Am I the only one out there using vim _in a terminal emulator_ as a daily driver...
I thought having 1 terminal tab for vim and other tabs to run the code makes perfect sense? No??
| https://twitter.com/@ntrung03 | |
| Blog | https://trungnguyen1909.github.io/blog/ |
Am I the only one out there using vim _in a terminal emulator_ as a daily driver...
I thought having 1 terminal tab for vim and other tabs to run the code makes perfect sense? No??
I've seen folks arguing that good and accurate info can come out of "AI" too, so we can't dismiss it as garbage.
This misses the point entirely.
Even if "AI" "says" something 100% accurate, the provenance is still garbage. It's like a broken clock. It's like waiting for the nazi to say something non-offensive and saying "wow they're at least right about some things".
I wish large influential bodies like the EU would actually go as far as to make this law; once a product is no longer supported, an update should be released that allows full access to its boot components, to allow consumers to be able to develop or flash custom firmware for it at any time
No computer chip is sacred enough to demand full industrial secrecy, especially when you're selling those chips to consumers, that's not secrecy, that's artificial scarcity, and in some ways, planned obsolescence
All of this wastes the abilities and capacities of the high-tech fabs we've built to churn out chips, the only EOL destination it sees is a dispassionate throw into a garbage dump, literally the most wasteful you could ever be with a high-energy product like this
Not to mention the incredible disservice and apathy that does to the sourcing of the materials, which often come at high cost, and not just money
Literally everything about this makes me angry
Summary We propose -fbounds-safety, a C extension to enforce bounds safety to prevent out-of-bounds (OOB) memory accesses, which remain a major source of security vulnerabilities in C. -fbounds-safety aims to eliminate this class of bugs by turning OOB accesses into deterministic traps. The -fbounds-safety extension offers bounds annotations that programmers can use to attach bounds to pointers. For example, programmers can add the __counted_by(N) annotation to parameter ptr, indicating that t...
it sucks to have nuanced views on the internet
“systemd has the right goals but also has poor architecture: i like operating it but i don’t like its underlying design” is so much harder to digest than “systemd good” or “systemd bad”
“sandboxing is good when done in a way that gives users the ability to control how their programs run, and doesn’t have to make your computer locked down like iOS” is harder to digest than “sandboxing good’ or “sandboxing bad”.
“verified boot that lets users control the signing key allows users to verify that the boot sequence is what they want it to be, ensuring that their FDE isn’t compromised; however, most existing implementations give vendors control that should belong to users” is harder to digest than “verified boot good” or “verified boot == DRM”.
it’s hard not to sound like a corporate shill, which is the opposite of what I’m trying to be whenever I start talking about security. Fossbros have given the entire FLOSS community these warped preconceived notions on what sandboxing, verified boot, and even Systemd are and aren’t.
📱Springboard running on QEMU?📱
🍎🍎🍎
SEP emulation anyone?
🔐🔐🔐
🍎🍎🍎
Looks like my Black Hat USA talk recording is now up on YouTube:
“TruEMU: An Extensible, Open-Source, Whole-System iOS Emulator”
Enjoy!