User Controls

  1. 1
  2. 2
  3. 3

Posts by F.E. Allen

  1. F.E. Allen P-TRANNY
    that's just how big my penis is
  2. F.E. Allen P-TRANNY
    The 日本語 word for "the sticks" is 田舎.
  3. F.E. Allen P-TRANNY
    Originally posted by Enter what countries have you visited before

    Speckles has literally never left Canada.
  4. F.E. Allen P-TRANNY
    mmmmmmQuestion here: How much meth have you used in the mast month?
  5. F.E. Allen P-TRANNY
    Presumably it's not actually a dupe post? How are you submitting the post (like what do you click or what hot key do you use)? What browser/OS are you using?
  6. F.E. Allen P-TRANNY
    not sg material
  7. F.E. Allen P-TRANNY
    How do adult men not know how to cook? Like I get it if you don't cook french or make fancy pinterest shit or whatever but how can you not know how to make simple dishes? Firecrackers are easy as shit. People make fun of cooking as feminine but let me tell you, a motherfucker who doesn't know how to cook is domesticated as shit. If you can't live on your own without eating microwave food then you're literally dependant on pussy, potentially without actually having sex (as in sploos case), for lack of a skill that earns you little more than minimum when practiced professionally.

    Pathetic. Wimpy ass. Bitches.
  8. F.E. Allen P-TRANNY
    Originally posted by Captain Falcon "Genius"

    would thank
  9. F.E. Allen P-TRANNY
    "provoking" (being retarded around) people on the internet is not what makes you anti-social.
  10. F.E. Allen P-TRANNY
    There's also a series of audio recording of Dreyfus' lectures on Being and Time on youtube:

    https://www.youtube.com/watch?v=IaIWz_87Kz0

    I'm not usually big on recorded lecturing for whatever reason, maybe it's social, I think Peterson's reputation has been damaged by his status as "youtube lecturer" on top of whatever other issues he might have. But anyway, I found Dreyfus was at about the right level for me to digest.
  11. F.E. Allen P-TRANNY
    Are you trying to read it cover to cover? Being and Time is one of the most notoriously difficult and poorly translated works in philosophy. Second only to Hegel but a mile ahead of Kant (what the fuck is it with Germans? God damn).

    Dreyfus is probably the most famous modern commentator on Heidegger, he can still be plenty dense but it's the only way I've been able to understand the kraut bastard. "A Companion to Heidegger" might be the secondary resource you want if you're writing a thesis but it's a 500 page book on top of whatever ungodly number of pages are in Being and Time.

    Have you talked to anyone about this? I mean if that's what you want to do more power to you but you're really taking the hard way on this one.
  12. F.E. Allen P-TRANNY
    Originally posted by Captain Falcon At least Bill Krozby works and produces something, sploo.

    Produces what? Children with substandard lives, proliferation of STDs, and general human suffering?
  13. F.E. Allen P-TRANNY
    two in the pink
  14. F.E. Allen P-TRANNY
    Originally posted by Captain Falcon Both of you lack any redeeming qualities and any social skills. You're kind of attractive but Sploo is a chubby boy. I'm way more likeable than either of you.

    I like malice, despite not having much of anything going for him "on paper". He's like what I imagine I would be like if I never changed my mindset about anything after turning 15 but kept learning more and more. Maybe that sounds condescending but it's not meant to be. I disagree with him on almost everything but there is a certain sort of ideological purity there that's interesting and rare. He's the unsocialized man, and no one is born socialized, so you can relate.

    By contrast sploo is deliberately anti-social as a bid for attention. It's a lot more distasteful since you can't even say he's sincere. If there's one thing Malice has going it's a kind of unbridled sincerity. He really believes the things he says, even if he shouldn't. That's kind of endearing.

    /gaypost
  15. F.E. Allen P-TRANNY
    Originally posted by Fromus Krokus he's mentally disabled and disgusting

    I know you are but what is malice?
  16. F.E. Allen P-TRANNY


    Yeah, this is pretty much what I imagine sploo's family looking like
  17. F.E. Allen P-TRANNY
    Originally posted by -SpectraL And when we say "biological system", it's really being ingenious, because all systems are biological. All machines are "biological", including human and mechanical systems. The term biological simply means "alive", and "alive" is a matter of interpretation and viewpoint, not science. A machine can also be "alive". The human body is made up of about 27 grams of assorted elements. Mechanical machines are also comprised of a certain number of elements. The same elements found in mechanical machines, such as iron, can also be found in the materials used to create the human body. The human body is simply another machine, one designed for purpose and operation.

    Machines don't have the ability to reproduce with heritable traits and random mutation. "Life" is a taxonomical issue, although there is a well accepted definition in biology which excludes all heretofore constructed man made machines. If you want to bitch about the word "life" though then fine, let's just use the line above: "systems with the ability to reproduce with heritable traits and random mutation". Say it with me spectral!
  18. F.E. Allen P-TRANNY
    Originally posted by -SpectraL The attack uses two eBPF programs. The first one tail-calls through a page-aligned eBPF function pointer array prog_map at a configurable index. In simplified terms, this program is used to determine the address of prog_map by guessing the offset from prog_map to a userspace address and tail-calling through prog_map at the guessed offsets. To cause the branch prediction to predict that the offset is below the length of prog_map, tail calls to an in-bounds index are performed in between. To increase the mis-speculation window, the cache line containing the length of prog_map is bounced to another core. To test whether an offset guess was successful, it can be tested whether the userspace address has been loaded into the cache.

    Because such straightforward brute-force guessing of the address would be slow, the following optimization is used: 215 adjacent userspace memory mappings [9], each consisting of 24 pages, are created at the userspace address user_mapping_area, covering a total area of 231 bytes. Each mapping maps the same physical pages, and all mappings are present in the pagetables.




    This permits the attack to be carried out in steps of 231 bytes. For each step, after causing an out-of-bounds access through prog_map, only one cache line each from the first 24 pages of user_mapping_area have to be tested for cached memory. Because the L3 cache is physically indexed, any access to a virtual address mapping a physical page will cause all other virtual addresses mapping the same physical page to become cached as well.

    When this attack finds a hit—a cached memory location—the upper 33 bits of the kernel address are known (because they can be derived from the address guess at which the hit occurred), and the low 16 bits of the address are also known (from the offset inside user_mapping_area at which the hit was found). The remaining part of the address of user_mapping_area is the middle.




    The remaining bits in the middle can be determined by bisecting the remaining address space: Map two physical pages to adjacent ranges of virtual addresses, each virtual address range the size of half of the remaining search space, then determine the remaining address bit-wise.

    At this point, a second eBPF program can be used to actually leak data. In pseudocode, this program looks as follows:

    uint64_t bitmask = <runtime-configurable>;
    uint64_t bitshift_selector = <runtime-configurable>;
    uint64_t prog_array_base_offset = <runtime-configurable>;
    uint64_t secret_data_offset = <runtime-configurable>;
    // index will be bounds-checked by the runtime,
    // but the bounds check will be bypassed speculatively
    uint64_t secret_data = bpf_map_read(array=victim_array, index=secret_data_offset);
    // select a single bit, move it to a specific position, and add the base offset
    uint64_t progmap_index = (((secret_data & bitmask) >> bitshift_selector) << 7) + prog_array_base_offset;
    bpf_tail_call(prog_map, progmap_index);


    Copy pasted from here: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

    It would be nice if you could give us your own thoughts on the matter instead of copy pasting researchers.

    I was actually asking about the code snippet you posted earlier where there is no optimization or tail calls. The previous code was a lot simpler than what Horn is doing here, I'd like to understand that first.
  19. F.E. Allen P-TRANNY
    Originally posted by -SpectraL But where did this initial "biological system" of yours come from?

    https://en.wikipedia.org/wiki/Abiogenesis
  20. F.E. Allen P-TRANNY
    Originally posted by -SpectraL Most of that's not in the .PDF.

    Everything except the code is copy pasted from the whitepaper. Did you write the code?

    I read the paper and still don't fully understand the attack so I'd kinda like to hear from you personally.
  1. 1
  2. 2
  3. 3
Jump to Top