Hacker News new | past | comments | ask | show | jobs | submit | blopeur's comments login


This paper prove that the Tesla's comparison of raw Autopilot crash data to average human driver crash data is deceptive because it doesn't adjust for the safety of the operating domain (among other factors).

It creating an apples-to-apples comparison of crash data based on the operating domain, he also adjusted for owner age. The results effectively eliminate Tesla's claim that Autopilot meaningfully improves safety outcomes.


NEC press release : https://www.nec.com/en/press/202203/global_20220317_01.html

Papers describing universal gate set for thier quantum computing proposal with all-to-all connectivity and intrinsic robustness to bit-flip errors based on the parity encoding : https://arxiv.org/pdf/2205.09517.pdf

complementary paper demonstrating the applicability of the universal gate set in the parity encoding, by exploring several quantum gate algorithms such as the Quantum Fourier Transform and Quantum Addition : https://arxiv.org/pdf/2205.09505.pdf



Preprint for the curious : https://www.oxfordmartin.ox.ac.uk/downloads/academic/Disrupt...

Interesting bits : The reversal after 2010 and subsequentproductivity growth tends for remote collaboration to follow a J-curve as complementary investments and organisational changes are required to realise the benefits of new technologies



Summary: An Intel CPU in "Red Unlock" mode allows any user-mode code to read and write its microcode. The paper teaches security researchers how to do it. They can use it to discover undocumented Intel CPU internals and functionality.

I don't know if these instructions will be useful in exploits. They require the CPU to be in Red Unlock mode. One known way to enable Red Unlock requires connecting a special cable to the motherboard's USB port and exploiting the Intel Trusted Execution Engine core [0].

There are probably remote exploits via ethernet and the Intel Management Engine.

Could there be some motherboards that shipped with Red Unlock mode permanently enabled? User-mode code running on such machines could trivially root the machine and even escape a hypervisor.

[0] https://github.com/ptresearch/IntelTXE-PoC


thanks for linking to the paper, that contains considerably more information






Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: