Slashdot: Hardware's Journal
 
[Most Recent Entries] [Calendar View]

Saturday, August 11th, 2018

    Time Event
    12:10a
    Tesla's Chief Vehicle Engineer Returns To Apple
    Doug Field, the former VP of Mac hardware who left Apple to become Tesla's chief vehicle engineer, has returned to Cupertino. Field is reportedly working on the company's secretive "Project Titan" self-driving car program. The Verge reports: Field ran Tesla's vehicle production and engineering, but CEO Elon Musk took over responsibility for production this year after the company failed to meet its initial first-quarter goal for the Model 3. Field then took a leave of absence in May, and subsequently left the company altogether in June. Project Titan has reportedly been scaled back considerably from its initial scope, with hundreds of people leaving the division as Apple is said to focus on seeking carmaker partners for its self-driving software. [Daring Fireball's John Gruber] speculates that Field's return to Titan suggests Apple could still have an interest in producing vehicles itself, while cautioning that employees do move between the two companies regularly.

    Read more of this story at Slashdot.

    Image
    12:50a
    Facebook Bans Sites That Host Blueprints of 3D-Printed Guns
    Yesterday, Facebook said it's banning websites that host and share blueprints of 3D-printed guns. "Sharing instructions on how to print firearms using 3D printers is not allowed under our Community Standards," said a spokesperson in an email statement. "In line with our policies, we are removing this content from Facebook." BuzzFeed was first to report the news: The move comes amid a rush by states to block these instructions from being posted. A July settlement between the State Department and Defense Distributed, an open-source organization that created the first completely 3D-printed gun, cleared the way for the group to publish the gun code. However, that was stalled when a federal judge on July 31 granted a temporary nationwide injunction that prevented Defense Distributed from uploading the plans. The injunction prevents Defense Distributed from publishing the plans. But the instructions are widely available online, on sites such as CodeIsFreeSpeech.com -- which hosts plans for parts of an AR-15, a Beretta, and Defense Distributed's Liberator. Attempts to post the site on a user's News Feed, through Facebook's Messenger app, or on Instagram (which Facebook owns) produce a variety of error messages. Other sites that host the files can still be posted through Facebook. Specifically, Facebook says that 3D-printed guns violate the regulated goods section of the social giant's community standards, which limits gun sales and exchanges to licensed dealers.

    Read more of this story at Slashdot.

    Image
    3:34p
    Researcher Finds A Hidden 'God Mode' on Some Old x86 CPUs
    "Some x86 CPUs have hidden backdoors that let you seize root by sending a command to an undocumented RISC core that manages the main CPU," Tom's Hardware reports, citing a presentation by security researcher Christopher Domas at the Black Hat Briefings conference in Las Vegas. The command -- ".byte 0x0f, 0x3f" in Linux -- "isn't supposed to exist, doesn't have a name, and gives you root right away," Domas said, adding that he calls it "God Mode." The backdoor completely breaks the protection-ring model of operating-system security, in which the OS kernel runs in ring 0, device drivers run in rings 1 and 2, and user applications and interfaces ("userland") run in ring 3, furthest from the kernel and with the least privileges. To put it simply, Domas' God Mode takes you from the outermost to the innermost ring in four bytes. "We have direct ring 3 to ring 0 hardware privilege escalation," Domas said. "This has never been done.... It's a secret, co-located core buried alongside the x86 chip. It has unrestricted access to the x86." The good news is that, as far as Domas knows, this backdoor exists only on VIA C3 Nehemiah chips made in 2003 and used in embedded systems and thin clients. The bad news is that it's entirely possible that such hidden backdoors exist on many other chipsets. "These black boxes that we're trusting are things that we have no way to look into," he said. "These backdoors probably exist elsewhere." Domas discovered the backdoor, which exists on VIA C3 Nehemiah chips made in 2003, by combing through filed patents. "Some of the VIA C3 x86 processors have God Mode enabled by default," Domas adds. "You can reach it from userland. Antivirus software, ASLR and all the other security mitigations are useless."

    Read more of this story at Slashdot.

    Image
    7:34p
    It'll Cost $1 Billion To Dismantle America's Nuclear-Powered Aircraft Carrier
    "Six years after decommissioning USS Enterprise, the world's first nuclear-powered aircraft carrier, the U.S. Navy is still figuring out how to safely dismantle the ship," reports Popular Mechanics. schwit1 tipped us off to their report: The General Accounting Office estimates the cost of taking apart the vessel and sending the reactors to a nuclear waste storage facility at up to $1.5 billion, or about one-eighth the cost of a brand-new aircraft carrier. The USS Enterprise was commissioned in 1961 to be the centerpiece of a nuclear-powered carrier task force, Task Force One, that could sail around the world without refueling.... The Navy decommissioned Enterprise in 2012 and removed the fuel from the eight Westinghouse A2W nuclear reactors in 2013. The plan was to scrap the ship and remove the reactors, transporting them by barge from Puget Sound Naval Base down the Washington Coast and up the Columbia River, then trucking them to the Department of Energyâ(TM)s Hanford Site for permanent storage. However, after decommissioning the cost of disposing of the 93,000-ton ship soared from an estimated $500-$750 million to more than a billion dollars. This caused the Navy to put a pause on disposal while it sought out cheaper options. Today the stripped-down hull of the Enterprise sits in Newport News, Virginia awaiting its fate. "Although the Navy believes disposing of the reactors will be fairly straightforward, no one has dismantled a nuclear-powered carrier before... "Whatever the Navy ends up doing, this will only be the first of many nuclear-powered carrier disposals."

    Read more of this story at Slashdot.

    Image
    8:34p
    World's Largest Chip Maker Will Lose $250M For Not Patching Windows 7 Computers
    A major virus infection forced the closure of Taiwan Semiconductor Manufacturing Company (TSMC) factories last weekend..." writes Slashdot reader Mark Wilson, noting that it's the largest semiconductor manufacturer in the world, selling chips to Apple, Nvidia, AMD, Qualcomm, and Broadcom, and "responsible for producing iPhone processors." Now Network World reports: The infection struck on Friday, August 3, and affected a number of unpatched Windows 7 computer systems and fab tools over two days. TSMC said it was all back to normal by Monday, August 6. TSMC did not say it was WannaCry, aka WannaCrypt, in its updates, but reportedly blamed WannaCry in follow-up conference calls with the press.... The company said this incident would cause shipment delays and additional costs estimated at 3 percent of third quarter revenue. The company had previously forecast revenues of $8.45 billion to $8.55 billion for its September quarter. A 3 percent loss would mean $250 million, though actual losses may come out lower than that. Still, that's a painful hit. TSMC also said no customer data was compromised.... TSMC isn't directly to blame here; someone [an infected production tool provided by an unidentified vendor] brought WannaCry into their offices and behind their firewall, but TSMC is still culpable because it left systems unpatched more than a year after WannaCry hit.

    Read more of this story at Slashdot.

    Image

    << Previous Day 2018/08/11
    [Calendar]
    Next Day >>

Slashdot: Hardware   About LJ.Rossia.org