Starting my #fosdem thread here. I've already managed to get one of the gold dust "M" size hoodies, one of the last, as well as see some stuff about open transit.
For now, I'm at "vanilla Debian on an industrial embedded device".
Starting my #fosdem thread here. I've already managed to get one of the gold dust "M" size hoodies, one of the last, as well as see some stuff about open transit.
For now, I'm at "vanilla Debian on an industrial embedded device".
Just finishing up a talk on Erlang's gen_statem, and just caught the end when coming in about Gleam - looks good!
I couldn't get into the transit room next door (it's super popular!) so I'm back in the Erlang room seeing how you can implement UDP protocols.
That's it! That's the whole server!
My first main track talk now, using TPMs for key storage on laptops. Better than a yubikey?
And in this talk James puts his money where is mouth is, posting his kernel.org private key as a qr code. The catch? The private key content can only be decrypted and used in conjunction with the TPM on his laptop.
Pretty bold.
@lanodan TPMs (and also the keyfile like the one pictured) can be fitted out with PINs/passwords as needed. The keyfile on the slide was stripped of its password but has one in practice (though you need to wonder maybe why though)
@lanodan (but yes, he did say as well that before anyone tried to steal his laptop, the keyfile pictured was from hardware he had not brought to the conference)
@lanodan yeah, really it pans out to something like "here's my (aes encrypted) private key (and the aes key is on an mobo-mounted yubikey)"
(if you're wondering how this works, it's a bit like LUKS - the TPM has a small, on-chip bit of cryptography and then all the private key material can be stored in bulk, anywhere, but is unusable without sending it to the TPM when you need it, where it will use the local crypto to decrypt the privkey, do the operation you needed it for, and then return only the result you requested before forgetting the cleartext private key from the TPM memory)
Ok, I went to a talk about zephyr but it was actually guy wearing a suit talking about how he couldn't get his proprietary FPGA toolchain to work, commenting that he knew about the free toolchain - just he didn't want to use it. It was a bit of a let down and it feels like he maybe missed the audience profile. He also tried to plug some commercial offerings.
Anyway, now it's about kids designing and building airtag alternatives!
You can tell this is the plan9 talk because they can't get it to connect to the projector.
(disclaimer: I can't see shit, it's probably libre office in Debian or something)
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.