“Hello World” from my new DIY Framework laptop (some assemble required). Found Framework when I started shopping for a new personal daily driver and found this review: The 4 Best Laptops For Programming - Winter 2023: Reviews - RTINGS.com. Love RTR, happy to support it. Currently running Kinetic Kudu (Ubuntu 22.10) to get up and running quickly. Will soon add Windows and Qubes, with Qubes to be the daily driver.
About myself: older than dirt. Started programming over 50 years ago, on the IBM 1130. Later played where the software meets the silicon for DEC when we were the world’s second largest computer manufacturer. Wrote some of the bootloader and exec kernel for RSX, the premier PDP-11 os.
After DEC imploded went to work for an end user company (Instinet) that had an RSX app matching buyers and sellers of stock. We didn’t sell IT but one of my projects was helping debug custom CPU silicon in-house. It was bespoke design using FPGAs to implement the PDP-11 instruction set architecture incorporating RISC techniques like branch prediction and speculative execution to push performance. Neat stuff, needed to keep up with business expansion and buy time for porting the app to a modern platform. At the time we were executing about 15% to 20% of NASDAQ’s daily volume on those PDPs, and DEC had stopped making them but NASDAQ volume was exploding.
More recently I got into cybersecurity. For the last fifteen years I’ve been doing CND (computer network defence) for the U.S. government, protecting against full scope cyber threats and adversaries.
This report about the Pegasus malware gives an idea of the stuff I like to play with, and why: The Million Dollar Dissident: NSO Group's iPhone Zero-Days used against a UAE Human Rights Defender - The Citizen Lab. I urge you to read it also to understand why I think an inherently more secure os like Qubes is a really big deal.
I’m looking forward to using Framework and Qubes as a research platform and daily driver. Very interested in coreboot, both for Qubes and from my interest in researching pre-boot security. My goal is being able to run an malware reversing lab on my daily driver, with confidence that the hardware and os will enforce isolation well enough to make it as safe as a truly airgapped standalone hardware environment. Also want to bust out my Facedancer and do some USB reversing, already wondering how the Framework expansion modules could be used for implementing tools like Cynthion (USB MITM hardware) or a JTAG reader…
Non technical interests include flying (vfr only pp-asel and proud M20E owner ), homebrewing beer, Burning Man (FLG style propane flame effects), pyrotechnics (just signed up to take a PGI DOC class in a few weeks).
I’m always happy to collaborate with like minded friends so don’t hesitate to hmu if anything I mentioned resonates with you.