/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Hector Martin

@marcan42
33 posts
2022-08-30
Its owner runs it under a company name that is a direct reference to the Holocaust, and also provides hosting services to officially recognized terrorist groups. He also personally reposted the Christchurch massacre manifesto and live video. So yeah.
2022-08-30 View on X
Protocol

Cloudflare is facing growing pressure for providing services to Kiwi Farms, a forum with a long history of harassment; Cloudflare remains silent on the matter

Hello, and welcome to Protocol Enterprise!  Today: why Cloudflare finds itself yet again under fire for doing business with communities of hate …

Reminder that @Cloudflare are *still* providing their services to Kiwi Farms, a hate and harassment site that openly doxes and attacks vulnerable people and which is directly responsible for multiple suicides. https://en.wikipedia.org/... #DropKiwifarms #CloudflareProtectsTerrorists
2022-08-30 View on X
Protocol

Cloudflare is facing growing pressure for providing services to Kiwi Farms, a forum with a long history of harassment; Cloudflare remains silent on the matter

Hello, and welcome to Protocol Enterprise!  Today: why Cloudflare finds itself yet again under fire for doing business with communities of hate …

2022-06-25
Ha, a DCP-based exploit that jumps from userspace to DCP and back to the kernel. Cute. Remember what I said about M1 coprocessors not being able to pwn the system? That's assuming your driver doesn't implement “sudo pwn the system” like Apple's does 😅. https://googleprojectzero.blogspot.com/ ...
2022-06-25 View on X
TechCrunch

Google details the commercial spyware Hermit, used in Kazakhstan and Italy, targeting Android and iOS; the iOS version has six exploits, including two zero-days

Saturday, June 25, 2022 // (IG): BB //Weekly Sponsor: Dataminr Deeba Ahmed / HackRead : ISPs Helping Attackers Install Hermit Spyware on Smartphones- Google Sergiu Gatlan / Bleepin...

TL;DR the DCP firmware interface design is insane, and none of this surprises me given what Apple did here. Thankfully, in exchange for having to deal with the AP side of the insanity from scratch, we also get to implement it properly from the get-go.
2022-06-25 View on X
TechCrunch

Google details the commercial spyware Hermit, used in Kazakhstan and Italy, targeting Android and iOS; the iOS version has six exploits, including two zero-days

Saturday, June 25, 2022 // (IG): BB //Weekly Sponsor: Dataminr Deeba Ahmed / HackRead : ISPs Helping Attackers Install Hermit Spyware on Smartphones- Google Sergiu Gatlan / Bleepin...

Apple intends for coprocessors not to be able to pwn the system and vice versa, so there are two, possibly three vulnerabilities here: - The DCP vuln allowing the AP to take over - The DCP driver vuln allowing DCP to take over - Apple exposing DCP directly to userspace
2022-06-25 View on X
TechCrunch

Google details the commercial spyware Hermit, used in Kazakhstan and Italy, targeting Android and iOS; the iOS version has six exploits, including two zero-days

Saturday, June 25, 2022 // (IG): BB //Weekly Sponsor: Dataminr Deeba Ahmed / HackRead : ISPs Helping Attackers Install Hermit Spyware on Smartphones- Google Sergiu Gatlan / Bleepin...

The Project Zero blogpost is wrong about this detail. DCP only needs to access a few register blocks, for which it uses a terribly-designed API that lets it specify the physical memory address to map. We knew it was dumb, so we implemented an allowlist. Apparently Apple didn't. https://twitter.com/...
2022-06-25 View on X
TechCrunch

Google details the commercial spyware Hermit, used in Kazakhstan and Italy, targeting Android and iOS; the iOS version has six exploits, including two zero-days

Saturday, June 25, 2022 // (IG): BB //Weekly Sponsor: Dataminr Deeba Ahmed / HackRead : ISPs Helping Attackers Install Hermit Spyware on Smartphones- Google Sergiu Gatlan / Bleepin...

2022-06-24
The Project Zero blogpost is wrong about this detail. DCP only needs to access a few register blocks, for which it uses a terribly-designed API that lets it specify the physical memory address to map. We knew it was dumb, so we implemented an allowlist. Apparently Apple didn't. https://twitter.com/...
2022-06-24 View on X
TechCrunch

Google details the commercial spyware Hermit, used in Kazakhstan and Italy, targeting Android and iOS; the iOS version has six exploits, including two zero-days

Zack Whittaker / TechCrunch :

Ha, a DCP-based exploit that jumps from userspace to DCP and back to the kernel. Cute. Remember what I said about M1 coprocessors not being able to pwn the system? That's assuming your driver doesn't implement “sudo pwn the system” like Apple's does 😅. https://googleprojectzero.blogspot.com/ ...
2022-06-24 View on X
TechCrunch

Google details the commercial spyware Hermit, used in Kazakhstan and Italy, targeting Android and iOS; the iOS version has six exploits, including two zero-days

Zack Whittaker / TechCrunch :

TL;DR the DCP firmware interface design is insane, and none of this surprises me given what Apple did here. Thankfully, in exchange for having to deal with the AP side of the insanity from scratch, we also get to implement it properly from the get-go.
2022-06-24 View on X
TechCrunch

Google details the commercial spyware Hermit, used in Kazakhstan and Italy, targeting Android and iOS; the iOS version has six exploits, including two zero-days

Zack Whittaker / TechCrunch :

Apple intends for coprocessors not to be able to pwn the system and vice versa, so there are two, possibly three vulnerabilities here: - The DCP vuln allowing the AP to take over - The DCP driver vuln allowing DCP to take over - Apple exposing DCP directly to userspace
2022-06-24 View on X
TechCrunch

Google details the commercial spyware Hermit, used in Kazakhstan and Italy, targeting Android and iOS; the iOS version has six exploits, including two zero-days

Zack Whittaker / TechCrunch :

2022-03-09
M1 Ultra lol. Marketing go brrrrrr
2022-03-09 View on X
AnandTech

A deep dive into Apple's M1 Ultra: two M1 Max dies combined into a single chip, 800GB/second memory bandwidth, 64 GPU cores to outperform the RTX 3090, and more

As part of Apple's spring “Peek Performance” product event this morning, Apple unveiled the fourth and final member of the M1 family of Apple Silicon SoCs, the M1 Ultra.

Called so far: ✅ M1 Max ×2 = M1 Ultra ✅ M1 Max ×4 = <nonsense> ✅ Mac Mini Pro (*not* Mac Pro) = Mac Studio Maybe I should get into the Apple speculation business.
2022-03-09 View on X
AnandTech

A deep dive into Apple's M1 Ultra: two M1 Max dies combined into a single chip, 800GB/second memory bandwidth, 64 GPU cores to outperform the RTX 3090, and more

As part of Apple's spring “Peek Performance” product event this morning, Apple unveiled the fourth and final member of the M1 family of Apple Silicon SoCs, the M1 Ultra.

Reminder that I also called what people are calling the “Mac Studio” with M1 Ultra quite a long time ago (which I called the Mac Mini Pro with M1 Max ×2, but same idea). Let's see.
2022-03-09 View on X
AnandTech

A deep dive into Apple's M1 Ultra: two M1 Max dies combined into a single chip, 800GB/second memory bandwidth, 64 GPU cores to outperform the RTX 3090, and more

As part of Apple's spring “Peek Performance” product event this morning, Apple unveiled the fourth and final member of the M1 family of Apple Silicon SoCs, the M1 Ultra.

Heh, interesting how they mapped the ATC ports. Makes sense. I guess on the M1 Max version those type C ports are the same external controller in the 4-port iMac, on the M1 Ultra they're obviously internal ATC.
2022-03-09 View on X
AnandTech

A deep dive into Apple's M1 Ultra: two M1 Max dies combined into a single chip, 800GB/second memory bandwidth, 64 GPU cores to outperform the RTX 3090, and more

As part of Apple's spring “Peek Performance” product event this morning, Apple unveiled the fourth and final member of the M1 family of Apple Silicon SoCs, the M1 Ultra.

Reminder that I also called what people are calling the “Mac Studio” with M1 Ultra quite a long time ago (which I called the Mac Mini Pro with M1 Max ×2, but same idea). Let's see.
2022-03-09 View on X
Engadget

Apple details M1 Ultra, replacing the M1 Max as the top M1 chip, with 114B transistors, 128GB of unified memory, 16 performance cores, and four efficiency cores

yet it looks like a single piece of silicon to software, so apps benefit from its [...] capabilities without requiring any additional work from developers” The mad lads actually di...

Called so far: ✅ M1 Max ×2 = M1 Ultra ✅ M1 Max ×4 = <nonsense> ✅ Mac Mini Pro (*not* Mac Pro) = Mac Studio Maybe I should get into the Apple speculation business.
2022-03-09 View on X
Engadget

Apple details M1 Ultra, replacing the M1 Max as the top M1 chip, with 114B transistors, 128GB of unified memory, 16 performance cores, and four efficiency cores

yet it looks like a single piece of silicon to software, so apps benefit from its [...] capabilities without requiring any additional work from developers” The mad lads actually di...

M1 Ultra lol. Marketing go brrrrrr
2022-03-09 View on X
Engadget

Apple details M1 Ultra, replacing the M1 Max as the top M1 chip, with 114B transistors, 128GB of unified memory, 16 performance cores, and four efficiency cores

yet it looks like a single piece of silicon to software, so apps benefit from its [...] capabilities without requiring any additional work from developers” The mad lads actually di...

2022-01-27
Sigh. We need to stop writing security-critical code in C. https://twitter.com/...
2022-01-27 View on X
BleepingComputer

Researchers find a 12-year-old vulnerability in Polkit that local attackers can use to gain root privileges on all major Linux distributions; an exploit is out

2022-01-26
Sigh. We need to stop writing security-critical code in C. https://twitter.com/...
2022-01-26 View on X
BleepingComputer

Researchers find a 12-year-old vulnerability in Polkit that local attackers can use to gain root privileges on all major Linux distributions; an exploit is out

A vulnerability in Polkit's pkexec component that is present in the default configuration of all major Linux distributions … Source: Qualys Security Blog .

2021-08-19
Also, apparently Apple's neural network, by virtue of having 200+ (!) layers and due to floating point rounding issues, actually produces wildly different hashes on different hardware (9 bits difference between iPad and M1 Mac!). That's... garbage. That's 9 bits of match noise.
2021-08-19 View on X
VICE

Apple says NeuralHash flaw found by researchers in CSAM detection system was in a generic version of the software and not in the final version it plans to use

Apple said the version of NeuralHash analyzed by researchers is not the final version that will be used for iCloud Photos CSAM detection.