Forgot your password?
typodupeerror

Comment No. (Score 1) 1

The answer is "no" because literally nothing fits your bullshit requirements list because if you really have been working on embedded systems then you already know this to be true. You're basically doing a "cheap, easy, and fast" selection and telling people you need all three.

If you want embedded, you get embedded.
If you want to run a big OS, you get one that will run a big OS.
If you want to pretend these are all the same thing then you can fuck off.

Submission + - Nissan Leaf drivers voice anger over app shutdown (theguardian.com)

Alain Williams writes: Owners of some Nissan Leaf electric vehicles are angry after the carmaker announced it would shut down an app that lets them remotely control battery charging and other functions.

Drivers of Leaf cars made before May 2019 and the e-NV200 van (produced until 2022) have been told that the NissanConnect EV app linked to their vehicles will “cease operation” from 30 March. This means they will lose remote services, including turning on the heating, and some map features.

Experts said they expected other drivers to experience similar problems in future as “connected cars” – vehicles that can connect to the internet – get older.

Comment Re:A worthy adversary! (Score 1) 30

While plausible, consumer devices are generally a race to the bottom so it's unlikely to become the norm. A far more effective tool would be simple regulatory requirements for new updatable devices with embedded firmware that lack an isolated management interface. Maybe throw in a shadow stack requirement to thwart ROP. It would certainly shake up the MCU market because XIP isn't universally supported and shadow stacks are unheard of.

Comment Re:A worthy adversary! (Score 1) 30

I wonder what the feasibility would be of making volatile memory non-executable.

I see no reason that it couldn't be but stack memory could still be hijacked. ROP would still be an option.

the cost of routers being a little higher for temporary-user-updating-enabling (switches) seems like it's worth it overall.

It 100% is worth it for the consumer but vendors don't see any benefit because it costs more and consumers are dummies that don't understand the value.

Comment A lesson. (Score 4, Insightful) 112

This should be a lesson to everyone that using petroleum-based energy makes you subject to the whims of foreign dictators If you are relying on an external source for fuel (or it's refinement) then you are dependent on everything between you and that external source.

Actual energy independence means you aren't subject to interruptions by a physical supply chain. If you are using a fuel then you never truly have energy independence.

Note: Idiots who want to tell me that sunlight can blocked, the wind can be stopped, or the Earth can be cooled are either talking about science fiction or literal mass extinction events which isn't relevant to this topic since a supply chain disruption (mass panic) is nearly guaranteed in those situations.

Comment Re:A worthy adversary! (Score 2) 30

if such routers had unalterable firmware (such as from the PROM days), could they still be hacked in such ways?

Yes. If you can find a trivial error in the binary that enables you to write to RAM which is then executed, that's arbitrary code execution. This can be used to bootstrap receiving a malware package which would overwrite more RAM. XIP (execute in place) firmware (which is executed from read-only memory) could help reduce the attack surface but not eliminate it. However, consumer grade vendors use compressed filesystems (usually SquashFS) to save money on flash memory which makes using XIP impossible. Even if they did, RAM only attacks occur regularly on PCs so it would be unsurprising to see it used when needed.

Ultimately, the significant difference is that the malware would be wiped out upon router reboot. However, since it cannot be updated, the vulnerability could never be removed and thus, anyone who who could find your device would be able to compromise it. The solution here is to have a physical switch that needs to be pressed in order to make the memory writable for a brief period. Of course, that more hardware and costs more money, so vendors for consumers won't do it. This is generally solved in the tech sector by having a BCM which is only accessible through a secondary and isolated work.

Comment A worthy adversary! (Score 3, Interesting) 30

One of the most salient features of KadNap is a sophisticated peer-to-peer design based on Kademlia (PDF), a network structure that uses distributed hash tables to conceal the IP addresses of command-and-control servers.

For the unaware, distributed hash tables (DHT) are regularly used for file-sharing applications, not the distribute files but to find other computers that are sharing files. The downside of DHT is that it's "slow" meaning it can take several minutes for a message to permeate the network.

Far too often, it seems like cyber criminals are too dumb to be effective because you almost never hear about P2P infrastructure when it comes to botnets. They just keep putting up obvious C&C points that just get taken down, time and time again. When I read this exact paper years ago, it seemed obvious to me that this was the perfect to improve the resiliency for secret/illegal networks. Despite that, it's almost never used!

Don't get me wrong, they'll still get taken down but it will be more of a challenge.

Submission + - CEOs worry about an AI bubble, but most still plan to ramp up spending (techspot.com)

jjslash writes: Even as concerns grow that artificial intelligence could be the next tech bubble, corporate leaders are continuing to pour money into the technology. A recent survey of 100 CEOs by KPMG found that while one in four believe an AI bubble may exist, nearly 80% still plan to allocate at least 5% of their companies' capital budgets to AI initiatives this year.

Despite all this investment and commitment to the technology, about three-quarters of large-company CEOs said generative AI might have been overhyped over the past year, but its true impact over the next five to ten years is likely underappreciated.


Slashdot Top Deals

"Just the facts, Ma'am" -- Joe Friday

Working...