this post was submitted on 26 Sep 2024
1008 points (98.3% liked)

Technology

59374 readers
3169 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Apologies for posting a pay walled article. Consider subscribing to 404. They’re a journalist-founded org, so you could do worse for supporting quality journalism.

Trained repair professionals at hospitals are regularly unable to fix medical devices because of manufacturer lockout codes or the inability to obtain repair parts. During the early days of the COVID-19 pandemic, broken ventilators sat unrepaired for weeks or months as manufacturers were overwhelmed with repair requests and independent repair professionals were locked out of them. At the time, I reported that independent repair techs had resorted to creating DIY dongles loaded with jailbroken Ukrainian firmware to fix ventilators without manufacturer permission. Medical device manufacturers also threatened iFixit because it posted ventilator repair manuals on its website. I have also written about people with sleep apnea who have hacked their CPAP machines to improve their basic functionality and to repair them.

PS: he got it repaired.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 1 month ago

With the introduction of protected mode it became possible for programs to run in isolated memory spaces where they are unable to impact other programs running on the same CPU. These programs were said to be running “in a jail” that limited their access to the rest of the computer. A software exploit that allowed a program running inside the “jail” to gain root access / run code outside of protected mode was a “jailbreak”.

I still miss the narrow window in which you could make use of paging without technically being in protected mode. Basically there was like one revision of the 386 where you could set the paging bit but not protected mode and remain in real mode but with access to paging meaning you got access to paging without the additional processor overhead of protected mode. Not terribly useful since it was removed in short order, but neat to know about. Kinda like how there were a few instructions that had multiple opcodes and there was one commercially distributed assembler that used the alternative opcodes as a way to identify code assembled by it. Or POP CS - easily the most useless 80086 instruction, so useless that the opcode for it got repurposed in the next x86 processor.