Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:How do you know? (Score 1) 277

Because the squashfs image of OpenELEC is read only and mostly one of the know images already published, the operations you describes could be done on the hacker PC. It can then find a way to generate the hacked image from the original by analyse the difference between the two. This recipe can then be directly applied to the partition of the target device probably without too much processing and memory.

I agree that this is much more work, but maybe not so difficult for a motivated hacker.

Comment Re: How do you know? (Score 4, Informative) 277

OpenELEC FAQ disagree:

What is the SSH login?
Shortcut: #SSH Login
Currently the login into OpenELEC has fixed settings.
  Login: root
  Password: openelec

How do I change the SSH password?
Shortcut: #SSH Password change
At the moment it's not possible to change the root password as it's held in a read-only filesystem. However, for the really security conscious advanced user, you can change the password if you build OpenELEC from source. Also you can consider logging in with ssh keys and disabling password logins.

Comment Re:How do you know? (Score 2) 277

It's possible to remount a file system with new permissions. See the details here:
Or to mount it in a other folder with different permissions.
Or to directly access the partition under /dev/sda1.

To make a read-only file system work as expected you have to use a hardware way to prevent writing to the memory. For example NOR SPI flash memory usually have a write protection pin. Of course that pin must be protected against unwanted operation that could drive it. In that case you can expect having a clean state after a boot. Secure boot is an other method to give the same kind of clean state after boot.

You still have issues that can live in the SDRAM as long as the device will run...

Comment Re:Why is Windows 10 the benchmark? (Score 1) 205

Maybe you should realize that every SDcard, eMMC, WiFi, or Bluetooth chip, contain a processor (generally 32 bits this days) to offload your main CPU.
Seriously, if a main processor with a RTOS will be able to do all by itself, then all peripherals would be virtual with just AFE to convert to/from analog signals.

The reality is that toady even small controllers contain DMA engine, interrupt controller and peripheral state machines good enough to offload the core from most of the communication fast low level details. Look at the implementation details of a Ethernet MAC and PHY for example. Good luck to recreate something like that with just a CPU and a AFE...

Dedicated peripherals are nothing different. Depending of there complexity and performances, a extra CPU/DSP/FPGA could be a far better design than trying to do the same thing with a RTOS on a central processor and a AFE. Not counting that the vast majority of the industry is going more and more toward highly integrated peripherals chips that integrate there own processor, and all of that for a very low price due to the massive production scale.

Even if your smartphone PCB let you think that there is just a single processor chip with his main cores because of the marketing, in reality it probably have something like a half dozen of extra dedicated CPU or DSP running all the peripherals fast low level details, not counting all the DSP like cores of the GPU itself...

Comment Re:Theory vs. Practice (Score 1) 391

And this is also very clear:

sub foo {
        $var = 22;
        $anothervar = 23;
        if ($var == $anothervar) {
                return $var1;

While wasting a line for each open brace is not so a problem for the functions, this make code really annoying to read if there is a lot of consecutive if-then blocks. K&R coding style is widely used for a reason.

Comment Re:Theory vs. Practice (Score 1) 391

"At lest one study" is nowhere near to be an argument. You can probably find "at least one study" that claim whatever you wants on a so width subject as the style used by individuals. I can either say that at least 3 well known projects (Linux, Git, PHP) uses 8 spaces tabs for indentation.

Now the cool stuff about tabs is that it allow to be very easily adjusted in a perfectly reliably way by the user editor without touching the file content.
I will add that 8 spaces tabs make code with too many indentations look wrong faster, and I found this a good feature in my experience.

Comment Re:Collusion is illegal (Score 1) 585

Probably true from the technical point of view, but not completely certain as the deeper integration into the CPU chip of the features that was before into the north/south bridges or peripheral chips could be implemented in a way to no longer support some legacy compatibility features required to support old OS drivers.

Well, as long a I can run recent Linux on them, it's probably on good thing in the long term as the original PC architecture is really out of date. But new processors will not just run Windows, OSX or Linux. There is a good chunk of specialized OS (many for realtime embedded systems) that will need to run on them. I doubt that there all have the drivers ready for a such big change.

Slashdot Top Deals

I have a theory that it's impossible to prove anything, but I can't prove it.