USA is always bitching about China and yet, it uses its giant techs to spy on the whole world. Microsoft O365 blocking Europen politics email account by Trump demands.
Seeing Europe ditching USA big techs software/SaaS in flavor of open-source, is the best thing that could have happened.
Back to the F-35, anything built before 80s, were built to last.
Everything built now is built to break and overly engineered, it is like if the whole world decided to become German engineers and yet have no idea of what they are doing.
Australia F-35 program has been a complete fiasco, the project budget no longer knows what budget means, relaying on USA technology or anything really has been proved to be very costly and you don't really own it, the USA does.
Just like China but China cannot do what the USA can for whatever reason.
If it’s anything like the code in passenger vehicles or airplanes, it is:
- spaghetti code that’s difficult or impossible to formally exercise fully in unit, comprehensive, or proof-centric testing
- delivered as compiled binaries for industrial-chip architectures by e.g. Renesas that have extremely hardened hardware and resilience
- annoying but feasible to reverse engineer in Ghidra
- designed to prioritize repairability over firmware signature enforcement
- has an undocumented but wire-sniffable protocol for firmware updates
So I am of a mind to take their statement at face value, because it’s vanishingly unlikely that the U.S. disallows field patching of a warplane due to lacking a crypto private key, much less bothers to spend money on crypto-attestation style locks. This is USgov military-industrial, not Bay Area marketer tech à la Google; competent security practices in deployed hardware are not likely to be the norm, especially not when every plane includes armed guards free of charge to the contract.
If I were a competent defense partner with the USgov, I would have already commissioned and complete a full decompilation, because duh. That the Dutch are saying this openly is charming but not particularly surprising. Presumably there’s a US backdoor in the IFF module, for instance, and while it’s fine to leave it in place, it’s better than fine to patch a warning alert in so that you know when it’s exercised. This is basic defense programming 101 stuff here, right? .. right?
Why is anyone surprised anyway??
USA is always bitching about China and yet, it uses its giant techs to spy on the whole world. Microsoft O365 blocking Europen politics email account by Trump demands.
Seeing Europe ditching USA big techs software/SaaS in flavor of open-source, is the best thing that could have happened.
Back to the F-35, anything built before 80s, were built to last. Everything built now is built to break and overly engineered, it is like if the whole world decided to become German engineers and yet have no idea of what they are doing.
Australia F-35 program has been a complete fiasco, the project budget no longer knows what budget means, relaying on USA technology or anything really has been proved to be very costly and you don't really own it, the USA does. Just like China but China cannot do what the USA can for whatever reason.
He managed to install LineageOS on it?
Let me know when it runs DOOM
Isn't public disclosure of military secrets a criminal offence? Ah well.
Not if it’s an official government negotiating ploy.
But it's not Dutch secret, right? It's the USA's one, right? All in all, kinda makes me suspect that statement is simply untrue.
If it’s anything like the code in passenger vehicles or airplanes, it is:
- spaghetti code that’s difficult or impossible to formally exercise fully in unit, comprehensive, or proof-centric testing
- delivered as compiled binaries for industrial-chip architectures by e.g. Renesas that have extremely hardened hardware and resilience
- annoying but feasible to reverse engineer in Ghidra
- designed to prioritize repairability over firmware signature enforcement
- has an undocumented but wire-sniffable protocol for firmware updates
So I am of a mind to take their statement at face value, because it’s vanishingly unlikely that the U.S. disallows field patching of a warplane due to lacking a crypto private key, much less bothers to spend money on crypto-attestation style locks. This is USgov military-industrial, not Bay Area marketer tech à la Google; competent security practices in deployed hardware are not likely to be the norm, especially not when every plane includes armed guards free of charge to the contract.
If I were a competent defense partner with the USgov, I would have already commissioned and complete a full decompilation, because duh. That the Dutch are saying this openly is charming but not particularly surprising. Presumably there’s a US backdoor in the IFF module, for instance, and while it’s fine to leave it in place, it’s better than fine to patch a warning alert in so that you know when it’s exercised. This is basic defense programming 101 stuff here, right? .. right?
just how, the dutch would manage to find that out, would be a big deal.
espionage, would be the name of that witch.
Didn't you hear? American laws apply to everyone now. /s