The URL should be changed to the latest version at https://tools.ietf.org/html/rfc8391
Does anyone have a sense of the level of effort required to port something like this to run on Firefox?
Porting this would make for a great starter project if you’re just getting into Firefox extension development!
Depending on your level of experience it would take a competent developer anywhere from 1 to 4 days to complete the port.
The culprit in question tried to do the same thing to a Voice Search Chrome extension in the past.
Wow, what a rant. I’m very sympathetic to “people should be able to control their devices”, but this rant is missing a number of key factors:
In other words, there are clear and obvious reasons (security and basic functionality) why a small management microcontroller like this needs to exist in a laptop (without requiring an NSA conspiracy to insert it.)
At the same time, I totally agree that it would have been great & less problematic if Google had provided a way for advanced users (who understand the associated risks and loss of security) to disable the TPM-like functionality of this chip (ie Android bootloader unlock or older ChromeOS style). Or even better to provision their own signing key. It’s a shame they didn’t do this[*], although not too surprising given the market demand.
[*] It’s worth noting that even if they had done this, the OP wouldn’t be happy because they still can’t audit the rest of the H1 chip’s firmware, build their own, etc. This is a fair enough concern, but it’s hard to see how Google can mitigate that without either finding a TPM-like chip with a fully open source SDK (…), or provisioning two microcontrollers so it’s possible to physically disable the TPM chip entirely but still have a chip to monitor the battery voltage, make the power button work, etc.
The main issue brought up is that this device allows firmware updates without user authorization or clearing user data.
Honestly, part of me would like to see more open-sourcing of these types of security/management chips and ways for knowledgeable users to disable these things. However, it seems that for every user who is genuinely qualified to do these things and decides to do them, there are from 10 to 100 users who can be convinced to go through the unlock process to see some dancing bunnies or something. For every user who is mad that someone else can unlock their system somehow through some Corporate-controlled process, there are 100 users who will forget all of their passwords and get mad that their hardware is now a brick because nobody can help them unlock it. Possibly including the original user mad at corporate backdoors.
One more piece of paranoia still annoying me:
master the I2C bus, on which, among other things, are to be found the sound card’s microphone
Streaming data via I2C (especially on a shared bus with other devices) would still be a massively inefficient way to do this. I’d be surprised if there’s a digital microphone manufacturer who has chosen this over I2S.
Also, I recommend this video that explains a classic paper:
John Myles White on “Fundamental Concepts in Programming Languages” by Strachey:
https://www.youtube.com/watch?v=cO41uoi5cZs
Summary: there’s a lot of stuff we take for granted around the ideas of values and references in programming languages.
If you don’t know about the ARC caching policy, it has the notable distinction of being both relatively recent and also highly deployed. (Usually CS concepts take a long time to be deployed, and I trust deployed concepts more than undeployed ones). This explanation by Bryan Cantrill is nice and entertaining:
Can you cite a source on the high deployment of ARC? https://en.wikipedia.org/wiki/Adaptive_replacement_cache#Deployment seems pretty sparse.
This is entertaining and a technically solid job, but at some point you have to stop calling things like this a DoS attack. 44cm distance with over 100dbA acoustic pressure on an exposed HDD is simply not any real life scenario - you can as well smash it with your boot.
You can get ~130 dBA acoustic pressure at 1m with parametric ultrasonic speakers similar to Soundlazer. Your point stands, but we should be aware of the actual attack distance.
https://eligrey.com