asciilifeform just got back to his cockpit actually, a few hrs ago
asciilifeform: it's a thing that's been crying to have itself done for a good twenty years.
asciilifeform: decimation: see also mircea_popescu's article.
asciilifeform: 'hello fellow dog, you must also be a dog for every living thing is a dog; what kind of dog are you'
asciilifeform feels mind utterly boggled at this offer of 'help' of the 'have you tried plugging it in' variety.
asciilifeform: aha, suggestion is that we occupy ourselves with a permanent game of whack-a-mole.
asciilifeform: but they reply to the spoofed address (victim's) rather than attacker's.
asciilifeform: these reply with N bytes for each spoofed byte sent, hence term 'amplification'
asciilifeform: svetlana: perhaps you know it under another name. attacker sends spoofed packets to a series of machines, usually misconfigured routers and embedded systems of other kinds
asciilifeform: svetlana: not familiar with term 'amplification attack' ?
asciilifeform: svetlana: standard ntp and ssdp 'amplification' attack
asciilifeform: svetlana: i got a massive packet dump, and so has kakobrekla☟︎
asciilifeform: what is the suggested solution (other than '+i' which was discussed at one point, bitter pill)
asciilifeform: mircea_popescu: your site appears to be down
asciilifeform: BingoBoingo will enjoy my comment on trilema then (when that site is back...)
asciilifeform fesses up that he worked on it, on and off, for some months, so as to have a 'killerapp' application for cardano when the latter is unwrapped
asciilifeform will then end up stuck with doing actual werk
asciilifeform wrestles with dilemma of whether he should open up his 90 or so percent implementation of mircea_popescu's RFP
asciilifeform: anyone learn the fate of nanotube yet ?
asciilifeform: punkman: but back to original question, mips is vastly easier to implement in programmable logic of whatever kind than x86. this ought to be obvious to anyone with even an evening's familiarity with both.
asciilifeform: e.g., an adder, a shifter, uart, 500 other kinds of part.
asciilifeform: mostly they hook up vendor 'library' parts together. these usually (though not always) correspond to miniature 'islands' of asic present on the chip
asciilifeform: folks doing actual work with fpga make very light use of the general-purpose routing matrix
asciilifeform: this is because the entire fpga concept, as imagined by n00bs to the subject, does not actually work.
asciilifeform: punkman: one can attempt to work with just the synthesis toolchain (no escape from it) and use netlists of 'raw' logic - i.e. simple universal constructs like 'nand gate'. the result - go try it - a very simple kindergarten-level circuit fills up the entire chip, with glacial performance (gate delays measured in msec!)
asciilifeform: punkman: [fpga thread] would MIPS be easier than x86? or does the problem lie in connecting the thing to outside world (fast RAM, peripherals, etc) << problem is that you can't make so much as a barrel shifter on any extant fpga without using a closed turd from the vendor - actually, two turds: one in the logic library part itself, other - the synthesis toolchain
asciilifeform would have been less said to spend equivalent, e.g., usd, heap
asciilifeform just about emptied wallet paying mr. p for conference-3 ticket. invites #b-a folks to laugh.
asciilifeform: 'Turns out through the S3 API you can actually spin up EC2 instances, and my key had been spotted by a bot that continually searches GitHub for API keys. Amazon AWS customer support informed me this happens a lot recently, hackers have created an algorithm that searches GitHub 24 hours per day for API keys Once it finds one it spins up max instances of EC2 servers to farm itself bitcoins ' << mega-lol!