Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:Pakistan has nukes (Score 4, Insightful) 383 383

If "third world" Pakistan can control itself while wielding nuclear weapons, I'm sure Iran can as well. The inescapable fact of the matter is this: The United States does not "militarily" mess with nation possessing nuclear weapons. This fact alone makes the weapons highly desirable.

Didn't stop us from covertly assassinating a high-valued target with a special-ops team.

Comment: Re:Hasn't worked since at least 2008. (Score 1) 40 40

-ftrapv hasn't worked since at least 2008.

...but you're right, the logical thing to do would be to just check for this shit at runtime. Do you want fast code or do you want secure code? I can buy a faster computer, but I can't buy a more secure one.

clang -fsanitize=undefined, since signed integer overflow is formally undefined.

Comment: Operation Downfall (Score 1) 341 341

The number killed was very approximately 100,000. It is plain that not even the majority could possibly have been military personnel.

Clearly. However, the most important thing is to compare the Bombs to the estimated casualties of Operation Downfall--a hell of a lot more Japanese people would have been killed by the Allied invasion.

Comment: This happens every so often. (Score 5, Interesting) 74 74

As another example, in January 2013, I discovered a cheat code in the SNES RPG Breath of Fire 1 that allows you to create a save file at a few key locations in the story. This cheat code sat hidden for about 20 years, and it wasn't until I came along and reverse engineered the game that it showed up.

Link to it: click me. Sorry for the quality; it is a really difficult thing to record when your only recording device is an iPad and there was nobody home at the time. Not to mention how hard it is to do that controller sequence and record with only two hands.

Comment: Common? (Score 1) 323 323

The point is that claiming "things are worse than ever" is pretty silly in a country where it used to be common for people to own slaves.

Except that it was never common to own slaves. Slave ownership was primarily among Southern aristocrats--your average white Southerner wasn't rich enough to afford one.

Still laughed, though. <3

Comment: Signed integer overflow being defined. (Score 1) 427 427

Screw ancient architectures and minor compiler optimizations. I'd rather have my binary math work like all of us were taught in discrete math classes. Not to mention not have my machine pwned by the mob because a programmer didn't realize that their security check was removed for being undefined behavior.

Comment: Signed integer overflow and security holes (Score 1) 427 427

Signed integer overflow is undefined. That is, in C++, overflowing a signed integer is considered to be equally bad as dividing by zero. Combined with modern compilers, this is resulting in exploitable security bugs in many programs.

Programmers have been taught for decades about two's-complement integer arithmetic and how it overflows. As a result, many of us who don't know about signed integer overflowing being undefined are making "mistakes" like assuming that it wraps as we were taught.

The reason that C++ considers signed integer overflow to be undefined is because of non-two's-complement machines. Such machines pretty much don't exist anymore. Why does C++ insist upon keeping such requirements around, when it is wreaking security havoc on everyone else?

Comment: Not all that new, but what is personal? (Score 1) 206 206

As another pointed out, Russia isn't anywhere near the first country to do this; in fact, doesn't the European Union require it Union-wide?

Anyway, I'm most curious how the Kremlin defined "personal". Being that a lot of us are software industry programmers, product managers, etc., it'd be useful to know what kind of changes we need to make to our respective companies' international back-end infrastructure.

Comment: If any questions about the original Xbox come up.. (Score 1) 58 58

...and Andrew/bunnie doesn't answer them, I can. I'm very briefly mentioned in the book under a different Internet name that I'd rather not say here.

I was the person who figured out how to dump the second version of the MCPX's secret boot ROM without having to repeat the HyperTransport bus tap craziness that Andrew did in the first place. Namely, the A20M# attack, which was much easier to do. (If Andrew hadn't done his original attack, though, we wouldn't have had the knowledge necessary to pull off my attack. <3 Andrew)

We kept the A20M# attack secret until the 360 was released, in case another MCPX silicon revision was released. It turned out that Microsoft had, in fact, coded a new MCPX ROM to defeat many of the exploits used to hack Xboxes - they just never released it, probably because it would've cost a fortune for what was then a console in its late stages. We didn't find out about this MCPX ROM update until some people looked into how the Chihiro arcade boards worked in 2014, which showed the new MCPX code in the debug ROMs. The A20M# attack still would have worked on this design - it was an attack on entire secret boot ROM design, not the MCPX ROM's code =)

Myria

In practice, failures in system development, like unemployment in Russia, happens a lot despite official propaganda to the contrary. -- Paul Licker

Working...