Putting the "You" in CPU (2023)

(cpu.land)

98 points | by vinhnx 6 days ago ago

25 comments

  • amelius 2 days ago ago

    Meanwhile, companies are taking the "You" out of the CPU so they can control your hardware and by indirection, you.

    • high_na_euv 2 days ago ago

      How?

      • immibis a day ago ago

        Secure boot etc. It's in every ARM device, including the management engines in x64 devices (which are ARM devices).

        • high_na_euv a day ago ago

          Oh, I see.

          Fortunely there is still x86

          • hnuser123456 a day ago ago

            You would need to go back to ~2005-era Intel x86 CPUs to have x86 without a backdoor baked into the silicon (as far as we know), like Pentium 4. The Core 2 / Q6600 / P35 chipset already had an early version of it. Wikipedia says AMD added their equivalent, the Platform Security Processor, around 2013, so their best CPU from 2012 would be the FX-8350.

            • kimixa a day ago ago

              I mean technically there's nothing they can do that SMM couldn't - introduced in a revision of the 386. It's code running with system permissions invisible to the "parent" user code and OS.

              You're already pretty much trusting the same people then as now, at least if they are "actively malicious".

          • amelius a day ago ago

            There is https://en.wikipedia.org/wiki/Intel_Management_Engine

            Anyway, it will be maybe a few years until the governments will get the idea of enforcing their own management engines into our hardware :/

          • LargoLasskhyfv a day ago ago

            > Oh, I see.

            No, you don't.

            Because of the SMI/ACPI/Intel Management Engine/AMD Secure Technology/UEFI, and optionally AMT-complex, where usually only parts of can be deactivated partially, but never all of it.

            It's actually more bad than the above mentioned ARM-stuff, which is misinformed(maybe because of raspberry piish broadcomisms, or locked down dumbphones), because on ARM, you either can disable that stuff, or even can run your own instead.

            https://www.trustedfirmware.org/projects/op-tee/

            https://github.com/OP-TEE

            https://docs.kernel.org/next/tee/op-tee.html

  • lucasoshiro a day ago ago

    Since the first time that I saw this here in HN I've been sharing it with several people around me. This including CS students, CS professors and non-technical people who only asked "how does a computer work?". I only say "just type 'cpu.land' and read that". This is one of the best things that I've found here.

  • napolux a day ago ago
  • Isamu a day ago ago

    I think this is a good overview for most people, this is probably what they want.

    For me personally I was surprised given the name that very little is about cpus and most of the material is in the operating system.

    • archmaster a day ago ago

      I guess I gotta write one about CPUs now ;)

      • Isamu a day ago ago

        No problem really, I think most people want to bootstrap quickly from the low level into the higher abstractions that they care about, few people want to stay down in the cpu itself.

  • CagedCoder a day ago ago

    > The bottom of every page is padded so readers can maintain a consistent eyeline.

    God bless

  • itopaloglu83 2 days ago ago

    Great introduction to programming fundamentals as well.

    Being able to explain something this simply usually requires a very good understanding of the entire subject.

  • enricotr a day ago ago

    Very fine site!

  • drob518 2 days ago ago

    Great presentation.

  • 30667952 a day ago ago

    [dead]

  • 30667952 a day ago ago

    [dead]

  • 30667952 15 hours ago ago

    [dead]

  • 30667952 a day ago ago

    [dead]

  • duo123 a day ago ago

    [dead]

  • 30667952 a day ago ago

    [dead]

  • 30667952 a day ago ago

    [dead]

  • duo123 a day ago ago

    [dead]