Project Ara: an exercise in futility.
Month: May 2016
Stupid project originator criticises stupid corporation for doing stupid project stupidly.
Stupid project originator criticises stupid corporation for doing stupid project stupidly.
Via Richard Healy
Originally shared by Cliff Bramlett
Google, please get back to the spirit of Phoneblok. Open Source.
Title

It looks as though that activity that we call “programming” or “software development” may continue for the time…
It looks as though that activity that we call “programming” or “software development” may continue for the time being.
This is pretty brilliant.
This is pretty brilliant.
Originally shared by Lisa Chabot
Key: White people have more opportunities to earn points in the iNotRacist app. ’cause!
(Hilarious video, thankfully fiction.)(I think.)
This is the most demonically clever computer security attack I’ve seen in years.
Originally shared by Yonatan Zunger
This is the most demonically clever computer security attack I’ve seen in years. It’s a fabrication-time attack: that is, it’s an attack which can be performed by someone who has access to the microchip fabrication facility, and it lets them insert a nearly undetectable backdoor into the chips themselves. (If you’re wondering who might want to do such a thing, think “state-level actors”)
The attack starts with a chip design which has already been routed — i.e., it’s gone from a high-level design in terms of registers and data, to a low-level design in terms of gates and transistors, all the way to a physical layout of how the wires and silicon will be laid out. But instead of adding a chunk of new circuitry (which would take up space), or modifying existing circuitry significantly (which could be detected), it adds nothing more than a single logic gate in a piece of empty space.
When a wire next to this booby-trap gate flips from off to on, the electromagnetic fields it emits add a little bit of charge to a capacitor inside the gate. If it just happens once, that charge bleeds off, and nothing happens. But if that wire is flipped on and off rapidly, it accumulates in the capacitor until it passes a threshold — at which point it triggers that gate, which flips a target flip-flop (switch) inside the chip from off to on.
If you pick a wire which normally doesn’t flip on and off rapidly, and you target a vulnerable switch — say, the switch between user and supervisor mode — then you have a modification to the chip which is too tiny to notice, which is invisible to all known forms of detection, and if you know the correct magic incantation (in software) to flip that wire rapidly, will suddenly give you supervisor-mode access to the chip. (Supervisor mode is the mode the heart of the operating system runs in; in this mode, you have access to all the computer’s memory, rather than just to your own application’s)
The authors of this paper came up with the idea and built an actual microchip with such a backdoor in it, using the open-source OR1200 chip as their target. I don’t know if I want to guess how many three-letter agencies have already had the same idea, or what fraction of chips in the wild already have such a backdoor in them.
As Andreas Schou said in his share, “Okay. That’s it. I give up. Security is impossible.”
Hilarious: solving the Fizz Buzz interview question in Tensorflow – http://buff.ly/22mKaye
Originally shared by Elie Bursztein
Hilarious: solving the Fizz Buzz interview question in Tensorflow – http://buff.ly/22mKaye
#ml #oveeengneering Jeff Dean
Google Instant Apps
Allo is a brand new messaging app from Google that is exciting because it uses Deep Learning to discover something…

Allo is a brand new messaging app from Google that is exciting because it uses Deep Learning to discover something obvious: that users of messaging apps are a bunch of fucking idiots.
Oracle needs to be euthanised immediately.
Oracle needs to be euthanised immediately.
Originally shared by Chris Robato
Boo hoo.
