Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

katexochen@infosec.exchangeK

katexochen@infosec.exchange

@katexochen@infosec.exchange
About
Posts
3
Topics
3
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • The Nix sandbox aims to provide a pure environment by isolating the build environment from the rest of the system.
    katexochen@infosec.exchangeK katexochen@infosec.exchange

    The Nix sandbox aims to provide a pure environment by isolating the build environment from the rest of the system. However, some impurities can still affect builds inside the sandbox and lead to reproducibility issues. One of them is the filesystem.

    A common example is builds that implicitly depend on inode numbering or directory entry ordering. In some cases, you might even run into a filesystem bug: a build succeeds on one machine, but fails on another with a different filesystem.

    To debug these issues, you can now use nix-buildon. It lets you swap out the filesystem underneath the Nix sandbox. By running the sandbox on disorderfs, you can get a deterministic, sorted, or reverse-sorted view of directory entries. This makes it easy to check whether a build depends on filesystem behavior that should not matter in the first place.

    https://github.com/katexochen/nix-buildon

    I created this at #OceanSprint. 🌊

    #Nix #NixOS #ReproducibleBuilds

    Uncategorized oceansprint nix nixos reproduciblebui

  • Cool, KVM-based AMD SEV-SNP support was recently added to Cloud Hypervisor!
    katexochen@infosec.exchangeK katexochen@infosec.exchange

    Cool, KVM-based AMD SEV-SNP support was recently added to Cloud Hypervisor! Including support for Google's oak stage0 firmware and IGVM image format.
    https://github.com/cloud-hypervisor/cloud-hypervisor/pull/7942

    #ConfidentialComputing #virtualization #KVM #CloudHypervisor

    Uncategorized confidentialcom virtualization kvm cloudhypervisor

  • Fabricked, a new attack on AMD SEV-SNP presented: software-based attack that manipulates memory routing of inter-component communication within the SoC to trick the secure processor into improperly initializing the RPM table.
    katexochen@infosec.exchangeK katexochen@infosec.exchange

    Fabricked, a new attack on AMD SEV-SNP presented: software-based attack that manipulates memory routing of inter-component communication within the SoC to trick the secure processor into improperly initializing the RPM table. The root cause is a missing check in the secure processor firmware to enforce the Data Fabric is locked down.

    https://fabricked-attack.github.io/

    #ConfidentialComputing #CloudSecurity #AMD

    Uncategorized confidentialcom cloudsecurity amd
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups