Thierry Laurion

@tlaurion@infosec.exchange
46 Followers
147 Following
72 Posts

A long interview, but a must-watch. Tristan studied at Stanford, interned at Apple, and started a company that got bought by Google where he ended up working on design. He founded the Center for Humane Technology with Aza Raskin, who’s worked at Mozilla and whose father began the Macintosh project. You’ll find them on stage and podcasts together, but this was just several days ago.

https://youtu.be/BFU1OCkhBwo

#ai #agi #asi #bigdata #bigtech #data #llm #ml #privacy #security #surveillance #ubi

AI Expert: We Have 2 Years Before Everything Changes! We Need To Start Protesting! - Tristan Harris

YouTube

I have released a first v0.1.0 of intel_fw to crates.io today: https://crates.io/crates/intel_fw

There will be additional features and fixes coming at some point, but this concludes the work for now.

Feedback and questions are welcome! :)

crates.io: Rust Package Registry

DDoSecrets Insurance - Distributed Denial of Secrets

Help protect upcoming publications against censorship or interference by downloading encrypted

Perhaps the biggest challenge with broad adoption of a LinuxBoot style boot loader is device reinitialization on a kexec reboot. The runtime kernel should have a clean system when it boots. Undoubtedly a lot of work has gone into supporting this with server hardware, less with PCs and even less with embedded devices. Issues here should be fixed, but perhaps in the long-term the duplicate initialization won't be necessary with KHO and LUO?

https://www.phoronix.com/news/Kexec-HandOver-KHO-Linux-MM
https://lore.kernel.org/lkml/2025032058-reassure-veneering-0fdb@gregkh/

Kexec HandOver "KHO" Looks Like It Might Be Ready For The Linux 6.16 Kernel

Being worked on for a while now by engineers from Amazon, Microsoft, and Google has been Kexec HandOver 'KHO' as a means of allowing some kernel state to be retained when Kexec'ing into a new kernel such as for maintenance/security updates

Brutal.

https://ptrpa.ws/nixpkgs-actions-abuse

Had the Nix team rolled out independently signed commits/reviews/builds as my (rejected) RFC proposed, last mile supply chain attacks like this would not be possible.

An OS that will protect anything of value must have strict two party hardware signing requirements on all changes and not place trust in any single computer or person with a decentralized trust model.

Shameless plug, that is why we built Stagex.

https://stagex.tools
https://codeberg.org/stagex/stagex/

Pwning the Entire Nix Ecosystem - ptrpaws's blog 🌸

ptrpaws's blog on reverse engineering, programming, vr finds and miscellaneous stuff.

stagex/packages/core/rust/patches/mrustc-llvm-compat.patch at lance/llvm-bootstrap

stagex - A container-native, full-source bootstrapped, and reproducible toolchain to build all the things

Codeberg.org
https://www.youtube.com/watch?v=5ihrHZpp9-E
Coreboot on the ThinkPad T480 is a very real thing now.
This is not an unfused PoC unit either, it is usable on every BootGuard fused T480, thanks to deguard.
I've also reverse engineered a significant chunk of the T480's EC firmware, and found some fun debug backdoors in there:
Hard-coded key can unlock commands to write to the EC's RAM and MMIO peripherals.
Hard-coded key to decrypt and execute user provided code on the EC.
ThinkPad T480 booting with coreboot

YouTube

I propose a law that forbids companies from claiming copyright, patents or anything else once they end support for their products.

Then we can do a community rebrand of any hardware and reuse it as we please.