@Sylvhem @bea the THERAC-25 was a radiation therapy machine. Sloppy concurrency programming led to race conditions which allowed operator error to put the machine into a dangerous state. On earlier versions, hardware interlocks prevented it from firing in this state, but the hardware safeties were replaced with software to save money. Several people got massive overdoses, and a few died.
Notices by Zimmie (bob_zim@infosec.exchange)
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 22-Feb-2025 10:57:30 JST Zimmie
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Friday, 17-Jan-2025 09:07:27 JST Zimmie
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 11-Jan-2025 21:17:29 JST Zimmie
@alice Yeah, that sounds like a Bob thing to do.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 28-Dec-2024 00:00:30 JST Zimmie
@dalias @baldur Sure, but my point is LLMs are statistical grammar. They get syntax right almost all the time, but they don’t make any attempt at semantics.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Friday, 27-Dec-2024 23:49:29 JST Zimmie
@dalias @baldur We’ve known what is currently sold as “AI” is a dead end since at least 1956 with Chomsky’s paper Three Models for the Description of Language.
I can’t imagine how frustrating it must be for him having published on the topic for twice as long as a lot of the proponents of LLMs as AI have been alive.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Thursday, 05-Dec-2024 11:53:48 JST Zimmie
@gpilz @evacide Vaccine mandates are hard to justify under a framework of absolute bodily autonomy, but the others are easy.
Drug prohibitions should be lifted. Drug abuse is a public health problem and should be handled in that framework.
Conscription should not only be stopped, it should be explicitly prohibited. That “selective service” lasted so long should be seen as a national embarrassment.
Circumcision of infants should be illegal. It’s not the parents’ call. If an adult wants to be circumcised for religious reasons, that’s their decision to make.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Thursday, 05-Dec-2024 05:13:34 JST Zimmie
@evacide @Blort @pluralistic We simply need tech companies to invent a new number you can only use if you believe in truth, justice, and the American way!
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Wednesday, 04-Dec-2024 07:20:21 JST Zimmie
@ArchaeoIain @davidaugust > Miscarriages of justice can be dealt with by the courts.
Which courts? Specifically which ones? And where do we go when those fail us? And where do we go when *that* court fails us? It’s not practical to have an infinite series of courts for appeals, so it has to end somewhere. What do you do when the final court is hopelessly corrupt?
Consider the crime of “felony murder”, which is also known as “not murdering anybody at all”. The fact anybody is in prison over this is inherently a miscarriage of justice, yet it’s very rarely fixed by the courts.
Edit: looks like the equivalent legal concept in Australia is “constructive murder”. In the US, if you are involved in any way with a felony (even an unwitting accessory) and someone dies (regardless of who or of circumstances), you can be charged with murder. Of course, if you actually kill someone, they charge you with real murder, not with “felony murder”. Stealing as little as $200 is a felony in various states.
Pardon power is good, and isn’t used nearly often enough.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Tuesday, 19-Nov-2024 13:21:04 JST Zimmie
@hisham_hm @mwl People really take the wrong thing away from the trolley problem. It isn’t directly about what you personally would or should do. Instead, it’s like an axis of comparison for ethical frameworks. It’s one of the extremes where differences (and sometimes similarities) between them become more apparent.
Like how Schrödinger’s cat isn’t saying the cat is both alive and dead, it’s taking a model we have for quantum effects and showing how, when taken to extremes, it produces results which are patently absurd.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Tuesday, 19-Nov-2024 10:09:56 JST Zimmie
@cR0w @jornane @The_Turtle_Moves @dalias I share this every time “user education” is brought up as a solution to phishing. It’s the first two lines of an email sent by the security team at my company at the time.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Sunday, 13-Oct-2024 07:52:44 JST Zimmie
@ryanc A fabric which stretches in one direction is said to have “two-way stretch”. A “two-way mirror” is only a mirror from one direction. Almost every instance of a term with “way” in it is mind-numbingly wrong.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 12-Oct-2024 04:34:28 JST Zimmie
@ryanc @kajer @davidmc @zesty In that case, if the fuse blows, there’s current.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 12-Oct-2024 03:38:45 JST Zimmie
@ryanc @kajer @davidmc @zesty It probably does, just not labeled that way. Current mode is low impedance. The downside is if your multimeter isn’t fused, measuring wall current with current mode will probably show ~15A for about five milliseconds, then your multimeter melts and/or explodes.
This is the only real downside to the demise of incandescent bulbs. Loose sockets are cheap. You could stick one plus a switch on a board, hook the mystery wire to the switch, the other end of the switch to one terminal on the light socket, and neutral (or earth, if neutral isn’t available) to the other terminal of the socket.
If the bulb doesn’t light, there’s voltage on the wire, but not much current. If the bulb lights, there’s current.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Wednesday, 25-Sep-2024 20:27:51 JST Zimmie
@delegatevoid @LukaszOlejnik Upper limits on passphrase length are mostly about closing a possible resource exhaustion vector on the authenticating system. If you hash it all down to 64 bytes, there’s no point dealing with passphrases longer than 128 characters. Further characters don’t add any further entropy, but if you have no upper bound, some knucklehead is going to make your server hash the entirety of War and Peace over and over.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Monday, 16-Sep-2024 16:28:47 JST Zimmie
@lmorchard @WhiteCatTamer @nex @alexhammy It would be really challenging. For example, I have no idea how you would make the word “house” sound blue.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Wednesday, 11-Sep-2024 08:06:07 JST Zimmie
@Di4na @clacke @makdaam @hendric That doesn’t seem at all the case to me. The Therac-25 report had quite a few big lessons.
• Data races can exist anywhere shared mutable state exists. This was poorly understood at the time. Language people have taken this to heart with copy-on-write data structures, static analysis for control flow, and more recently with proof-based data access validation as seen in Swift 6. This kind of issue is why those capabilities exist, and why you shouldn’t just turn them off to silence warnings.
• Software interlocks are strictly worse than hardware interlocks. They have more opportunities to fail in non-obvious ways.
• Safety-critical software has become a much more formalized discipline, finally matching the rigor of real engineering. For example, techniques were developed to prove a given program is free of bugs by proving it exactly matches the behaviors defined by its formal specification (no undefined behaviors, and no missing behaviors).
• Reported issues should be treated as real until you can prove what happened. Part of the reason the Therac-25 hurt so many people is the company brushed off the early issue reports.A lot of the company-culture problems the incidents exposed are still major issues today. The company thought their software was perfect, and they didn’t include it in their analysis of potential failure modes. They didn’t have any independent review of their code. They shipped straight to production (the hardware and software were never tested together outside customer installations). They didn’t document error codes and didn’t differentiate between minor errors and safety-critical errors.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Sunday, 01-Sep-2024 23:57:19 JST Zimmie
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Sunday, 25-Feb-2024 00:51:42 JST Zimmie
@ryanc IPv4 numbers are really poorly specified. I personally use notations other than dotted decimal (especially hex integer) much more than I use dotted decimal because it’s so much easier to do math with them. For example, they greatly simplify matching expressions like this. They also help when dealing with networks which aren’t byte-aligned.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Tuesday, 09-Jan-2024 04:05:09 JST Zimmie
@Oneironaut @admford The visible antenna is either Bluetooth or WiFi. There could be a cell radio we can’t see, but it’s common for these to connect to a separate cell phone hidden a short distance away. That minimizes the risk the skimmer contains information which could be tracked back to the criminal, making it effectively disposable.
-
Embed this notice
Zimmie (bob_zim@infosec.exchange)'s status on Saturday, 06-Jan-2024 09:06:05 JST Zimmie
@ryanc I’m a fan of FreeBSD, so I’ll point to the Juniper EX2300-24p. 24x1g copper ports with 370W PoE budget, 4x10g SFP+ ports. $100 used.