Posts

Grand Teton National Park: 7 Best Things To Do, Itinerary & Photography

The Washington Post: Cybersecurity's bad and it's getting worse

Architecture: That an architectural capability-system model can be successfully atom smashed with a contemporary, MMU-enabled ISA such as Armv8-A. Formal methods: That it is possible to formally model and verify the security of that architecture specification, with machine-checked mathematical proof about its full 60,000 line definition, showing it ensures goals such as malicious code confinement, as well as to automatically generate hardware test suites from the same models. Microarchitecture: That an architectural capability-system model can be implemented in a high-performance, industrial quality multicore superscalar processor implementation, including microarchitecture such as CHERI’s compressed capabilities and a tag controller/cache model. Morello is based on Arm’s widely used Neoverse N1 microarchitecture – very much the “real thing” – and achieves 2.5Ghz, its target clock frequency. Memory-safe C/C++: That it is possible to support memory-safe variants o

Memory security through secure instructions

2021

Computer Security

BBC News: Pegasus: Spyware sold to governments 'targets activists'

The 5 mass extinction events that shaped the history of Earth — will the 6th be Cyber failure? Inspired by Live Science

PATENT SPECIFICATION (21y Application Na 5994/71 March 1971

Welcome to the era of the mega-hack | ZDNet

On-board diagnostics - Wikipedia

Download UF2 file

Getting Started with Raspberry Pi Pico – Raspberry Pi

LAMBDA: The ultimate Excel worksheet function - Microsoft Research

Raspberry Pi UPS: A Very Simple Solution

www.allspectrum.com/mopower/

How to Connect an Analog Joystick to Raspberry Pi Pico | Tom's Hardware

Microsoft: This is how the sneaky SolarWinds hackers hid their onward attacks for so long | ZDNet