@Tanuki I just insulated them this morning
@masklayer you're losing your fawn spots
@cute_weeds nope
@QuestForTori i got really excited for a second and went googling to build a vm :(
This first-person vaporwave adventure game about weird internet culture is my favorite thing I saw at Indiecade. Two days left in the Kickstarter!
https://www.kickstarter.com/projects/445840357/broken-reality-0
@Antifreeze extremely
@abe_e_seedy Internet...
@angrboda @abe_e_seedy but what if your mum were a mobile...?
@abe_e_seedy oh we saw it in boston years back. Its good :)
@rysiek it seems like they are mistaking an attack that tells you only if a page happens to be mapped or not at a given virtual memory address with an arbitrary kernel memory peek. The attack is the former and not very severe or useful.
We’re using the MMU page tables to rebuild the native mosquito population which need remind you is an endanger species!
Here! Educate yourself!
http://www.cs.vu.nl/~giuffrida/papers/anc-ndss-2017.pdf
@rysiek The patches look like they are protecting against the mmu attack only for kaslr when it is useless anyhow and not user space aslr where it is useful.
It is NOT paging out the kernel. This attack is present in amd but not across rings.
The entire article is a fuck. https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5aa90a84589282b87666f92b6c3c917c8080a9bf
@rysiek I’m implying they have no idea what the consequences and probable fixes are of the bug not that they are lying. If they are referencing the MMU timing attack which much of it makes me think they are, then the misleading parts are all of it.
They way they portray it is nonsensical. They dont understand when kaslr is and is not useful....
@rysiek that article is so misleading and ambiguous that i literally cant even. I assume their talking about the MMU timing attack from CCC? That affects EVERY architecture tested. Table look up timing attacks are a thing
Mixie trash
- she / her -