoor beneath the operating system. He's gathered got some evidence that instances of the beastie communicate via near-ultrasound by directly manipulating the soundcard without interacting with the OS' drivers. Whether or not he's actually right, some of the NSA's older existing tools aside - it was surprising how fast corroborating details started popping up around the Net.
Some days one wakes up and it feels as if the world has inexorably become a little more strange - a little more surreal, as if Philip K. Dick took an apprentice who runs the tabletop game that we call our lives and they're starting to try things on their own. And it's delightfully fifteen degrees off dead center.
In China there is an industrial farm that not only raises pigs as food but clones them to keep certain germlines around. The company is called BGI and they've gotten the process of cloning refined to the point where it's methodical, repeatable …
On our way across the country, Jason and I passed through and stopped at a number of interesting places. One of the states we drove through was Oklahoma, which I have fond memories of from when I was a youngster (okay, okay, it's because I fell in love with rattlesnake while I was there). Anyway, I took some photographs while passing through - here they are.
There's just something about wide-open spaces, especially deserts, that call to me. I don't know what it is or why, only that it feels like home. It's why I love visiting places like Oklahoma, Arizona …
I've updated my .plan file again. The usual warnings about NSFW content, lack of context, sarcasm, and "Why in the hell would you put that in there?!?" apply.
Incidentally, the reason I put some of that crap into my .plan file (he says to the people who clicked through the cut) is to remind myself that there are people who genuinely believe some of those things, so that I can make plans with them in mind and not get blind-sided yet again by the sheer bloody-mindedness and utter lack of compassion that some people live their lives by, and recommend …
Let's lay one thing out first: At some point you're going to have to start trusting your toolchain because it simply won't be possible to accomplish some of the necessary tasks yourself. The lowest possible level sseems as good a place as any to start. I mean silicon wafers, the basic component of integrated circuitry. Let's face it, nobody's in a position to turn ordinary sand and handfuls of trace elements into silicon wafers themselves. This is a very complex operation that you can't do in your basement these days. There are lots …
In an application development team consisting of n engineers, expect n distinct APIs or translation layers to be developed for use inside the application they are building, all of which are designed "To simplify the API of the other layers my code interfaces with."
The sum total of the Edward Snowden revelations have pretty conclusively proved one thing: That we can't trust anything. The communications networks wrapped around the globe like a blanket are surveilled so minutely that Russian President Vladimir Putin has openly stated his admiration for the US getting away with it so successfully. Much of the cryptographic infrastructure used to protect our communications and data at rest is known to be vulnerable to one or more practical attacks that, in the end they can't really be called effective if one wants to be honest. The company RSA has all but admitted …
I rang in the new year with Lyssa and Amberite at the Cat Club's 80's Dance Party, with special guest DJ Kurt Harland from Information Society. A wonderful night was had by all. Unfortunately, it also completely wrecked our sleep schedules...
I haven't been posting much here lately because, outside of working I've been head-down doing research for either a paper or a series of articles, and there is a lot of information to organize. When it's ready, you'll know it.