zimmie
About
- Username
- zimmie
- Joined
- Visits
- 172
- Last Active
- Roles
- member
- Points
- 2,737
- Badges
- 1
- Posts
- 651
Reactions
-
Apple Twitter account hacked in Bitcoin scam campaign
Xed said:elijahg said:Oops. Looks like someone internal to Twitter didn't use 2FA.
Together, these suggest the attacker may have had fairly direct write access to the user authentication database.ITGUYINSD said:Interesting that Joe Biden and Barack Obama were targets, but not Donald Trump. Very interesting, indeed. -
Apple silicon Macs to support Thunderbolt despite shift to ARM
melgross said:zimmie said:melgross said:rcfa said:People forget that Apple and Intel developed TB TOGETHER. It’s not like a PROTOCOL is depending on a specific CPU 🤦🏻♂️
additionally, as far as TB 4 is concerned, VT-D is the reason I was concerned. While it’s true that TB is part of PCIE, VT-D is a technology inside Intel’s’ x86 chipsets. My concern was how Apple would implement an x86 technology. I guess we’ll find out.
info from Intel on VT-D:
https://software.intel.com/content/www/us/en/develop/articles/intel-virtualization-technology-for-directed-io-vt-d-enhancing-intel-platforms-for-efficient-virtualization-of-io-devices.htmlJust like the reason the DTK doesn’t have Thunderbolt. Like I guessed in another thread, it’s simply because the A12 never needed external PCIe, so the pins just don’t exist for a Thunderbolt controller to connect to.
IOMMU as a technology is not proprietary. VT-d is one implementation, but IBM's mainframes have had their own since before the POWER4 architecture. I haven't looked into it in detail, but I'm pretty sure at least some variants of the System/370 had it back in the 70s. That's the only way I could see some features of their hypervisor working.
ARM has an IOMMU implementation called SMMU. No telling if Apple would just use that directly or if they would want to make their own implementation. -
Apple silicon Macs to support Thunderbolt despite shift to ARM
melgross said:rcfa said:People forget that Apple and Intel developed TB TOGETHER. It’s not like a PROTOCOL is depending on a specific CPU 🤦🏻♂️
additionally, as far as TB 4 is concerned, VT-D is the reason I was concerned. While it’s true that TB is part of PCIE, VT-D is a technology inside Intel’s’ x86 chipsets. My concern was how Apple would implement an x86 technology. I guess we’ll find out.
info from Intel on VT-D:
https://software.intel.com/content/www/us/en/develop/articles/intel-virtualization-technology-for-directed-io-vt-d-enhancing-intel-platforms-for-efficient-virtualization-of-io-devices.htmlJust like the reason the DTK doesn’t have Thunderbolt. Like I guessed in another thread, it’s simply because the A12 never needed external PCIe, so the pins just don’t exist for a Thunderbolt controller to connect to. -
First Apple Silicon Developer Transition Kit benchmarks show Rosetta performance impact
hattig said:zimmie said:VirtualApple is 100% a Rosetta thing. The reported processor speed is probably just a lie to software to give it an expectation of performance level.
I said the processor model name "VirtualApple" is a Rosetta thing. This benchmark is clearly running emulated, no doubt about it.hattig said:zimmie said:VirtualApple is 100% a Rosetta thing. The reported processor speed is probably just a lie to software to give it an expectation of performance level. -
Republican bill seeks end to 'warrant-proof' encryption
When a key is used by more than one person, it will eventually leak. The TSA keys leaked and now you can get STLs for rapid prototyping machines. New York's 1620 key is available for around $10.
Once a key is leaked, anybody with access to it can use it. Encryption is math, and math does not care if you believe in truth, justice, and the American way. It also, incidentally, doesn't care if you have a warrant or not.
This will provably make US citizens and companies more vulnerable.
Edited to add: I suspect they aren't thinking through any implications of this. Once tech exists for one country to compel a manufacturer to decrypt a device's data, all countries will have the same access. Several countries notably have very low thresholds for warrants. What do these senators think would happen when China brings a phone to Apple and says "Here's a warrant. Decrypt it.", and it turns out the phone actually belongs to the US ambassador or some large business interest?