chellomere

joined 1 year ago
[–] chellomere 25 points 1 week ago (2 children)

They also forced the touch-like interface onto computers that didn't have a touch screen.

[–] chellomere 4 points 1 week ago

The conversion rate depends on that particular state's obesity rate

[–] chellomere 2 points 2 weeks ago

Ah right. Sorry for the bothering.

[–] chellomere 2 points 2 weeks ago (2 children)

What game is this?

[–] chellomere 3 points 2 weeks ago* (last edited 2 weeks ago)

#Rogule 2024-11-10 🧝 5xp ⛩ 200 👣 streak: 1 🟩🟩🟩🟩🟩 ⚔ 🐺👻👹👻🧟 🌰🌰🌰🌰🍄🍄 https://rogule.com

[–] chellomere 14 points 3 weeks ago* (last edited 3 weeks ago)

This is great, but the context is that this is for specific inner loops, and it is compared to the C version of that specific inner loop. Typically what was used before this on a computer with avx512 was the avx2 version of the inner loop, and the speedup compared to that version appears to be up to 60%: https://x.com/FFmpeg/status/1852542388851601913 . Then as not a specific inner loop isn't run all the time, the speedup is probably much less than 60%. This is still sizeable, but the actual speedup in practice with this implementation is far far from 94x.

[–] chellomere 8 points 3 weeks ago

Yeah 7000-series Ryzen benefits from the avx512 code paths in ffmpeg. I've benchmarked a 5900x vs a 7900x specifically for software H.265 decoding and there was a sizeable difference.

[–] chellomere 11 points 2 months ago (5 children)

Not so sure. What if these 4/5 nukes explode on the launch pad? Even if this is in a remote area you'll cause some damage to your own country.

[–] chellomere 4 points 2 months ago

It is a god send.

[–] chellomere 1 points 2 months ago (1 children)

Looks like he just threw up

[–] chellomere 3 points 2 months ago* (last edited 2 months ago)

Ah, so they don't actually say that they read kernel space. They check the version of all installed packages and checksum the installed DLLs/SOs.

If the user still has root privileges, this may still not prevent sideloading of kernel modules. Even if it would detect a kernel module that has been sideloaded, I believe it's possible to write a kernel module that will still be resident after you unload it. This kernel module can then basically do anything without the knowledge of userspace. It could for example easily replace any code running in userspace, and their anticheat would miss that as it doesn't actually check what code is currently running. Most simply, code could be injected that skips the anticheat.

Of course, in their model, if a user isn't given root privileges it seems much harder to do anything, then probably the first thing you'd want to look for is a privilege escalation attack to obtain root privileges. This might not be that hard if they for example run Xorg as it isn't known to be the most secure - there's a reason there's a strong recommendation to not run any graphical UI on servers.

Another way if you don't have root is to simply run the code on a system that does but that does have such a kernel module - or perhaps modify the binary itself to skip the anticheat. I don't see anything preventing that in their scheme.

[–] chellomere 6 points 2 months ago (5 children)

I'm having a hard time understanding how this would work. udev will load kernel modules depending on your hardware, and these modules run in kernel space. Is there an assumption that a kernel module can't cheat? Or do they have a checksum for each possible kernel module that can be loaded?

Also, how do they read the kernel space code? Userspace can't do this afaik. Do they load a custom kernel module to do this? Who says it can't just be replaced with a module that returns the "right" checksum?

 

79
Giant puffball (lemmy.world)
 

 

More

 
219
It's all beans and poop (self.lemmyshitpost)
submitted 1 year ago by chellomere to c/lemmyshitpost
663
BEANS (self.lemmyshitpost)
 

Astronomers have found a background din of exceptionally long-wavelength gravitational waves pervading the cosmos. The cause? Probably supermassive black hole collisions, but more exotic options can’t be ruled out.

19
submitted 1 year ago* (last edited 1 year ago) by chellomere to c/sweden
 

Den svenska regeringen ”fördömer starkt” de ”islamofobiska handlingar” som förekommit vid manifestationer i Sverige. Uttalandet från UD kommer efter att Islamska konferensorganisationen (IKO) krävt lagliga åtgärder mot koranbränningar.

”Brännandet av koranen, eller någon annan helig skrift, är en kränkande och respektlös handling och en tydlig provokation”, skriver UD.

UD skriver vidare att uttryck för rasism, främlingsfientlighet och intolerans ”inte har någon plats i Sverige eller i Europa”.

 
103
Donatello (self.lemmyshitpost)
submitted 1 year ago by chellomere to c/lemmyshitpost
 

I think I can, I think I can

2
2A07: A Space Odyssey (www.pouet.net)
submitted 1 year ago by chellomere to c/nes
 

This is a demoscene demo released for PAL NES by yours truly at the demoparty Black Valley in Oslo 2022

view more: next ›