Ahh this OS is small enough that a university professor used it as the basis for his class assignments: write a device driver for it, or a pipe implementation, if I recall correctly. I thought it was pretty genius at the time, and it was certainly quite a challenge for the students too.
I use the FDMQ8205. It's an old part, a little pricey, but keeps the board footprint low. It also has a sufficiently high UVLO, so it acts like regular diodes during the classification phase and you don't need to factor those in to the Rcls values.
Xiaomi apparently have also stopped unlocking their bootloaders, so the "workaround" was to go to an official store and ask them perform a downgrade, and before the staff can relock the bootloader, grab the phone and run:
I dont think you need to do the forum posts but you need to request unlocking every two days and pray it works. Supposedly at 00:00 chinese local time for any chances of getting permission. Took me several months of trying non continuously.
I did that a few years ago. Had to download some tool to my PC.
Then make a request that takes 2 weeks to go through. and enter the or whatever (this was like 2016 or something).
Whole process was clearly designed to make you give up.
Their phones where junk then though and i just got something else in the end.
They're a lot better now so actually unlocking it is probably worth something now.
When you say junk then, I find that interesting as my first was a Redmi Note 4 launched in 2016, that I got in 2017 (and did this unlock process on, as I bought it in China), and the reason I got that phone in particular was its price (in the UK it was £120, in China I got it slightly cheaper at 1100 CNY) and that it was actually the fastest Android phone available at the time according to the AnTuTu benchmarks.
The modern Redmi Note series is usually a generation behind on performance now, but I keep buying them as they're still faster than I need and there's always still a decent phone less than £150. Only complaint is with the camera, which never seems to get any better even when they claim to have upgraded it.
I did that years ago when I bought a Redmi Note 4 in Shenzhen and discovered that the Chinese ROM is very locked down. I created the Mi post, but I don't remember having to make a forum post (although it does ring a slight bell). AFAIK it was just sending a DM to support on the forum / app to explain why you needed to install the Global ROM rather than the Chinese ROM (and being a foreigner was accepted as a valid reason). About a day later they unlocked the phone bootloader remotely, and then I could install any version of the Global ROM I wanted.
I've bought all my subsequent ones (Note 5, Note 8, Note 11, Note 12Pro) in either HK or UK so they all came with the Global ROM, and I've not felt the need to unlock any of them, so not tried to process since. But it definitely used to be pretty easy.
I suspect the reason for the weird process is legal to ensure that phones in China don't get unlocked in order to circumvent content controls.
Aahh this brings back memories. I first started out using Linux on my desktop and I found this fancy system monitor that made my desktop look cool. There's a section which displays filesystem usage with a button that allows mounting/unmounting with a click. I used it to mount floppy disks but it wasn't working for me, so I read the source to figure out what was wrong, then emailed Bill to contribute a patch to fix it.
It was one of my first open source contributions, and it was then that I understood the value of open source - being able to read the code, debug and then fix it yourself (and for others).
Nice, didn't know this one! This combined with a PIC10 without watchdog timer might also be an interesting combination to do more complex things. Or perhaps simply a TPL5110 with a ultra-low-power flip-flop (does it even exist?) used as a divider to get to 4 hours.
Cool, looks like text highlighting is a new addition in 2.10. There aren't any examples in the demo site of this, but can it capture the highlighted text snippets and show them in the link details page? That would help me recall quickly why I saved the link, without opening the original link and re-reading the page. I haven't really seen this in other tools (or maybe I just haven't looked hard enough), except Memex.
Well, WhatsApp backups claim they are E2E encrypted, but there’s a flow that uses their HSM for the encryption key, which still feels like some escrow system.
True but you can choose to store the key completely yourself. That fixes a big backdoor that's been around for ages.
The biggest problem remaining to me is that you don't chat alone. You're always chatting with one or more people. Right now there's no way of knowing how they handle their backups and thus the complete history of your chats with them.
It's the same thing as trying to avoid big tech reading your emails by setting up your own mailserver. Technically you can do it but in practice it's pointless because 95% of your emails go to users of Microsoft or Google anyway these days.
I have the same thoughts about the approach, and I'm actually working (on the back burner) a similar thing. It's a harman kardon "smart" speaker with a similar design where the brains are on a separate daughterboard and that's now fried.
I've already figured out the control signals and have designed a new daugterboard with an ESP32 to drive the I2S output. I just need to figure out how to downmix the audio to mono and to DSP the L/R channels into tweeter/bass outputs, or to find some code already out there that does this. Any help/pointers here would be appreciated!
One thing you might find helpful is to prototype things with GNU Radio and a GRC flowgraph. I'm not sure that would be useful for running on the ESP32, but you could at least tinker around with signal processing tactics that you could implement on it.
I’m surprised HuJSON wasn’t mentioned in the list. Tailscale uses it for their config files. I did a hacky workaround by preprocessing my JSON config with regex, but found HuJSON later.
Previously when their Yubikey 4's were found to be suceptible to the ROCA vulnerability [0], they issued replacements [1] for any customers who had affected devices. I had a few of those devices and they were replaced for free.
I guess that's a disadvantage of having a non-upgradable firmware. They can't fix these devices that are already out in the field.
As I understand it, the ROCA vulnerability is "the secrets generated by a YubiKey may be susceptible to classic cryptographic breaks", something along the level of "the cipher is inherently weak."
This vulnerability, meanwhile, appears to be in the class of "if someone has physical access to your hardware token, and has access to some specialized (expensive) hardware to do side-channel analysis, they might be able to do side-channel on your hardware token." But if someone has physical access to the hardware token... I mean, at that point, most people would consider it compromised anyways and wouldn't expect security guarantees from that point.