Hacker Newsnew | past | comments | ask | show | jobs | submit | flyingcircus3's commentslogin

Segger Embedded Studio is a complete solution. One installer. You might need to pick an older version to go with an old SDK version, but its very straightforward.


I remember being so bored during this movie in the theater. My expectations of any plot whatsoever were unreasonably high.


The very fact that you can bring this tired retort to any argument regardless of context reveals it for what it is: an off ramp to any conversation you have no better argument against.


It also assumes that the orange man has an original thought and not something that he's been convinced of by all of the direct underlings or even 3rd party NGOs that advise/lobby those underlings.


People see actions and make assumptions on intentions behind those actions. They also make assumptions on who actually called for those actions, or the percent to which people contributed to those decisions.

If you don't have a tape recorder showing Trump saying "Fire Shira, I don't like what she did and she needs to get out" then you are making assumptions both for his reasons and his involvement. No one has that tape. Which means any claims that this is what happening is entirely speculation. We've seen a decade of people claiming these assumptions as fact, and it's really tiresome.


Now apply this reasoning to Trump standing in Air Force One and saying that he would bring someone back of the Supreme Court said to. It's on video.


I spent 10+ minutes trying to find anything Trump has said on camera about the copyright office, and went through the only video I could find of Trump on air force one in the past week to see any references to this, and saw none.


https://www.washingtonpost.com/video/politics/trump-if-supre...

It's not related to copyright. It is an example of your hypothetical standard required to attribute something to Trump. My point is that even when he is on camera saying something, that does not prevent the post facto rationalizations. Even if he was on tape firing this person, people would rationalize this away too.


Are you implying the SWD signals would send the RAM contents every time? If I had to do that, I would first use a logic analyzer like Saleae to capture the SWD signals of a JLink performing the necessary operations to load the image into RAM. Then figure out, from the bytes that get send and received, whatever needs to be parameterized, and where to put the image data itself, perhaps by capturing different scenarios, and seeing what changes. Maybe even look up the SWD spec. You would also need to figure out what kind of back and forth is necessary, what must block waiting for a response. From there, assuming there isn't cryptography involved, it just becomes a matter of providing bytes to a bus in the correct order or timing based on the proper events. Some of those bytes are "canned" and never change. Some of them are parameters that describe some important quantity relevant your specific image. And the rest are your firmware image, probably chunked up with some overhead wrapped around it. I allow for the possibility that SWD is far more complex than I imagine, but this approach works pretty well for figuring out whats going on with SPI or I2C or BLE.


SWD and the associated debug interfaces are all documented by ARM; there's no need to reverse-engineer anything here. See the ADIv5 documentation [1] for a starter.

[1]: https://developer.arm.com/documentation/ihi0031/a


ADIv6 for RP2350 (!important)


> I allow for the possibility that SWD is far more complex than I imagine, but this approach works pretty well for figuring out whats going on with SPI or I2C or BLE.

SWD is pretty well documented. I won't claim its simple, but, in my opinion, it's decent at what it does. The RISC-V folks haven't seemed to be able to do better (and, IMO, did quite a bit worse in a few places, actually).

The SWD description at the packet/command level: https://arm-software.github.io/CMSIS-DAP/latest/index.html

There is open source code directly from ARM for it: https://github.com/ARMmbed/DAPLink/tree/main/source/daplink/...

The documentation of the actual wire protocol is also extensive, but a little more scattered: https://developer.arm.com/documentation/ihi0031/a?lang=en https://community.nxp.com/pwmxy87654/attachments/pwmxy87654/...

The big problem with the SWD wire protocol ARM documentation (and everybody who copies it) is that they don't point out the fact that when you go from Write-to-Read the active edge of the clock changes. In SPI-speak, you switch from CPHA=1 to CPHA=0. This makes sense if you stop to think about it for a moment because during debug there is no clock. Consequently, SWD must provide the clock and you switch from "put something on DATA a half phase early->pulse clock to make chip do something with it" to "pulse clock which makes chip put something on Data->read it a half phase later". However, if it has never been pointed out to you before, it's likely to trip you up.

Sigrok (or similar) which can decode SWD properly and a digital signal analyzer (even a cheap $10 one) are your friends.

The only diagrams which seem to resemble scope traces that point this out are on obscure Chinese engineering blogs.


This is completely unnecessary since SWD is both trivial as well as well documented


Well... I wouldn't call it "trivial". But it is documented.


The remote programming seems like a novelty aimed at hobbyists. If I have a deployment of remote devices, large or small, iterating on code on a device in the field is a recipe for disaster. How will you track the different versions of code on the various devices you have changed individually? If you need to directly change the code on a field device, doesn't that imply that you are unsure that the changes will work?

If the code needs to change, that is much safer to do in a controlled, low risk, nonproduction environment, where you will very likely have development hardware that has been optimized for ease of development/debugging. Once changes are tested and otherwise validated, an over the air update process would be used to send that new firmware image to the device. This way, your devices all can be on a single version of the firmware, meaning you can scale the deployment of that update to 10, then 100, then 1000 devices, etc.


The way the scripting engine is designed is such that it’s not really a problem to iterate in the field. If your code has an error, simply adjust and restart the script. Sure if you have the device hooked up to motors which could break things then of course you might want to do that in a controlled environment, but for applications like sensing that’s seldom a problem. The benefit you gain here is a very fast iteration cycle where you can easily test against real conditions, rather than in a lab where it might be hard to validate things. No need for heavy firmware testing, rolling out OTA updates, or worrying about bricking devices

In general I agree with you for complex projects, but these are typically where you can afford to have 2-3 engineers spend a year developing a specialised solution. Building infrastructure to safely roll out updates, managing data plans, handling compromised devices. All of this becomes a massive amount of work before you’re actually solving a problem for your business

The target audience isn’t necessarily engineering companies, but rather those that might have a few tech generalists. Their goal simply being to add some kind of sensing that might transform their product or service


I think that there is a parallel story to this one that is equally as interesting. There is one group of consumers of this story who see the receipts provided by Jeffery Goldberg, along with confirmation of their authenticity from a spokesperson at the National Security Council, followed by admissions by cabinet member participants of the Signal chat in hearings before congress, and those consumers of all this news can only conclude that the evidence is about as conclusive as you can get that Jeffery Goldberg is telling the truth, that these people are sharing the names of active intelligence officers, and describing imminent plans of action of the US military.

Then there is another group of consumers of this story, with the same access to all of the same evidence, and all of the same first person confirmations, who confidently declare the argument that this might be illegal null and void because Joe Biden allowed the CIA to use signal, and are persuaded away from accepting all of that evidence by articles with that contain such gems as "what the media wont tell you about the Atlantic hit piece", "Democrats talking points on this story quickly unraveled", and "help us continue to expose the lefts desperate attempts to manufacture scandals".

How can propaganda be so effective that people lose the skill of object permanence?


I have little doubt that Jeffery Goldberg is telling the truth.

So, was he added to the conversation inadvertently, or was it deliberate?

On the question of whether the use of the application was negligent, well, that is now moot.


There is just no way this is deliberate. They have nothing to gain from this.

We need to stop thinking these guys are playing 3D chess when they try to shove the pieces up their nose


Call me crazy, but they have lots to gain. They got to see whether a journalist would dare stand up against them knowing very well they risk being found with 50 terabytes of illegal porn on their computer then dying of a suicide with 2 shots in the back of the head. Turns out journalists aren't yet afraid of them.

They also got a loyalty test with their own people. Everyone is saying "not my problem" and accepting no responsibility. They've passed that test.

Then the final loyalty test is of their voters. When this first broke, the script was "Oof. This is bad. Heads will roll because of this." When it became apparent that, no, heads will not roll, the script amongst them changed. "This doesn't matter. Why would it matter? Everyone uses insecure things and makes mistakes. Why did the journalist embarrass our country?" It's very obvious that the breaking point with their base is very far away, assuming there is one.

And the final result is seeing whether there will be consequences. A small time guy can get pinched for this and the president and everyone else will remain completely void of responsibility no matter what. But it's pretty obvious that even a small time guy won't be facing consequences.

So they've gained something very valuable from this: the realization that there really are no consequences. They're going to keep pushing things like this and they'll get bigger and bigger each time. And each time it sets a new standard for a tolerable level of bad. And any time someone supportive of them starts to think "maybe this isn't good", they'll be quick to rush in and say "it's a nothingburger, just like the last thing they were whining about." And they'll fall back in line.


It's a nice theory, but the reason everyone in this administration is acting with such impunity is because they already believe there really are no consequences. They had that realization when they fomented an insurrection in 2021 and not only did nothing happen to them, they were voted back into office. What more confirmation would they need?

These people are just brutes lumbering through a government the fully control now, smashing and doing whatever they want. There's no 4D chess.


Well the FBI investigated it already -- even though the Hillary Clinton investigation took years -- and said there would not be charges brought.

It's a win on government efficiency I guess (no more year long investigations). But also, this is clearly not the first time they used Signal, and it won't be the last.


Just to clarify on what is moot, you are claiming that sharing classified, perhaps TS/SCI information, over signal, as well as deleting the messages, which are both illegal when isolated from any specific communication method, has all been blessed as above board and legal, simply because Joe Biden allowed Signal usage at the CIA?

Couldn't every whistleblower and double agent from now on just make sure to do their leaking over signal, and therefore receive the magical immunity your logic claims signal usage provides?


Then act against the Biden administration that approved it.

Move against those that approved its use.

That would be an interesting turn of events.


... but I think the argument goes "Signal can be used for unclassified communication, so we are OK"... great! .... but why were specific war plans and CIA officer names NOT classified? There are definite problems either way you slice it.


This exemplifies my point. I laid out how illogical it would be for your claim to be accurate that Biden approved otherwise illegal activity so long as it occured over signal.

And you've simply incorporated this as additional straw for your strawman.

Does this mornings additional confirmation in the form of messages including times, planes, and weapons further solidify your feelings that this is all Bidens fault?


There is also a large group who think it's a nothing burger and that Goldberg is simply lying or exaggerating about the nature and seriousness of the messages that were omitted from the reporting.


Luckily for those people, more messages were released this morning, with times, planes and weapons described.


Perhaps that would prevent people from selling clones as if they were authentic, but the stated problem is that clones are undercutting the original creators devices. Changing the name puts an increased burden on the cloners to get their name out there, but in a hobbyist market surrounding a technical subject, that seems pretty small compared to the burden of developing hw/fw that users are willing to pay for.


If you don't want people to copy and improve your software, don't give them permission to copy and improve your software.

If you don't want people to copy and improve your hardware, don't give them permission to copy and improve your hardware. It works the same as software copyright, AFAIK.

If you don't want people to make their own products that are similar to yours... sorry, that's not possible. Imagine what the world would be like if Elon Musk could claim a monopoly on Twitter-like services - if Mark Zuckerberg didn't first claim a monopoly on all social media - if IBM didn't first claim a monopoly on all computing products. You get to differentiate your product based on price and features, just like everyone else does.


> If you don't want people to copy and improve your hardware, don't give them permission to copy and improve your hardware.

As if Chinese cloners would give a shit about permissions. You got everything there from "independents" reverse-engineering clothing or circuits over the "official" manufacturing contractor running "ghost shifts" [1] with original parts that got binned in QA to supposedly trustable brands getting shafted on their end [2].

Regarding electronics, bunnie has also dedicated a chapter about fakes in his book about that world [3]. China simply runs on an entirely different value system than Western countries, one where what we see as theft they see as a completely normal part of doing business [4]. Unfortunately, our politicians never realised that and still continue treating China as an "equal partner".

Utter madness, and we are paying for it.

[1] https://www.messynessychic.com/2021/07/08/the-secret-world-o...

[2] https://www.bunniestudios.com/blog/2010/microsd-card-failure...

[3] https://bunniefoo.com/bunnie/essential/essential-guide-shenz...

[4] https://www.bunniestudios.com/blog/2014/from-gongkai-to-open...


Wouldn't your argument be far more defensible if it wasn't dripping with a siege mentality and provocative, yet unfalsifiable claims? Youre a step away from claiming that the children yearn for the mines.


it happens in europe, canada, and did in the US, so it's not just not unfalsifiable, it's provably true.

it's definitely not a siege mentality to say "let's treat each other fairly despite political differences". i don't know what you mean, the rest is nonsense


It all just sounds similar to claims that Donald Trump was being prosecuted for too many crimes at once, and that's how we can all tell that it's lawfare, and that none of those prosecutions were legitimate, rather than having to reconcile the possibility that Donald Trump is simply a prolific criminal.

You'd like us to view this purpose built Ames room from the singular vantage point that presents your side in the best light, rather than the other various angles which reveal a seedier reality.


it doesn't sound similar to any of that, you're just baiting at this point, grow up


I'll go you one further. Many Electrical Engineers who learn about the progression of transistors, logic gates, flip-flops, registers, arithmetic logic units, central processing units, instructions, and so on, have such a profound epiphany about how all complex systems are merely collections of less complex systems working in concert, that they can't help but to see the rest of the world through that same lens, at all times.


One administration was applauded for reducing the amount of time and resources spent evaluating the possible negative outcomes of the vaccine.

One administration was harshly criticized for reducing the amount of time and resources spent evaluating the possible negative outcomes of the vaccine.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: