Hacker Newsnew | past | comments | ask | show | jobs | submit | nunobrito's commentslogin

I've seen cases where documentation is seriously lacking but this project is quite something.

Was reading the comments, was able to learn more. So I assume it provides a command line interface.

Question: Can it run binaries compiled for the platform/OS?

This has been a limitation since forever on ESP microcontrollers because they basically have the power of computers and yet the flashing limitation of calculators. Would be good to finally be able to launch arbitrary binaries without flashing. (I know there are tricks right now, just looking for a proper OS-approach).


Yes. It has Unix style processes. The basic memory model is similar to ancient Unix on the PDP-11 without paging. A process gets a flat memory space. Processes are swapped out in the background as necessary.

How it is implemented varies by platform. On the 8-bit micros it takes advantage of bank-switching memory hardware if there is any. On the MMUless 68K a flat single address space can be used with position-independent code for the processes. On platforms with paging or relocation hardware that is used. Most of the host platforms do not have hardware memory protection, but there's room in the design to support it.

It has been ported to the Raspberry Pi Pico [1] (ARM Cortex-m0+ based) and could be ported to other microcontrollers which have enough RAM.

Toolchain is the biggest problem. It's hard to get a good cross toolchain that works. FUZIX's creator has been writing a portable C compiler but it's not done yet. The code does compile with Clang and GCC but a working toolchain is a steep knowledge cliff to climb.

I have got the kernel to build and link for a riscv32i target. Just need some real riscv32 hardware to test it on. And free time.

[1] https://cowlark.com/2021-02-16-fuzix-pi-pico/index.html


So it's you to thank for porting Fuzix to Raspberry Pi Pico.

>Toolchain is the biggest problem. It's hard to get a good cross toolchain that works.

So is it possible to compile programs for Fuzix on a PC?


Or that they are talking about the thunderbolt cable from Apple: https://apple.fandom.com/wiki/Thunderbolt

A truly poor name choice.


Not just relegated to Apple. That’s just the trade name for the Thunderbolt interface used on any of the “one cable to connect your dock to your laptop” devices. It all uses Thunderbolt 3, 4, or 5 these days and is on USB-C. I’ve got a Dell dock that is specifically a thunderbolt dock.

Like others said: this is implemented on operating system level, locally.

There isn't much escape other than using messengers which encrypt the data locally. Geogram radio is doing this.


I’d rather use an older or open source OS without it


They aid the truth because the complete slogan was about EU's digital sovereignity. Not really your sovereignity nor mine.


In Germany a few months prior saw CCC publishing a method for destabilizing energy grids using radio waves a cheap hardware: https://media.ccc.de/v/38c3-blinkencity-radio-controlling-st... and presented an attack vector to which most infrastructure in Europe is exposed.

About 4 hours before the grid collapse on the 28th of April 2025 was recorded the largest purchase of Monero in the past 3 years (to remember: monero is coin of choice for special operations), making it surge +40% in 24 hours. The initial Spanish reports mentioned conflicting power information from dozens of locations at the same time which is consistent with a sequential attack using the blinkencity method so the grid itself is forced to close down.


Well, if that's really the cause, then thanks CCC, I guess. For such a serious vulnerability which is probably non-trivial (not to mention expensive) to patch, is it really responsible to give only 3.5 months of time before disclosing it (according to slide #56 https://cdn.prod.website-files.com/5f6498c074436c349716e747/..., they notified EFR about the vulnerability on 2024-09-12 and disclosed it on 2024-12-28)?


IMHO wouldn't make much a difference, the issue had been known to them for years up to that point. To a large part still exists, the Spanish grid only committed to upgrade the hardware after this incident. Even so it will require about another year to complete the upgrade over there.

I don't follow in detail the news on other European nations but haven't seen much focus on hardening their security until they actually get breached. A recent example (albeit different attack vector) would be the Polish grid: https://arstechnica.com/security/2026/01/wiper-malware-targe...


Fortunately people have gotten more immune to that kind of tactic nowadays.


Color code is the other way around.

Red should meant manual human review without automated tools nor AI.

Green for proper AI review and tests verifying the expected input/outputs.


Cars nowadays are packed with microphones and permanently connected to the internet on daily basis so that drivers can have remote assistance when the car breaks once every 5 years or so.


And also so employees of said companies can spy on drivers and make fun of them: https://www.reuters.com/technology/tesla-workers-shared-sens...


Which just shows that consumers don't care. Tesla's camera surveillance wasn't exactly secret.


Equating what companies get away with, as the clear signal to what consumers care about.

And billionaires and nine-day old alts wonder why they need a bunker.


Customers care, but not enough to actually change purchasing patterns.


They care, but it is not in their top priorities


I keep hearing this one. But at least for EU, the eCall system requires external communication to be disabled until activated during serious accident. It cannot be used for tracking the vehicle in real-time.

Some parts of the legislation (https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32...):

> 2. The personal data processed pursuant to this Regulation shall only be used for the purpose of handling the emergency situations referred to in the first subparagraph of Article 5(2).

> Manufacturers shall provide clear and comprehensive information in the owner's manual about the processing of data carried out through the 112-based eCall in-vehicle system. That information shall consist of:

> the fact that there is no constant tracking of the vehicle;

That vehicle nowadays are equipped with always-on internet and microphones is not related to remote assistance.


This is such misdirection.

Your car if new enough, IS reporting its diagnostics including GPS via cell. All the time. This isn’t exactly personally identifiable so they get away with it just fine.

This is unrelated to the microphones and assistance systems.


It becomes personally identifiable through correlations with other datasets.

That is the kind of thing people allow when they click accept or decline on those pesky ”we and our 195735 partners would like to…” dialogs.


Which is exactly my point. Cars are reporting on you, but tying that to remote assistance is disingenuous.


[flagged]


Happy to read your thoughts, can you elaborate on this?


Kindly read point number 2 slowly.

There are two definitions: a) Personal Data and b) Emergency Situations

What is an emergency situation and how can a car determine it is one? These are "smart" cars which aren't nowadays smart enough to process all your data locally, so that data is sent to servers elsewhere which process if either points a) or b) apply.

It is your choice to believe that voice data is ever deleted once acquired by governments and entities thirsty to benefit from that information.

For security experts this is just another "I told you so" within a few years.


Emergency situations are defined by two situations: severe accidents and manual press of the button. Article 6 covers the data being sent, Article 5 covers the manufacturer's obligations. Your audio during the accident and your last three locations may leak, but the eCall system is not designed for a permanent phone-home system. If I remember correctly, you can't even use the eCall SIM for tracking as that'd encourage people to disable safety features.

All the things you are talking about, permanent phone-home, tracking of location, audio and video, driving habits, are tracked, sent and resold. That's what smart cars do. But it is not done through the eCall system. See it from the company perspective: why would they risk penalties for non-compliance when they can gather and resell all personal data with no risks using their own system instead of a safety one?


That is assuming the eCall system is used at all.

I stated that the microphone and network access installed on modern car for emergency situations can and will be used 24/7 when deemed "necessary" for your "security".

Different things, same hardware.


One of my favorite things about going EV is the forums tend to be full of paranoid nerds which means someone will be willing to try desoldering the cell modem off their boards to see what happens.


TikTok replied recently it wouldn't encrypt its messages either, citing user security as reason.


lip2p is not really usable as you'll see a bit further. The overhead is huge and phones will quickly be drained out of battery from trying to use it.

Maybe with PI zero always connected to the power this isn't an issue.

You are welcome to visit the https://geogram.radio to get ideas or maybe to help develop the project (it is open source). It does decentralized web hosting, as well as blogs, chat, docs, meetings, etc over other links besides internet like bluetooth, radio and other mesh configurations.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: