Hacker Newsnew | past | comments | ask | show | jobs | submit | zyztem's commentslogin

Years later there was another port of OpenSolaris to IBM Power computers called "Polaris": https://www.theregister.co.uk/2006/01/10/solaris_on_power/

And even port to IBM z/VM ("Sirius"): https://www.theregister.co.uk/2008/10/17/solaris_on_mainfram...


> And even port to IBM z/VM ("Sirius"):

Unfortunately that died, because Oracle stopped being willing to cooperate with the port [1]. Of course, I understand why they might not see it as being in their commercial interests to support porting their OS to a competitor's hardware; but, I think their turn away from openness with Solaris accelerated its decline rather than delaying it.

[1] https://www.theregister.co.uk/2010/03/29/oracle_solaris_z_ib...

(Disclaimer: ex-Oracle employee, but I was never working on Solaris directly, just on higher-level middleware stuff which sometimes ran on Solaris, and I really don't know anything about this topic beyond what has been reported in the media.)


I was under impression that "28 pages" document was mostly declassified? Or this is some another documents?


And folks with access to Mentor (Advanced Orion) likely can clone keys from other side of the planet


That requires generating and burning keys to devices during manufacturing. This process will be hacked by NSA & all, exactly like Gemalto https://www.theguardian.com/us-news/2015/feb/19/nsa-gchq-sim...


Haha that's a tall order...

Constructing a scheme where NSA is an active agent in the threat model was not an original requirement :)

You are welcome to introduce any way to produce any part of a router or a PC for that matter that would protect from NSA, it seems that the biggest players in the field are still working out and it is very much a work in progress. When you have an adversary that is able to intercept hardware in transit and spend endless amounts of dollars on devising clever hacks or undetectable hardware exploits, then yes, you're right, some TLS scheme, regardless of where the certs are, is not going to be enough.


This is a world after QUANTUMINSERT for you. Somehow everything should be encrypted but key management are still unsolved


People sometimes like challenge in their lives. See Everest climbing & etc


He did use Twitter to write a normal blog post broken into pieces, so challenge version looks probable.


This is very typical Twitter usage. Few people actually have blogs.


Cell processor shipped for commercial installation in the IBM Blades QS20/QS21/QS22, which was based on Roadrunner supercomputer.

Sony also demoed rack-mount with Cell (https://en.wikipedia.org/wiki/Zego) but it is not clear that it was available in open market


Article picture is an IBM iDataPlex system.


Turn of millennium was era before of SSL/TLS. Livejournal did not want to send clear text password during login to the site. SRP was patent encumbered (and anyway implementing proper PAKE in JavaScript of that era was unfeasible).

So at Livejournal implemented their own challenge-handshake auth: https://www.livejournal.com/doc/server/ljp.csp.auth.challres.... Unfortunately it require storing plain-text equivalent of password on the server.

Seems to be worked fine through the years, but they used it well past "best before" date.

(SRP - http://srp.stanford.edu/, PAKE - https://en.wikipedia.org/wiki/Password-authenticated_key_agr...)


And that API still works (just tested the example), which means that LiveJournal still stores MD5(password) in their database.


The usual problem is not shutting down the reactor: both TMI and Fukushima was properly shutdown. Important task is cooling down the core (and SFP) after that.

Left on its own, halted thermal reactor generates hundreds MW of heat after shutdown. That heat destroys cladding of fuel, generates explosive Hydrogen and causes meltdowns of former core.

It is believed that ATF, core catchers and electricity-independent passive cooling will reduce risk of this types of incidents, commonly called LOCA - Loss of coolant


Fukishima unit 1 had an Isolation Condenser, which is the sort of passive safety system you're talking about. It required no electricity, merely that some valves be open. Supposedly after the earthquake and before the tsunami, the operators opted to close at least one of those valves for reasons that are a little hazy, but might have had something to do with not cooling the reactor too fast. After the tsunami, they couldn't electrically control the valves, and for some reason there was ambiguity about the state of the valves, and no one went to physically check them and open them until it was too late and the fuel had melted.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: