Hacker Newsnew | past | comments | ask | show | jobs | submit | pajko's commentslogin

And? Critical software like this shall have zero warnings.

Then they shall compile with --no-warnings. Werror only makes the build to fail, without additional benefit for the user.

Failing to build is better than building with undefined behavior.

If you disagree, you can always remove -Werror, at your own risk.


Chickens eat anything they can. Sometimes including eggs and chicks. https://en.wikipedia.org/wiki/Cannibalism_in_poultry


The reverse slash of the 0 looks strange, which might have done to elminate a possible confusion with Norwegian ø.


Also differentiates from %.


There at least 2 AIs.


Probably. The way nobody is calling that out in the thread is wild.


The first generation was complete garbage. Itanium 2 came too late and it did not get widespread due to wrong business decisions and marketing. By the time it could have been successful, AMD64 was out. And even then Intel targeted only the same high-end enterprise market segment, when they have implemented 64-bit on Xeon: https://www.cnet.com/tech/tech-industry/intel-expanding-64-b...


That is the whole point, assume there was no AMD64 to start with.


Both mentioned CVEs seem to be about local privilege escalation. So basically yes, if you don't install crap apps, there's a high chance that you are protected. Problem is that it might not seem to be a crap app, but a nice-looking game, etc. Also an attack can come in with an update of any app you have already installed on your phone.


Threat model is probably third party ad and tracking libraries that pay to get into apps. If I caught it, I'd expect it to be from an app to use a parking deck, a colorful desk lamp, an otoscope etc where the developers sold out years ago


The point was surely more that apps being exploited via the Play Store can be mitigated there without client OS updates. The only hole here requiring the update needs a sideloaded attack.


Except the Play Store is a hot mess, and Google does little to no review of apps. Trusted repositories work best when the repository maintainers build and read the code themselves, like on f-droid or Debian. What Google and Apple are doing with their respective stores is security theater. I would not be surprised if they don't even run the app.


Again though, that's mixing things up. The question is whether or not mitigating the exploit requires an OS patch be applied promptly.

And it seems like it doesn't. If there is a live exploit in the wild (as seems to be contended), then clearly the solution is to blacklist the app (if it exists on the store, which is not attested) and pull it off the store. And that will work regardless of whether or not Samsung got an update out. Nor does it require an "audit" process in the store, the security people get to short circuit that stuff.


I think it does - playing wack-a-mole with apps using frail heuristics is just not a reliable approach.


Based on a Mediatek CPU, so not for me.


That threw me off, too. They probably chose it to keep the costs low. I wonder about the overall impact, though.


Surprisingly even Samsung uses Mediatek in quite a few devices they sell.


Why?



Word automatically corrects apostrophes and converts hyphens to em-dashes


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: