Hacker Newsnew | past | comments | ask | show | jobs | submit | more fulldecent2's commentslogin

The valid alternative is to use a dutch auction.

Can you imagine the US Treasury saying "Um, we made a deal with Blackrock and they bought all our treasuries. It's an exclusive deal and we're not letting anyone else buy treasuries now. Oh and p.s. the price is secret."


Missing a key feature ~~ there should be 30+ images. You need to have that many to flag an account.


Because they are scanning with a different hash system.


Thanks for your interest. If you have any advice on other instructions or M1 optimizations, I'd love to hear.

My first thought is to synchronize effort of the 8 CPU and maybe even the 8 GPU. That's +12dB right there. We have a multithreaded implementation in the project already.


No, sorry, I don't know anything about the M1.

If you want to achieve something similar to _mm_stream_xxx, ie. bypassing the caches and causing bursts of DRAM traffic, try making some uncached/write combined memory mappings and writing to them. I don't know how this can be done in user space. You could try creating memory mapped buffers with OpenGL or Metal, with certain arguments you could get an uncached mapping.

Another option is looking at ARM instructions for memory barriers and cache flushes. ARM's selection of instructions for dealing with caches is much richer than x86's.


Just chiming in to note that "1) if your air-gapped computer has malware that can do this, you've already lost" is a problem specific to this implementation.

Other implementations exist (related work, not in 2.4G band) where it is not necessary to install malware to make measurable transmissions.

For example (shilling) https://fulldecent.github.io/system-bus-radio/ allows to broadcast just by loading a web page. And, importantly, this is an attack vector that is reasonable to execute offline (i.e. connected to a local network with HTTP services, but not the internet).


Thanks for sharing. You are welcome to add to the TEST-DATA file.

We just received the first field report of success with the M1 MacBook Pro here https://github.com/fulldecent/system-bus-radio/blob/master/T...


Excellent! Have you been able to transmit anything at all without connecting a wire over the outputs?

Or are there are popular configurations where people have something plugged in and then unwitting be open to an exfiltration attack?


Range without an antenna is around 10-20cm. I was able to hold my RPi next to my ceiling fan and control it, but obviously that’s not very practical.

Theoretically you could exfiltrate data with it, but if you have root access to the RPi already then I don’t see why you wouldn’t just use Wi-Fi.


Enjoy


I usually uninstall apps with a 1-star review if they provide zero functionality until you provide your email address.

Apps and devices serve me, not the other way around.


So you don't use social media on your phone?


Here is what people mean when we say we don't like Section 230. And we mean it whether or not Section 230 is actually responsible.

- Advertiser uses our trademark on Google Ads? Google makes money and has editorial control. But we can't sue them.

- Somebody posts something libelous about us on Twitter? Twitter makes serious money and has editorial control. But we can't sue them.

- Fakes on eBay? Can't stop them. eBay not liable.

If Twitter is going to have a "fact checking" department, then they also need a "retractions" department. And if retraction aren't forthcoming when reasonable, then we need a cause of action against them.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: