Oh, look -- *yet another* UBI test that worked as intended with none of the down-sides critics worry about. It's almost as if every one of these literally hundreds of UBI experiments all telling us the same thing are on to something.
Sadie & I did a photoshoot on the idea of “prey.” I came into it after reading an essay on deer describing their grace being an ability to move eloquently and powerfully through a world where they are seen as prey. I liked the idea of a haunted prey, driving the hunter mad like Melville or the “clever girl” velociraptors in Jurassic Park. @MxSadie liked the idea of prey being powerful, like a power bottom in the more sexy terms. Here are a few of the resulting shots. #darktable #canon
would you believe me if i told you that getting an icon to appear in this dropdown menu involved several hours of reading GTK forum posts, documentation, and examples in both rust and C, with more than one null pointer dereference along the way
@ireneista No, nobody does. The best that modern tech culture can hope to do is be fertilizer for whatever comes next.
And TBH that goes for largely corporate-backed "open source" and sterilely ideological FOSS too.
Creativity, learning, joy, acceptance, and multifaceted interpretations of identity were what I saw in the first inklings of the public Web. I know the plantings of the next bloom are out there just waiting for the next thaw.
turns out Qualcomm dropped the sources for talking to their Embedded USB Debug (EUD) peripheral, and it works on the OnePlus 6!
This means we get JTAG access directly via the USB port, yes seriously! There is also a UART peripheral which we can hook up (so far untested).
Basically you write 1 to a magic register (usually from the Linux driver) and all of a sudden a 7-port USB hub appears on your PC (in addition to whatever USB gadget you had set up) with a single device which is the EUD control interface.
Now that the code to talk to it is public (and functional with this openocd fork https://github.com/linux-msm/openocd) you can get JTAG access to the device for easier debugging of the kernel or U-Boot!
It seems like this works "by accident" on the OnePlus 6, likely the same debug policy misconfiguration that causes the device to go to crashdump instead of just rebooting (so it's unlikely to work on say, the PocoPhone F1, but maybe worth a try!).
There seem to be protections in place so you can escalate to EL2 or EL3, when in EL2 all registers read as 0
After further consideration (& your suggestions), here's a starter list for running any country properly:
PM: Paddington
Chancellor: The Count from Sesame Street
Transport Secretary: Ivor the Engine
Foreign Secretaries: The Clangers
Home Sec: Moominpapa
Head of MI5: Danger Mouse
Env Sec: Great Uncle Bulgaria (head Womble)
Justice: Grotbags?
Health & Social care: Cookie Monster, helped by Bert & Ernie
Transport: Ivor the Engine
Science & innovation: Gromit
Space: Mr Spoon from Button Moon
Polar science: Pingu
DCMS: Kermit
Emergency services: Pugh, Pugh, Barney McGrew, Cuthbert, Dibble, Grubb
Civil Service: The mice from Bagpuss (we will fix it, we will fix it…)
Comments/modifications?
The worst part for me is that I have no words to help or even offer meaningful comfort. I can't imagine how stressful this is, for so many.
@Daojoan "Wake up... The trailer for the new Goldfinger reboot just dropped!"
@mcc Yeah, that's actually the case. But Rust doesn't have to be better here because most of the languages that ARE good about "here's what happens in your hardware" are niche as fuck, so there's no real pressure/competition on C, Rust, C++, etc. to actually provide materially better guarantees about what goes on in the hardware.
So it has sort of stagnated over the last 30 years. Unfortunately.
Trans woman, bisexual, someone's fiancée, forever a programmer, poly, and former total mess