• 0 Posts
  • 34 Comments
Joined 2 years ago
cake
Cake day: July 7th, 2023

help-circle
rss
  • I’ve never talked to an Arch user about Linux, so I dunno how toxic their community is. But I do read Arch documentation, and it’s fantastic. Arch’s documentation has (for me, anyway) taken the place that used to be held by the old HOWTOs back in the early days.

    The kind of cooperation required to accomplish this doesn’t speak of a toxic community to me. I didn’t watch the video since I don’t watch YouTube on my phone, but I’m guessing it’s not the Arch community that has issues but annoying teenage “I’m more 1337 than you” jackwads that are the turd in the Linux punchbowl. Those little cretins are drawn to distros like Arch because they like feeling superior to the “normie” users.

    I should know, I used to be like that thirty years ago. Most of us grow out of it after we start getting laid.









  • I don’t see it as irrational. You’re thinking about it the wrong way round.

    Manufacturers buy chips from proven sources, where the chip can be traced back to the fab that made it. The entire system of trust is built on the assumption that the chip designers and fabs are trustworthy and that the shady stuff happens elsewhere in the supply chain.

    When the designers can’t be trusted, it breaks everything. Up until now it hasn’t been a problem except in extremely sensitive areas like military equipment - only governments can force a company to risk everything by compromising their own products. But take the risk away - make it cheap enough to design new microcontrollers - and what’s to stop a chip designer from taking money from (for example) the Russian mafia? IoT is huge, everywhere, and Risc-V is ideally suited for it.


  • I don’t think it’s so much “security by obscurity” as it’s an issue of a much lower bar for chip production. Intentional back doors or malware represent a huge risk for a product line, so manufacturers won’t put them in without someone like the NSA leaning on them. It’s a simple risk/benefit calculation.

    But the risk is much lower if you can snag a processor design off the 'net, make your modifications, send it off to a fab and sell it under a fly-by-night operation. If it’s ever discovered, you take the money and run.


  • I see this sort of thing all the time.

    There’s a disconnect between the time scales for industrial equipment and the time scales for IT and telecommunications. A PLC running a factory might last 30 years, but the software to program and troubleshoot it won’t run on modern operating systems or computers. The company doesn’t want to spend hundreds of thousands of dollars to upgrade it when there’s nothing wrong with it.

    Same with telecommunications - POTS worked for a century, and over the last decade we’ve seen it largely disappear, which makes fire alarm panels everywhere inoperative. We recently ran into an issue where a fire marshall refused to allow anything but POTS and all of the non-end-of-life hardware only supported IP.




  • It might be too outdated to do major services, but it’s still fine for its original use - interfacing with electronic components.

    You could build a weather station, monitor temperature and humidity in your attic and crawlspace, automatically water plants, etc. You don’t need much electronics knowledge for that sort of thing.


  • If I remember right, it was sponsored by DARPA. It was in the early 80s, so it would have been on VAX. It wasn’t the first implementation (there were several prototypes), but it’s the design that stuck; all the major OS implementations of TCP/IP today use the sockets API (if not the source code directly; several identical network vulnerabilities on different OSs are due to the fact that BSD code was free to use and copy).


  • Ah, DEC. Some really cool stuff came out of Maynard, MA.

    A few notable things about DEC:

    • They made computers that were affordable by smaller businesses and universities.
    • The PDP-10 - one of DEC’s only mainframes - was where the bulk of early Lisp development occurred, mostly for AI research.
    • UNIX originated on DEC hardware (before VMS).
    • The team that developed the Alpha (the successor to the VAX) was hired by AMD to develop the 64-bit Athlon architecture (what became X86_64 - i.e. what your computer is probably based on).
    • Intel chose a little-endian architecture for the 8086 because that’s what the VAX used.
    • TCP/IP was developed on UNIX running on a VAX.
    • After the minicomputer market crashed, DEC was bought by Compaq, taken out behind the woodshed, and shot like a dog.