I need to visit local museum and go to see the first IRC server and ask for guidance in this misguided world (the first ever is 400 m away from my home door, i.e. living at a holy place).
E.g. I get room keys as a security feature. I did read the Matrix spec. But IRL I find myself carrying USB stick from computer to another in order to have anything readable if a room is encrypted. I.e. I can either use recovery key or authorization request to activate a client but it gets you only hafl-way there.
This makes me feel that UX was designed to fit the security features and not other way around. And if you talk to a Matrix cult member they will say to you that you're not getting it.
I miss the 90s, IRC and Polish hacking groups bombing IRCNet with regular netsplits :-) And who needs security when you have OTR (innovation from 2004).
In software security a protocol built without security is easier to guard than a protocol with "security features". IRC has this right too. I feel that this some annual thing to praise the IRC and hate the world 🤷
Well, that at least scares me. How I think is that one should take the simplest possible tool to get a PoC.
Otherwise, all energy might be consumed in useless and pointless battles. Conserving energy, prioritizing and picking the right battles is what engineers IMHO do.
@jmorris off-topic but i have this sound card called "RME BabyFace Pro FS". it has pretty cool idea for FPGA's: the mixer is an FPGA. With this topology it can reach 1 ms latency for audio. And i.e. a firmware update contains also potentially update for the FPGA. Pretty clever hybrid approach IMHO.
Before I got this sound card I was not really sure where application wise it would make sense to have e.g. a SoC combined with FPGA but this product made me understand it a bit better.
I also own one small lattice FPGA. As soon as I get an idea how to use it e.g. with RPi for similar hybrid thing I'll definitely will PoC something. Lattice's have the benefit of having open source FPGA stack and since I also have a SoC FPGA does not have to have too many logic ports.
I spent some time refactoring the tpm_buf changes because they were the major glitch for me in the earlier versions, and those patches have been included now to this series, which is of course great. The series is probably rather sooner than later ready for inclusion to the mainline.
This adds up to the TPM2 sealed hard drive encryption by mitigating bus interposers by a factor. An interposer anything interface the traffic between the CPU and a discrete TPM chip (i.e. not firmware TPM).
A bus interposer can reset a TPM and replay PCR’s as the chip returns to its initial state including PCRS. To mitigate this, kernel creates HMAC session for each TPM transaction and derives session key from the so.called null hierarchy, which essentially provides a new random seed per TPM reset.
Therefore, interposer’s ability to reset TPM decreases because kernel will not be able to communicate with the TPM and that way indirectly a malicious act can be detected by far better chances than ever before.
IMHO, this fits quite nicely to the stuff that #OpenSUSE and #Ubuntu have been working on lately.
Hope everyone noted that I used words "mitigate" and "decrease", not e.g. "address" or "protect from" :-) Security is (and always has been) all about making breaking in expensive and visible enough to the level that the price is too high than the value of the asset protected. It is not that much different from physical world where you decide which sort of locks, doors etc. your house needs so that no one wants to rob your property.
I switched to #helix editor because three advantages weight me more than disadvantage of having to learn away for #vim shortcuts:
Too much legacy.
Too many plugins.
It is a varying challenge to install the latest version #neovim, which anyway needs to be done in order not to break init.lua (and that big pile of plugins).
So for the price of few weeks inconvenience I can stop spending time on text editor configuration and/or figuring out on how to install it.
I used #vim and later on neovim fo the period 1998-2023, even before using Linux. I switched to vim in MS-DOS from text editor called #QEDIT :-)
Just though that good to write this up since I see some distributions packaging rustup, which makes no sense (for #rustc and #cargo it does for obvious reasons).
It is also totally safe to run rustup this way kudos to the amazing #TLS 1.2.