GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Jarkko Sakkinen (jarkko@social.kernel.org), page 2

  1. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Thursday, 05-Sep-2024 00:40:48 JST Jarkko Sakkinen Jarkko Sakkinen
    in reply to
    • Hilton Fernandes
    • Jarkko Sakkinen
    @hgfernan Openhub from Synopsys is super useful for doing this type of comparisons.
    In conversation about 10 months ago from social.kernel.org permalink
  2. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Thursday, 05-Sep-2024 00:05:36 JST Jarkko Sakkinen Jarkko Sakkinen
    Firefox has been using Rust since 2017 and about fifth of its code that was previously in C/C++ has been written in Rust (see Oxidation sub-project).

    I'd expect slower cycle for Linux than Firefox. I think this would be likely truth for operating system with decades of legacy (e.g. BSD derivatives).

    This makes me think that making any conclusions after two years is simply not a pragmatic mindset.

    #rust #linux #kernel
    In conversation about 10 months ago from social.kernel.org permalink
  3. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Thursday, 16-May-2024 03:22:08 JST Jarkko Sakkinen Jarkko Sakkinen
    "No Arduino! If you aim to master embedded systems, Arduino won’t cut it. It’s a playground for hobbyists, not the battleground for engineers. The purpose is not to scare you — It’s to help you out. It is to give you a proper direction." -https://medium.com/@umerfarooqai/embedded-engineering-roadmap-say-no-to-arduino-a0eed8e1bf10

    Well, that at least scares me. How I think is that one should take the simplest possible tool to get a PoC.

    Otherwise, all energy might be consumed in useless and pointless battles. Conserving energy, prioritizing and picking the right battles is what engineers IMHO do.

    #arduino #engineer
    In conversation about a year ago from social.kernel.org permalink
  4. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Saturday, 11-May-2024 03:52:54 JST Jarkko Sakkinen Jarkko Sakkinen
    in reply to
    • James Morris
    • Jarkko Sakkinen
    @jmorris https://rme-audio.de/babyface-pro-fs.html
    In conversation about a year ago from social.kernel.org permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Babyface Pro FS - RME Audio Interfaces | Format Converters | Preamps | Network Audio & MADI Solutions
      RME Audio Professional Live, Studio, Recording and Broadcast Solutions. Unrivalled Quality, Performance & Stability MADI Interfaces, Converters & Preamps.
  5. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Saturday, 11-May-2024 03:52:54 JST Jarkko Sakkinen Jarkko Sakkinen
    in reply to
    • James Morris
    @jmorris off-topic but i have this sound card called "RME BabyFace Pro FS". it has pretty cool idea for FPGA's: the mixer is an FPGA. With this topology it can reach 1 ms latency for audio. And i.e. a firmware update contains also potentially update for the FPGA. Pretty clever hybrid approach IMHO.

    Before I got this sound card I was not really sure where application wise it would make sense to have e.g. a SoC combined with FPGA but this product made me understand it a bit better.

    I also own one small lattice FPGA. As soon as I get an idea how to use it e.g. with RPi for similar hybrid thing I'll definitely will PoC something. Lattice's have the benefit of having open source FPGA stack and since I also have a SoC FPGA does not have to have too many logic ports.
    In conversation about a year ago from social.kernel.org permalink
  6. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Wednesday, 01-May-2024 13:08:54 JST Jarkko Sakkinen Jarkko Sakkinen
    Rust performance book: https://nnethercote.github.io/perf-book/

    #rustlang
    In conversation about a year ago from social.kernel.org permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Title Page - The Rust Performance Book
  7. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Monday, 04-Dec-2023 13:22:45 JST Jarkko Sakkinen Jarkko Sakkinen

    James Bottomley posted new version of the #HMAC encryption patches for #TPM2: https://lore.kernel.org/linux-integrity/20231127190854.13310-1-James.Bottomley@HansenPartnership.com/T/#t

    I spent some time refactoring the tpm_buf changes because they were the major glitch for me in the earlier versions, and those patches have been included now to this series, which is of course great. The series is probably rather sooner than later ready for inclusion to the mainline.

    This adds up to the TPM2 sealed hard drive encryption by mitigating bus interposers by a factor. An interposer anything interface the traffic between the CPU and a discrete TPM chip (i.e. not firmware TPM).

    A bus interposer can reset a TPM and replay PCR’s as the chip returns to its initial state including PCRS. To mitigate this, kernel creates HMAC session for each TPM transaction and derives session key from the so.called null hierarchy, which essentially provides a new random seed per TPM reset.

    Therefore, interposer’s ability to reset TPM decreases because kernel will not be able to communicate with the TPM and that way indirectly a malicious act can be detected by far better chances than ever before.

    IMHO, this fits quite nicely to the stuff that #OpenSUSE and #Ubuntu have been working on lately.

    In conversation Monday, 04-Dec-2023 13:22:45 JST from social.kernel.org permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      [PATCH v5 00/17] add integrity and security to TPM2 transactions
  8. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Monday, 04-Dec-2023 13:22:44 JST Jarkko Sakkinen Jarkko Sakkinen
    in reply to
    • Jarkko Sakkinen
    Hope everyone noted that I used words "mitigate" and "decrease", not e.g. "address" or "protect from" :-) Security is (and always has been) all about making breaking in expensive and visible enough to the level that the price is too high than the value of the asset protected. It is not that much different from physical world where you decide which sort of locks, doors etc. your house needs so that no one wants to rob your property.
    In conversation Monday, 04-Dec-2023 13:22:44 JST from social.kernel.org permalink
  9. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Monday, 04-Dec-2023 10:29:06 JST Jarkko Sakkinen Jarkko Sakkinen

    I switched to #helix editor because three advantages weight me more than disadvantage of having to learn away for #vim shortcuts:

    1. Too much legacy.
    2. Too many plugins.
    3. It is a varying challenge to install the latest version #neovim, which anyway needs to be done in order not to break init.lua (and that big pile of plugins).

    So for the price of few weeks inconvenience I can stop spending time on text editor configuration and/or figuring out on how to install it.

    I used #vim and later on neovim fo the period 1998-2023, even before using Linux. I switched to vim in MS-DOS from text editor called #QEDIT :-)

    In conversation Monday, 04-Dec-2023 10:29:06 JST from social.kernel.org permalink

    Attachments


    1. https://social.kernel.org/media/0c63d3ff027e9091b384001e5dd76087926ede089014e60af1fa7de81426e5a7.png

  10. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Friday, 17-Nov-2023 01:37:14 JST Jarkko Sakkinen Jarkko Sakkinen

    Installing #rustup:

    alias rustup="curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | bash -s --"

    E.g.

    rustup --no-modify-path

    Just though that good to write this up since I see some distributions packaging rustup, which makes no sense (for #rustc and #cargo it does for obvious reasons).

    It is also totally safe to run rustup this way kudos to the amazing #TLS 1.2.

    #rustlang

    In conversation Friday, 17-Nov-2023 01:37:14 JST from social.kernel.org permalink

    Attachments


  11. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Friday, 10-Nov-2023 03:05:53 JST Jarkko Sakkinen Jarkko Sakkinen
    in reply to
    • James Morris
    @jmorris My inital guess was no but then I googled a bit and found https://dev.to/kgrech/five-simple-steps-to-use-any-arduino-c-library-in-a-rust-project-1k78
    In conversation Friday, 10-Nov-2023 03:05:53 JST from social.kernel.org permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: thepracticaldev.s3.amazonaws.com
      Five simple steps to use any Arduino C++ library in a Rust project 🦀
      from @grekon007
      Arduino helps circuit developers to build electronic projects and is, perhaps, the most used...
  12. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Friday, 10-Nov-2023 02:40:44 JST Jarkko Sakkinen Jarkko Sakkinen
    in reply to
    • James Morris

    I’d consider rewriting it with Rust and adr-hal.

    In conversation Friday, 10-Nov-2023 02:40:44 JST from social.kernel.org permalink
  13. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Friday, 15-Sep-2023 02:20:53 JST Jarkko Sakkinen Jarkko Sakkinen
    #TPM backed full disk #encryption in #Ubuntu: https://ubuntu.com/blog/tpm-backed-full-disk-encryption-is-coming-to-ubuntu #Linux
    In conversation Friday, 15-Sep-2023 02:20:53 JST from social.kernel.org permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: ubuntu.com
      TPM-backed Full Disk Encryption is coming to Ubuntu | Ubuntu
      Discover Ubuntu’s latest security enhancement: TPM-backed Full Disk Encryption (FDE). This experimental feature in Ubuntu 23.10 offers improved data protection without the need for passphrases […]
  14. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Thursday, 13-Jul-2023 02:27:04 JST Jarkko Sakkinen Jarkko Sakkinen
    #vtpm user-mode driver #tpm #linux #kernel #keystone #riscv
    In conversation Thursday, 13-Jul-2023 02:27:04 JST from social.kernel.org permalink

    Attachments


    1. https://social.kernel.org/media/9a22529086121634d852710ffdef1a8897ff6da48cec7805304d43153591ed5b.png
  15. Embed this notice
    Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Thursday, 13-Jul-2023 01:29:13 JST Jarkko Sakkinen Jarkko Sakkinen
    i own #Atari #STE with whopping four megabytes of #RAM.
    In conversation Thursday, 13-Jul-2023 01:29:13 JST from social.kernel.org permalink

    Attachments


    1. https://social.kernel.org/media/51f9e163f58c24bad4950695635ea88e99ac8527bcd70a5651297ca2d16516d8.jpeg
  • After

User actions

    Jarkko Sakkinen

    Jarkko Sakkinen

    I'm a Linux kernel engineer with the focus in TEE's and confidential computing. Right now I'm enabling Keystone and fTPM for RISC-V Linux

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          148578
          Member since
          12 Jul 2023
          Notices
          35
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.