A fool with a tool is a more dangerous fool.
— u
The Google Project Zero post from a while ago that showed memory safety bugs were more common in new code continues to annoy me because it’s such a clear example of computer scientists doing social science without understanding how to do it.
The root problem is that they are no counting the number of bugs. There is no ground truth that they are able to use. They are counting the number of bugs found. And how are bugs found? When you have some existing technique (static analysis, fuzzing, code review, whatever) that finds that kind of bug.
So their conclusion is ‘bugs that existing techniques are able to find are less likely to appear in code that has already been subject to those techniques’. To which the correct response is ‘well, duh’.
The original Coverity paper, which introduced a large range of brand new static analysis techniques, found a load of bugs in old code. When we started running existing C and C++ code on CHERI, we saw very little correlation between the bugs that we found and the age of the codebase (we found quite a few bugs that were 20+ years old).
If you remove the sample bias, the results are far less clear cut and there are a load of confounding factors. If a memory-safety bug causes random crashing in one in a million runs of a userspace program based on some non-deterministic factor, it’s unlikely that anyone will debug it. If a sequence of actions reliably crashes a kernel, it will probably be fixed. If an attacker finds it and is actively exploiting it, it will almost certainly be fixed. The symptoms and reproducibility of the bug have a huge impact on whether it will be fixed.
Hashcat v7.0.0 released https://hashcat.net/forum/thread-13330-post-63567.html#pid63567
Proton’s Lumo AI chatbot: not end-to-end encrypted, not open source
https://pivot-to-ai.com/2025/08/02/protons-lumo-ai-chatbot-not-end-to-end-encrypted-not-open-source/ - text
https://pivottoai.libsyn.com/20250802-protons-lumo-ai-chatbot-not-end-to-end-not-open-source - podcast
https://www.youtube.com/watch?v=HDPZbUPUFyk&list=UU9rJrMVgcXTfa8xuMnbhAEA - video
a 2661 byte program I wrote just won the "Sur Prize" at the International Obfuscated C Code Competition. You can probably guess what it is once I mention that @foone might enjoy it
How to craft a raw TCP socket without Winsock? https://leftarcode.com/posts/afd-reverse-engineering-part1/
From a CBS news segment from July of 1985 discussing the busting of various #hackers and BBS operators in New Jersey.
Ouch, but also 💀
Will be uploading the entire segment to Internet Archive later today.
Another day, another conversation with the press team where I explain that I did not give the quote in that story and the whole thing is AI slop. This happens once every few weeks now.
In 1983, Philips produced the first FM radio receiver on a chip, leading to products such as the FM radio wristwatch. Let's look at the tiny silicon die inside this chip and see how it works. 1/N