Unfaithful Claims: Breaking 6 zkVMs

A zkVM verifier should be faithful to one thing above all else: its public claims. Yet we found six systems where this guarantee breaks. Learn how a subtle ordering bug lets an attacker bypass the cryptography entirely and prove mathematically impossible statements.

OtterSec

Do you remember me talking about this wonderful article? the one where you are taught in detail with source snippets how Linux goes bye-bye when it goes to sleep?
The article has so much in-depth details that it takes a lot of time, considerable inteligencia & knowledge to process. Contrary to others I will not only say it, I will explicitly state it is fascinating and a heavy read.

Take your time to process the article; it's worth learning this in depth, in miniatures detail, all the way down to the sources, so you know what goes on, when the power management or your Linux powered VM, or Linux powered Hardware machine, goes down, hard, inexplicable:

To you it will become explainable!

đŸ–‹ïž #bash #sh #zsh #ksh #csh #tsh #PowerManagement #sleep #hibernate #Linux #POSIX #FOSS #100daysofCode #640DaysOfCode #1024DaysOfCode #programming #GCC #gplusplus #gdb

https://tookmund.com/2024/09/hibernation-preparation

Linux's Bedtime Routine

How does Linux move from an awake machine to a hibernating one? How does it then manage to restore all state? These questions led me to read way too much C in trying to figure out how this particular hardware/software boundary is navigated.