Home » Liberty » Big Brother = You

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai III: Cataclysm
Click on image to purchase

Big Brother = You


Giorgione The Tempest 1508
Happy belated new year. Belatedly. Thought I’d sit out a few days, since there wasn’t much news to be expected. And it did pan out that way, other than Trump bogarting the limelight; but then, that isn’t really news either. Anything he says or does triggers the expansive anti-Donald echo chamber into a daily frenzy. And frankly, guys, it’s not just boring, but you’re also continuously providing him with free publicity. At least make him work for some of it.

Then, however, the big microprocessor (chip) security ‘flaw’ was exposed. And that’s sort of interesting, because it concerns the basic architecture of basically every microchip produced in the past 20 years, even well before smartphones. Now, the first thing you have to realize is that we’re not actually talking about a flaw here, but about a feature. We use that line a lot in a half-jokingly version, but in this case it’s very much true. As Bloomberg succinctly put it:

All modern microprocessors, including those that run smartphones, are built to essentially guess what functions they’re likely to be asked to run next. By queuing up possible executions in advance, they’re able to crunch data and run software much faster. The problem in this case is that this predictive loading of instructions allows access to data that’s normally cordoned off securely..

And:

Spectre fools the processor into running speculative operations – ones it wouldn’t normally perform – and then uses information about how long the hardware takes to retrieve the data to infer the details of that information. Meltdown exposes data directly by undermining the way information in different applications is kept separate by what’s known as a kernel, the key software at the core of every computer.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
In progress...

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai III: Cataclysm
Click on image to purchase