If I had a YeeLong-8133 I would cuddle with it every night before going to sleep.
If I had a YeeLong-8133 I would code in MIPS64 assembly every day.
If I had a YeeLong-8133 I would print out x86 assembly listings on toilet paper and wipe my anus with them.
We're all waiting, Lemote. I'm not buying any other laptop; I demand a free open-source non-treacherous BIOS.
If I had a touhou I would cuddle with it every night before going to sleep.
If I had a touhou I would 1cc DoDonPachi every day.
If I had a touhou I would print out feminist propaganda on toilet paper and wipe my anus with it.
We're all waiting, ZUN. I'm not getting any other fiancée; I demand a 2D non-treacherous girlfriend.
>>2 hardware backdoors
that's more infeasible than you getting laid.
Name:
Anonymous2012-06-22 19:27
I remember reading a nice detective story about a motherboard that had barely detectable hardware backdoors in it. It was supposed to be an exact copy of European-made prototypes, and it was, except for a fucking pile of extra code that snooped on users. It would go unnoticed if there wasn't a bug somewhere at that code that revealed the whole scheme to a researcher. AFAIR the snooping code was the real dom0 (or how this thing is called), and it set up a fake dom0 that looked exactly like the real one so that it could snoop merrily without worrying about white devils ever finding extra resident code in their OS.
Does anyone remember what that was?
Name:
Anonymous2012-06-22 19:49
>>5
I'm sure there's a neckbeard with a digital analyzer who will take care of that.
nice detective story about a motherboard
Impossible!
AFAIR the snooping code was the real dom0 (or how this thing is called), and it set up a fake dom0 that looked exactly like the real one https://www.youtube.com/watch?v=hkDD03yeLnU
>>2
If they sell thousands of the same machine, what's stopping thousands of people testing this machine for and treachery?
>>8
How about having the ability to control your machines any way you want at your own pace? The non-free BIOS problem is the last major puzzle of self-sovereignty in computing.
Name:
Anonymous2012-06-22 21:48
If it ain't MIPS, it's crap!
Name:
Anonymous2012-06-23 6:41
I'd buy one but they're way too expensive for the shitty performance and build quality they offer.
>>6
No, it was a bitch to detect and identify. Thu guy who wrote everything up had to compare processor cycles vs wall clock on USB operations (or something like that) microseconds on a prototype and a serial MB.
>>15
It's going to be pretty hard to hide it in a computer where all the firmware is FOSS. Treacherous network packets don't just appear out of thin air, and they can be detected.
Name:
Anonymous2012-06-23 8:35
>>5
Do you mean fictional detective story, or did this actually happen?
Name:
Anonymous2012-06-23 13:11
>>17
Actually happened, there was a report with photos of the motherboard, debugging logs, letters to law enforcement etc.
Name:
Anonymous2012-06-23 14:30
>>18
Then find the damn source, because I sure can't
>>26
I'll perform some checks once I get one. I strongly doubt the Chinese would put spyware in a FOSS laptop that they would intend to sell medium-/large-scale; it would be very risky for the sales if it got discovered (millions of invested $$$ lost).
>>27
I strongly doubt they would not. I once bought a set of Chinese-made kitchenware and all of the items had microphones embedded into them, sometimes accompanied with tiny cameras!
Name:
Anonymous2012-06-26 19:38
http://en.wikipedia.org/wiki/Loongson#Hardware-assisted_x86_emulation Loongson 3 adds over 200 new instructions to speed up x86 instruction execution at a cost of 5% of the total die area. The new instructions help QEMU translate x86 instructions by lowering the overhead of executing x86/CISC-style instructions in the MIPS pipeline. With added improvements in QEMU from ICT, Loongson-3 achieves an average of 70% the performance of executing native binaries when running x86 binaries from nine benchmarks.
>>26 I'm told and shown, but was not sure that the technician understood. These so-called technical experts on the level of competence differ little from those of managers.