Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

★ Quad-core MIPS64 FOSS laptop ★

Name: Anonymous 2012-06-22 19:10

If I had a YeeLong-8133 I would cuddle with it every night before going to sleep.
If I had a YeeLong-8133 I would code in MIPS64 assembly every day.
If I had a YeeLong-8133 I would print out x86 assembly listings on toilet paper and wipe my anus with them.

We're all waiting, Lemote.  I'm not buying any other laptop; I demand a free open-source non-treacherous BIOS.

Name: Anonymous 2012-06-22 19:22

implying Chinese electronics are not bugged and have no hardware backdoors

Name: Anonymous 2012-06-22 19:24

If I had a touhou I would cuddle with it every night before going to sleep.
If I had a touhou I would 1cc DoDonPachi every day.
If I had a touhou I would print out feminist propaganda on toilet paper and wipe my anus with it.

We're all waiting, ZUN.  I'm not getting any other fiancée; I demand a 2D non-treacherous girlfriend.

Name: Anonymous 2012-06-22 19:27

>>2
hardware backdoors
that's more infeasible than you getting laid.

Name: Anonymous 2012-06-22 19:27

I remember reading a nice detective story about a motherboard that had barely detectable hardware backdoors in it.  It was supposed to be an exact copy of European-made prototypes, and it was, except for a fucking pile of extra code that snooped on users.  It would go unnoticed if there wasn't a bug somewhere at that code that revealed the whole scheme to a researcher.  AFAIR the snooping code was the real dom0 (or how this thing is called), and it set up a fake dom0 that looked exactly like the real one so that it could snoop merrily without worrying about white devils ever finding extra resident code in their OS.

Does anyone remember what that was?

Name: Anonymous 2012-06-22 19:49

>>5
I'm sure there's a neckbeard with a digital analyzer who will take care of that.

Name: Anonymous 2012-06-22 20:06

nice detective story about a motherboard
Impossible!

AFAIR the snooping code was the real dom0 (or how this thing is called), and it set up a fake dom0 that looked exactly like the real one
https://www.youtube.com/watch?v=hkDD03yeLnU

Name: Anonymous 2012-06-22 20:21

Who gives a fuck? Seriously? Just get a Thinkpad.

Name: Anonymous 2012-06-22 21:05

>>8
I don't know about you, but my freedom and privacy matter.  I heard North Korea has a place just for you.

Name: Anonymous 2012-06-22 21:15

>>9
6/10 not bad.

Name: Anonymous 2012-06-22 21:24

>>10
I was serious.

Name: Anonymous 2012-06-22 21:46

>>2
If they sell thousands of the same machine, what's stopping thousands of people testing this machine for and treachery?

>>8
How about having the ability to control your machines any way you want at your own pace? The non-free BIOS problem is the last major puzzle of self-sovereignty in computing.

Name: Anonymous 2012-06-22 21:48

If it ain't MIPS, it's crap!

Name: Anonymous 2012-06-23 6:41

I'd buy one but they're way too expensive for the shitty performance  and build quality they offer.

Name: Anonymous 2012-06-23 7:27

>>6
No, it was a bitch to detect and identify.  Thu guy who wrote everything up had to compare processor cycles vs wall clock on USB operations (or something like that) microseconds on a prototype and a serial MB.

Name: Anonymous 2012-06-23 7:33

>>14
They haven't been released yet.

>>15
It's going to be pretty hard to hide it in a computer where all the firmware is FOSS.  Treacherous network packets don't just appear out of thin air, and they can be detected.

Name: Anonymous 2012-06-23 8:35

>>5
Do you mean fictional detective story, or did this actually happen?

Name: Anonymous 2012-06-23 13:11

>>17
Actually happened, there was a report with photos of the motherboard, debugging logs, letters to law enforcement etc.

Name: Anonymous 2012-06-23 14:30

>>18
Then find the damn source, because I sure can't

Name: VIPPER 2012-06-23 15:13

Free Open Source Software laptop!

Name: Anonymous 2012-06-23 15:42

Still waiting, Lemote.

Name: Anonymous 2012-06-23 16:03

Name: Anonymous 2012-06-25 12:04

蝥蜙㎉荐㘂ኘ隗݄㍐褣⢄⡴炃ԕ禄➔瑗ĸ攃炈甲䍖ᝥ钃┶䉶ង顶晁霳䆐䄲䍨╩ƒ啥⁰栙螖襩䤀ޖ⒓⑂饘䐤ၳ⎈䐣喇獳祵ᤀ卣坁錃ᦗ萳䑤倔钀咀䐰㕇❘醔╤֑ስ錶ل灘➐⒕戨猴䝱䊓妕㥅街ࡱ蚀⦙琕䜖鍡␢蠄䠴㍠颖茙ᄵ楱慁ٓ朄⡃膉䠒霢靖‷⦕奒ݤ⒂慇ঈᅇ卂䄕猈杔砸錦ባ蘇㤂换⌦刔碓灀䔸琲葰㎈聶㕗࠵䞉捈邆㘹ご扒ᄸ戇࠰昁斒ܳ碈̂䍳剩ጃ蔸敹銖⥒ᕢ顤蠐圥蝃㕓妗♹ቶဳ③坢霘ᢐΖ萓炗撀逗څ⥉院ᢙ̲䕐處ॷ䉀Y㉧䚔㉢獓㡘䔅‰隃夷䠠瘓⊖瘑睱砑ғ锶ѕ঒膐桦ᝐ斁偡䜐猒䍥䍤颕ጹ䀩偐ᑙ㕕蒘琇䁆⌸噙祣⡠䉕⤘攵垕瀙療蘳捵皔灅㝸陨脲ň⍣Ͱ┕ࡧ萇锇䥡癤托蠖遰ࠓ㥐䠕䝐憇禒⤥坈ॳ礆㘒鍅᝹霕靴晔镦桙▄〃⍙荰搆儶⅕ቲ抁䘱外䜱荄傘圖悗捳聦舖桥ɠ☸襣✙桙▓ጸ偑⌷蜢b傗敕

Name: Anonymous 2012-06-25 12:24

ᙢ档饔靸Ե茹䍈祗奅⒉耢瘴᤹℃林ሑ塠薑᡹㔩➃䖔瘖㘱㥰ٗ㤄邅䞆剧ͷ䐐ᄠ楇䑙ᤔ啂祑耆璕朓䕕╉ॗ㎀杤違攉ņ猥暓݁鄶瘇ԉ荸邘䤱㥣ᐐ禉襨癢⑆鈸钙革ទទ鑶ᕈ蕐遰ㄖ焤杹'㒉禗爥ᡦᎆ䙣攵鑲ȑ䖖敤䙗у瀖㡷㖑餖瘩嘆≠遖ᄢ蕇祢䞂☩境㖅蜩匵℣蜕鄖睘項視暄葒愡㒔┗順ᑓ㈹ᤃこ℣ͤሔ艸㚉挷戓嘠历楣銓䡘䐒㥹啰甀掑鑒♣ᦕ牆祅·㙢䖙愁㙖䕘Ѱ蝖㌅襗圸唦碗㑷癉腡ɗ聖ࡆ鍣㌰薄ቡ㞖❢䦓莂蠐鞇悉⍣聑䠆戸ᐑݵᅐ䑇刢ᘕ厖甔ԣ㡔圴ᒕᒆ䄤蠲啙⑤∴ᤱᜀ㄂፰摨♡煦㜕③䌧⥠坣䐉ሱʇ䚘䜕䎒゗锤晃ᙓ楦錕ࡰ䍈ፓၶㅗ挕䈐Ը顨镧㝴遠搵砃喘奶┳蕉䁴鞆栧楧禂㘧當钓挗鑴癹㥶圶䜔⍃愢䉉啡蒔瀴倲耙ᔄ㔲锔霨颁╱㘤∥㡔ᅙ题朒ܡ癨┰琤硰鈴霶☆榙ᦘ恦ဳᦓ፳܆㘈㍔饂䐳怂㑓።㜓璅䁁ձ劇

Name: Anonymous 2012-06-25 12:41

枓甅琵兗᠂顨衩ᅲ遥炇呵坒爃䖐Ňij䅰㉠楁蠢ㄶ᠘㘷梔傄ᡃ畵牗⌒蝠锁倷㢕晴͑艸礈頷镶则ሳ妀≇蕵ℂą䤨攗ܣ恔碁ቅ䄨蝣Ġ㊙う锲䐷Ŷဴ҅чↂ遦⠦✱偨扵ᢈ䜥ㅐ─晷䢒┅ဲ璃聣⡉饨茳蘦爨莔㥶靉劂样ㅔ⑈蕣畑捥爀䄸镀႘癶摩蒇᝶偰㠐䔁␉頁ᑑ&饀饕捱外杹∣砖皒摤镀鐹ℴ㍂捳坵搳鍇畲钓灑攠镱x杀爒剖⌨ቁ䌰艂㑑甙➄陗ᄱ挒㞙ƈቤᜇ荖ቦ㕅先〔牣䑖摥変衂⑩鄆锩靧碓⡱㝄镕⢇㉁␧̧袕睂⑸㉇↓瀰ሶ⑆㑓卒獐▅啓Ѕ☦⌵啓䐷࠴⚗隇ᅈ蠵G聀䕠斖ॣᚖТ梈逖̂昁祵墕∀襴愖眢⑶䢆ࠈ咑爷猲夢疆礡畡饸ኃだ脷蜷镘㚐獉䘘ᤄ怵皂愖妕㖓蕇䀙呒䁉䕡噣㊘⍷䜦ጡ瀒ខ玑阃怘蝩ᦁ儑薄逇ፁ挡↖䝁ံ憃敒ᙸ⍂睸虩疒夈䥵鈅捈顣楷ぷ掅坓陑Ŗ瞈靐牧扠斐块蔢䥦ጰ葇嘒煥ひ䄳茅㘆ㄅ䤄暓圠

Name: Anonymous 2012-06-25 12:55

Name: Anonymous 2012-06-25 19:46

>>26
I'll perform some checks once I get one.  I strongly doubt the Chinese would put spyware in a FOSS laptop that they would intend to sell medium-/large-scale; it would be very risky for the sales if it got discovered (millions of invested $$$ lost).

Name: bampu pantsu 2012-06-26 2:58

bampu pantsu

Name: Anonymous 2012-06-26 5:37

>>27
I strongly doubt they would not.  I once bought a set of Chinese-made kitchenware and all of the items had microphones embedded into them, sometimes accompanied with tiny cameras!

Name: Anonymous 2012-06-26 19:38

http://en.wikipedia.org/wiki/Loongson#Hardware-assisted_x86_emulation
Loongson 3 adds over 200 new instructions to speed up x86 instruction execution at a cost of 5% of the total die area. The new instructions help QEMU translate x86 instructions by lowering the overhead of executing x86/CISC-style instructions in the MIPS pipeline. With added improvements in QEMU from ICT, Loongson-3 achieves an average of 70% the performance of executing native binaries when running x86 binaries from nine benchmarks.

It can run x86 code at near-native speed, too?

Name: Anonymous 2012-06-26 19:40

>>29
stop parodying serious concerns, faggot

>>30
It can, but why would you?

Name: Anonymous 2012-06-26 20:15

>>30
If you ask me, that's a 5% die area that could have gone to vector instructions.

Name: Anonymous 2012-06-26 20:20

It can, but why would you?
I wouldn't. It just seems pretty damning for x86.

Name: Anonymous 2012-06-26 21:49

bumping.

Name: Anonymous 2012-06-26 21:50

buying chinkware

Name: Anonymous 2012-06-26 22:22

mp

Name: Anonymous 2012-06-27 4:36

>>26
I'm told and shown, but was not sure that the technician understood. These so-called technical experts on the level of competence differ little from those of managers.

Name: Anonymous 2012-06-27 4:46

Name: Anonymous 2012-06-27 5:51

>>35
commodity computers
manufactured outside of third world and developing countries
actually believes this
2012

Name: Anonymous 2012-06-27 6:07

Still waiting, Lemote.

Newer Posts