• 0 Posts
  • 24 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle





  • Most of the UK’s COVID fraud was from giving out contracts to companies that knew full well that they couldn’t deliver, e.g. a £40 million PPE contract to the landlord of the Health Secretary’s local pup, so it’s not absurd to claim that the point of those contracts wasn’t to save the economy, but rather transfer taxpayer money from the treasury to friends of Conservative Party leadership while there was still something left to loot. There was also lots lost in loans to fictional companies and furlough payments to fictional employees, of which a minority went to small businesses gaming the system, and a lot to organised crime gaming the system and then laundering the money so it couldn’t be traced and recovered (without giving the Serious Fraud Office and National Crime Agency enough budget to hire a workable number of forensic accountants).







  • For a start, having a garbage collector doesn’t mean its use is mandatory, but even in a language where the garbage collector is mandatory, keeping an array alive as long as any references to it exist doesn’t stop you doing things like getting muddled about its length and reading/writing past the end. Mandatory garbage collection only prevents temporal memory bugs like use-after-free, not spatial memory safety bugs like buffer overruns, which need to be prevented by other mechanisms like bounds checks.



  • I’ve got an SV08. It’s not a perfect printer, but making a printer without the problems it has (e.g. the bed takes nearly an hour to settle after it’s reached temperature, so it needs a long preheat for all but the shortest prints) would require making it much more expensive (e.g. a thick aluminium or graphite bed that wouldn’t warp would add another 20% of the cost of the printer). That specific problem is sidestepped with the MK4S by simply having a much smaller build volume rather than because it’s higher-end and more expensive. I’ve not needed support from Sovol (yet?), so can’t comment on whether they’re still super slow like they supposedly were right after the SV08 launched.




  • So for a developer to release a game on the Game Boy without Nintendo knowing, they would have to commit copyright infringement.

    That’d be trademark infringement, not copyright infringement.

    They used this same tactic on the Switch. They claim the prod keys, which are needed for Switch emulators, are copyrighted.

    That’s not quite the same thing, and still isn’t because the keys are copyrighted. There’s Digital Rights Management software running on the Switch, and part of what it does is decrypt encrypted parts of games with the keys. Originally, Nintendo managed to keep the keys secret, but eventually people managed to extract them. The next line of defence is that under the DMCA (or equivalent law in countries with a trade deal with the US), it’s illegal to attempt to circumvent DRM, and as the keys are capable of doing that, they themselves might count as a DRM circumvention device, which would be illegal to own or share. It’s a legal grey area whether or not they’d really count - lots of companies claim that it’s illegal to have these so-called illegal numbers, but Wikipedia are confident enough that that’s not what the law really says that their Illegal Number page lists a bunch of them.

    This gets even more complicated when it’s specifically about emulators, as the DMCA (or equivalent) have a specific carve-out for interoperability, saying you’re allowed to ignore parts of the DMCA if it’s specifically for the goal of making computer software work with computer hardware it wasn’t originally intended to. For the relevant parts of the DMCA that aren’t related to DRM, there’s case law confirming that it’s okay. However, no emulator developers have ever actually been sued for making an emulator for a system with any DRM (e.g. the thing with Switch emulators several months ago was settled out of court, and the threat was to sue them for things like illegally sharing games between developers, when they could have each bought their own copy, so weren’t protected by the carve-out). That means that this is a grey area, too.

    If Nintendo wanted to shut down an emulator based on its use of their keys, they’d not only have to set a precedent that the keys really did count as a DRM circumvention device, but also that the interoperability carve-out didn’t apply to DRM circumvention devices. It would be a big, expensive case, and as there are well-funded organisations that rely on the precedent not being set against them in both directions, both sides would get interested third parties funding their legal fees. No one wants that, so Nintendo stick to claiming emulators are illegal on their website, not in court documents, and only go after emulator developers who’ve provably done a second illegal thing they can be punished for.



  • This isn’t really the same kind of bug. Those bugs made instructions emit the wrong answer, which is obviously really bad, and they’re really rare. The bugs in the article make instructions take different amounts of time depending on what else the CPU has done recently, which isn’t something anyone would notice except that by asking the kernel to do something and measuring the time to execute affected instructions, an attacker that only had usermode access could learn secrets that should only be available to the kernel.