Something called during dinner yesterday. I hung up almost immediately, but commented to the family that it is getting harder to quickly identify recorded calls.
My 16 year old Andrew remarked that I should ask for the answer to 1 plus 1.
He’s invented telephone captchas! When you get a call and you can’t quite tell if it is a person, ask them a math question. If you don’t get an immediate correct answer, hang up.
There’s a subset of robo callers with a recording that pauses in almost human places, and makes small talk about your expected answers. I find this trend alarming and suspect it takes in lonely seniors pretty well.
Personally, I’ve gotten to where I don’t bother talking any more, if there is any sort of a pause after my hello, or anything recorded or that I can’t interrupt, I just hang up. As they get better though, I’m going to use telephone captchas.
Month: February 2018
Meltdown and Spectre
The technically inclined can read the papers at Meltdown and Spectre but I will try for a less technical explanation.
Processor chips are supposed to be able to run multiple programs at once, while keeping the data of each program secret from the others. There is a special privileged program, called the operating system kernel, that coordinates all the activity. The kernel is necessarily allowed to read the data of any user program.
This isolation between the data of different programs, and between the secret data of the kernel and that of all user programs, is done by something called virtual memory. VM gives each program the illusion of a private memory space while in fact all the programs are using bits of the underlying real memory in a way coordinated by the kernel.
A user program simply does not have any way to ask for the contents of arbitrary real memory (and thus be able to read secrets of other program.) The memory of other programs is not present at all in the virtual memory of the attacker.
The relation between the user programs and the OS is a little different. For convenience, the kernel ususally has the entire physical memory “mapped” in its own virtual address space, and the kernel’s virtual space is also present in the virtual space of every user program. This is not supposed to be a problem because the kernel part of the memory is marked “kernel use only” and that restriction is enforced by the hardware. If a user program tries to read kernel memory, the hardware says “nope!”.
All this is just background.
Meltdown is a way for user programs to read kernel virtual memory, even though they are not supposed to be able to do it.
Spectre is a way for user programs to read the virtual memory of other user programs, even though they are not supposed to be able to do it.
Virtual memory is only one of the ways in which processors present a view that is different from the underlying reality. Another is the so called “architecture”. Most PC’s have an architecture called x86, due to Intel. AMD also makes chips with an x86 architecture. The architecture is the stuff that is visible to a program: instructions, registers, memory, and so forth. The general outline of a computer architecture is that of a central processing unit, containing registers and instructions, which talk to a memory unit, containing data. Neither thing is true, and hasn’t been true for 30 years.
Memory isn’t simply memory anymore! If you’ve looked inside a PC, you’ve seen those flat rulers with chips on them plugged in edgewise to the motherboard. Those are main memory. That part is true. The problem is that they are way too slow. It can take 60 to 100 nanoseconds to get data from main memory. In that time, the CPU can execute maybe 200–300 instructions. Something had to be done. Inside the CPU chip, there are smaller faster memories called cache. They automatically hold the most recently accessed and most frequently accessed data from memory. This works because programs tend to access the same stuff over and over and also to access nearby stuff.
CPUs aren’t just CPUs anymore! Executing a single instruction involves a 5–10 step process, fetching the instruction, decoding what it means, fetching the data it needs, maybe doing some complicated arithmetic, and storing the answer back where it goes. If CPUs did these things one at a time, they would be too slow, so the operation of many instructions are overlapped in a pipeline of work. It turns out that that is not nearly enough speedup, so many modern CPUs execute instructions “out of order”. They look ahead at instructions that are coming up and do as many as they can, even though earlier instructions have not finished. In order to avoid vast confusion, instructions are only allowed to finish in order, with “later” results being held in temporary storage until earlier instructions finish, even though all the work for the later instructions has already been done. Modern CPUs also engage in “speculative execution” which means they actually guess at what instructions will need to be executed sometime in the future and do them right away. Things like this happen due to IF THEN ELSE instructions in the program that could cause different instructions to execute. The CPU doesn’t really know which way the IF THEN ELSE (called a branch) will go, so it makes a very well educated guess.
Out of order and speculative execution are especially interesting due to those long memory delays. The CPU can be thinking about and running instructions several hundred instructions ahead of the “commit point”.
None of this violates the architectural rules. The program doesn’t see the results of instructions that were never supposed to execute, and can’t read memory it is not entitled to see…. Well it turns out it can.
The trick of Meltdown allows a program to read kernel virtual memory even though that is forbidden. The meltdown program, by some modest bluffing, tricks the CPU into speculatively executing a read from kernel memory and then using the result to choose which data to read from user memory.
The results of these reads are never reported to the user program, and in fact by the time the program logic gets to that point, the CPU knows the read would never have been executed anyway, so it doesn’t even produce the exception that would normally happen when a user program breaks the rules and tries to read kernel memory.
But… in the underlying physical machine, the microarchitecture, the reads from memory did happen, and that data was read into the caches we talked about earlier.
Dr. Anita Kurmann
On August 7, 2015, Anita Kurmann was cycling on Massachusetts Avenue in Boston and was killed by a truck making a turn onto Beacon Street.
This week Boston Police cleared the driver of wrongdoing.
https://www.bostonglobe.com/metro/2018/01/23/bicycle-group-says-tractor-trailer-driver-was-responsible-fatal-back-bay-bike-crash/uew2Cau2d3hcqvpC5JyqkL/story.html
The thing is, that if Dr. Kurmann did nothing wrong, and the driver did nothing wrong, then the rules of the road are not adequate.
It seems to me very reasonable to ask for sets of rules for bicyclists and drivers, such that if both parties follow the rules, then no one is killed. Boston Police may be correct and the driver was not at fault, but if they are then the rules are wrong. Where is the effort to fix the rules? Where are the BPD recommendations for drivers and cyclists and the city?
Maybe its as simple as not driving 40′ tractor trailers on city streets without flagmen and escorts.
In view of the power imbalance between motor vehicles and bicycles, in my view, if a motor vehicle hits a cyclist while the cyclist is in a legal spot, then the driver of the motor vehicle is at fault. This is similar to the rules about rear end collisions. If you smash into the back of a car, you are at fault. Either you weren’t paying attention or you were tailgating to start with. Full stop.
I’m a little sensitive to these issues because I used to commute 36 miles a day into Cambridge and I’ve had my share of idiot drivers.