Well.. this might be the most lack of any substance talk I've ever watched, riddled with personal jabs, poor taste embedded tweets, "basement dweller" jokes.
"What kind of security mitigations do you want.."
"UHH TPMS, I LIKE NO EXECUTE"
Embarrassing..
Conversation
Replying to
There are a lot of inaccurate / false claims in this talk too. One small example is confusing userspace ASLR with KASLR in that completely inaccurate timeline. I love that he's against both exploit mitigations and memory safe languages with plenty of misleading FUD about both.
He says the BSDs should work more closely together while attacking the work in HardenedBSD and OpenBSD along with people working on it. Not to mention all the uninformed attacks on other technologies / projects throughout the talk, all clearly without actually being informed.
1
5
15
He's informed, though. He simply chooses to advance a false narrative just to trash others, which is worse than being uninformed.
1
3
Show replies
This Tweet was deleted by the Tweet author. Learn more
Recent sponsored work includes x86 SMAP and SMEP, removing unnecessary kernel +X memory permission, adding build infrastructure for PIE, bind_now, retpoline, PTI, L1TF fixes, popss, kcov+syskaller, Capsicum, iommu support
1
2
Show replies



