SlideShare a Scribd company logo
1 of 45
Download to read offline
DIY Internet with
MinimaLT
Low-latency secure networking
JSConf.EU 2013
Andy Wingo
wingo@igalia.com
Compiler hacker at Igalia
Recently: ES6 generators in V8, SpiderMonkey
(sponsored by Bloomberg)
Not a cryptographer
This talk is for folks that deploy both endpoints,
for cryptonerds, and for early-stage tinkerers
You are here
Context: Militarization of daily life
Generals peeping on your web searches
Read the wrong things and they send the SWAT
team
what’s he building in there?
what’s he building in there?
He has subscriptions to those RSS feeds
And he’s been tweeting about MinimaLT
We’re in his router, and his mobile phone
You won’t believe what we got from the drone
What’s he building in there?
What the hell is he building in there?
We have a right to know
Solution?
Smash the state!
Meanwhile, let’s not make it easy for the NSA
HTTPS vs...
Attack vectors:
❧ Cryptanalysis (RC4)
❧ MITM via rogue certificates (DigiNotar &c)
❧ Use JavaScript! CRIME, BEAST, ...
❧ Backdoors in TLS implementations
(Windows?)
HTTPS vs...
Attack vectors:
❧ Cryptanalysis (RC4)
❧ MITM via rogue certificates (DigiNotar &c)
❧ Use JavaScript! CRIME, BEAST, ...
❧ Backdoors in TLS implementations
(Windows?)
❧ HTTP
HTTPS vs HTTP
“Cryptography that is not actually used can be
viewed as the ultimate disaster” – DJB
competitions.cr.yp.to/disasters.html

How many of you...
HTTPS vs HTTP
“Cryptography that is not actually used can be
viewed as the ultimate disaster” – DJB
competitions.cr.yp.to/disasters.html

How many of you...
❧ use EFF’s “HTTPS everywhere” extension?
HTTPS vs HTTP
“Cryptography that is not actually used can be
viewed as the ultimate disaster” – DJB
competitions.cr.yp.to/disasters.html

How many of you...
❧ use EFF’s “HTTPS everywhere” extension?
❧ never use plain HTTP with Google?
HTTPS vs HTTP
“Cryptography that is not actually used can be
viewed as the ultimate disaster” – DJB
competitions.cr.yp.to/disasters.html

How many of you...
❧ use EFF’s “HTTPS everywhere” extension?
❧ never use plain HTTP with Google?
There is a reason for this
Anatomy of a GET
000.00

→ www.gnu.org

TCP

SYN

Visiting http://www.gnu.org/ over French
wired ADSL.
Anatomy of a GET
000.00
130.50

→ www.gnu.org
← www.gnu.org

TCP
TCP

SYN
SYN/ACK

130 ms RTT, ~65ms latency.
Remote server hosted in Boston, ~4000 miles
away.
4000 miles is 22 light-milliseconds.
Anatomy of a GET
000.00
130.50
130.78

→ www.gnu.org
← www.gnu.org
→ www.gnu.org

TCP
TCP
HTTP

The GET is delayed by 130 ms.

SYN
SYN/ACK
GET /
Anatomy of a GET
000.00
130.50
130.78
278.00

→
←
→
←

www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org

TCP
TCP
HTTP
TCP

SYN
SYN/ACK
GET /
[begin]

Begin receiving response. Early parsing.
Anatomy of a GET
000.00
130.50
130.78
278.00
282.00

→
←
→
←
→

www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org

TCP
TCP
HTTP
TCP
TCP

SYN
SYN/ACK
GET /
[begin]
SYN x 3

Kick off more connections for parallel fetch.
Anatomy of a GET
000.00
130.50
130.78
278.00
282.00
410.71

→
←
→
←
→
←

www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org

TCP
TCP
HTTP
TCP
TCP
HTTP

SYN
SYN/ACK
GET /
[begin]
SYN x 3
200 OK

Total: 7108 bytes over 411 milliseconds.
Anatomy of a GET
000.00
130.50
130.78
278.00
282.00
410.71
414.85

→
←
→
←
→
←
→

www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org

TCP
TCP
HTTP
TCP
TCP
HTTP
TCP

SYN
SYN/ACK
GET /
[begin]
SYN x 3
200 OK
SYN/ACK x 3

Initial round-trip kills parallel fetch :-(
HTTPS sadness
000.00

→ www.gnu.org

TCP

SYN
HTTPS sadness
000.00
129.91
130.46

→ www.gnu.org
← www.gnu.org
→ www.gnu.org

TCP
TCP
TLS

SYN
SYN/ACK
Client Hello
HTTPS sadness
000.00
129.91
130.46
266.13
267.08
267.73

→
←
→
←
←
→

www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org

TCP
TCP
TLS
TLS
TLS
TLS

SYN
SYN/ACK
Client Hello
Server Hello
Certificate
Key Exchange
HTTPS sadness
000.00
129.91
130.46
266.13
267.08
267.73
449.06
449.10

→
←
→
←
←
→
←
→

www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org

TCP
TCP
TLS
TLS
TLS
TLS
TCP
TLS

SYN
SYN/ACK
Client Hello
Server Hello
Certificate
Key Exchange
ACK (???)
Change Cipher
HTTPS sadness
000.00
129.91
130.46
266.13
267.08
267.73
449.06
449.10
580.28
583.72

→
←
→
←
←
→
←
→
←
→

www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org

TCP
TCP
TLS
TLS
TLS
TLS
TCP
TLS
TLS
HTTPS

SYN
SYN/ACK
Client Hello
Server Hello
Certificate
Key Exchange
ACK (???)
Change Cipher
Change Cipher
GET /
HTTPS sadness
000.00
129.91
130.46
266.13
267.08
267.73
449.06
449.10
580.28
583.72
764.97

→
←
→
←
←
→
←
→
←
→
←

www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org
www.gnu.org

TCP
TCP
TLS
TLS
TLS
TLS
TCP
TLS
TLS
HTTPS
HTTPS

... and then the CSS, the JS, ...

SYN
SYN/ACK
Client Hello
Server Hello
Certificate
Key Exchange
ACK (???)
Change Cipher
Change Cipher
GET /
200 OK
MinimaLT, a low-latency
networking protocol
“properly implemented, strong crypto”
... that connects faster than TCP
SYN/ACK – Just say no!
Properly implemented, strong
crypto
Uses high-level NaCl library from @hashbreaker
and @hyperelliptic
Avoids many HTTPS/TLS pitfalls
❧ Well-chosen cyphers
❧ Timing-independent implementation
❧ No plaintext (HTTP) mode
MinimaLT adds forward secrecy
Minimal latency
1 round trip if you need “DNS” lookup
0 otherwise
Persistent tunnels
Tunnels can migrate over IP changes – invisible
to applications
A protocol for today’s internet
UDP-based
Reliable: replaces TCP + TLS
Denial-of-Service (DoS) resistance
Low overhead, scales to tens of Gb/s
Tunnels and connections
Tunnels multiplex connections
Connection 0 is the control connection
❧ flow control
❧ connection creation
❧ authentication (client certs)
Multiple connections can proceed concurrently
QUIC more advanced here in some ways
Wire protocol
c
l
e
a
r
c
y
p
h
e
r

+----------------------+
| Ethernet, IP, UDP
|
|----------------------|
| Tunnel ID, Nonce
|
|----------------------|
| Ephemeral public key |
|======================|
| Checksum
|
|----------------------|
| Seq, Ack
|
|----------------------|
| Payload
|
| ...
|

42 bytes
16 bytes
32 bytes (first)
16 bytes
8 bytes
Crypto
NaCl “box”:
+------------+ C'→S'
| Cyphertext |
n
+------------+

Tunnel ID (TID): a random 64-bit number,
provided by client when creating the tunnel
After first packet, TID looks up C'→S': the
shared secret
Protocol to change TID and evolve shared secret
for forward security
How to get server’s public key?
TLS:
❧ Client knows address of DNS provider
❧ DNS gives server address (maybe)
❧ Client connects to server, server provides
certificate
❧ Client verifies cert. using public key
infrastructure (PKI)
How to get server’s public key?
MinimaLT:
❧ Client knows address, long-term key of
Directory Service
❧ Server registers address, port, long-term
public key and ephemeral public key with
DS
❧ Client asks DS for server info, trusts DS
Servers could register info in DNS records with
suitably low TTL (TBD)
Directory server protocol
At first lookup of any name, or at boot:
❧ 1 round-trip to fetch DS’s ephemeral key
To look up a name:
❧ 1 round-trip using fresh ephemeral client
key, DS’s ephemeral key
Authenticated and encrypted
Performance
The “expensive” part: establishing the shared
secret via Curve25519, which happens when
tunnels are created.
❧ 8000 connections/s/core on modern x86
❧ ~750 connections/s/core on modern ARM
(estimate)
Afterwards, MinimaLT can saturate Gb/s links
Denial-of-Service
Why is MinimaLT able to avoid 3-way
handshake?
❧ A server can slow down clients arbitrarily
using puzzles
❧ Clients may have to “mine for bitcoins”
❧ Puzzles can be sent at any point (tunnel GC)
❧ Pre-RT responses should be smaller than
requests (hello DNSSEC)
Amplification vs latency?
In general, response can be larger than the
request (e.g. HTTP GET)
Does the client IP (spoofable cleartext)
correspond to the client request (authenticated,
tamper-proof)?
One round trip seems needed in general :-(
Mitigated by long-term tunnels, multiplexed
connections
No worse than TCP
Faster than TCP
0RT connects faster than TCP at any latency
above 0.5 ms (150 km)
Always faster than OpenSSL
At 64ms latency: 130ms full connection,
request, response vs 516ms for OpenSSL
Compare to 278ms for HTTP
Tor-friendly
Project status
University of Illinois at Chicago research project
(Jon Solworth)
Very 2013
Ethos, new Xen-based OS
❧ Security-focused
❧ Typed filesystem, typed IPC
❧ Written in C and Go
http://ethos-os.org/

W. Michael Petullo doing MinimaLT
MinimaLT: remote IPC for
Ethos
res := <-Ipc("example.com", "http",
"GET", "/")
res := <-Ipc("example.com", "foo",
&Foo{bar:42, baz:"qux"})
And POSIX?
Ongoing work to make a shared library; expect
it out shortly
minimalt_connection*
minimalt_connect_and_write
(char *host, char *service,
uint8_t *data, size_t count);

Probably not RPC-based – type tools are a mess
And JavaScript?? :)
Upcoming: Libuv integration, and from there to
Node
❧ MinimaLT needs an event loop running,
somehow
Pure-JS reliability layer?
❧ Experiments in congestion control
On the front lines
Bandwidth goes up, but latency stays the same.
There is demand for privacy at low latency:
demand for a new protocol.
Go forth and hack!
MinimaLT @ ACM CCS 2013 – Here (Berlin) in
Nov.
SYN/ACK – Just say no!
@andywingo for slides, upcoming lib release

More Related Content

What's hot

Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse game
Jaime Sánchez
 
securing_syslog_onFreeBSD
securing_syslog_onFreeBSDsecuring_syslog_onFreeBSD
securing_syslog_onFreeBSD
webuploader
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
PROIDEA
 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentals
Tariq kanher
 
Layer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacksLayer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacks
fangjiafu
 

What's hot (20)

DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense Vector
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse game
 
WiFi practical hacking "Show me the passwords!"
WiFi practical hacking "Show me the passwords!"WiFi practical hacking "Show me the passwords!"
WiFi practical hacking "Show me the passwords!"
 
HTTP/3 in curl 2020
HTTP/3 in curl 2020HTTP/3 in curl 2020
HTTP/3 in curl 2020
 
Practical Verification of TKIP Vulnerabilities
Practical Verification of TKIP VulnerabilitiesPractical Verification of TKIP Vulnerabilities
Practical Verification of TKIP Vulnerabilities
 
securing_syslog_onFreeBSD
securing_syslog_onFreeBSDsecuring_syslog_onFreeBSD
securing_syslog_onFreeBSD
 
HTTP/3 is next generation HTTP
HTTP/3 is next generation HTTPHTTP/3 is next generation HTTP
HTTP/3 is next generation HTTP
 
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
CONFidence 2018: Darknet traffic - what can we learn from nooks and crannies ...
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
Ángel Palomo Cisneros - Programming and playing a MITM attack [rooted2018]
 
Ddos and mitigation methods.pptx
Ddos and mitigation methods.pptxDdos and mitigation methods.pptx
Ddos and mitigation methods.pptx
 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentals
 
An introduction to MQTT - Pub / Sub for the masses
An introduction to MQTT - Pub / Sub for the massesAn introduction to MQTT - Pub / Sub for the masses
An introduction to MQTT - Pub / Sub for the masses
 
Product_Engineer_Zscaler
Product_Engineer_ZscalerProduct_Engineer_Zscaler
Product_Engineer_Zscaler
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
 
Preventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP addressPreventing Traffic with Spoofed Source IP address
Preventing Traffic with Spoofed Source IP address
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
Layer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacksLayer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacks
 
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
Pursue the Attackers – Identify and Investigate Lateral Movement Based on Beh...
 
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environmentThreat hunting != Throwing arrow! Hunting for adversaries in your it environment
Threat hunting != Throwing arrow! Hunting for adversaries in your it environment
 

Similar to DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)

Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
masoodnt10
 
Smit WiFi_2
Smit WiFi_2Smit WiFi_2
Smit WiFi_2
mutew
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
Rishabh Mehan
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
SecurityTube.Net
 

Similar to DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013) (20)

Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
Primer to Browser Netwroking
Primer to Browser NetwrokingPrimer to Browser Netwroking
Primer to Browser Netwroking
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Smit WiFi_2
Smit WiFi_2Smit WiFi_2
Smit WiFi_2
 
Firewall
FirewallFirewall
Firewall
 
Practical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacksPractical steps to mitigate DDoS attacks
Practical steps to mitigate DDoS attacks
 
Root via sms. 4G security assessment
Root via sms. 4G security assessment Root via sms. 4G security assessment
Root via sms. 4G security assessment
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
 
WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)
WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)
WebSockets Everywhere: the Future Transport Protocol for Everything (Almost)
 
Troubleshooting TCP/IP
Troubleshooting TCP/IPTroubleshooting TCP/IP
Troubleshooting TCP/IP
 
Approaches to application request throttling
Approaches to application request throttlingApproaches to application request throttling
Approaches to application request throttling
 
9534715
95347159534715
9534715
 
Cloudflare lower network latency = faster website loads
Cloudflare lower network latency = faster website loadsCloudflare lower network latency = faster website loads
Cloudflare lower network latency = faster website loads
 
WebSocket Perspectives 2015 - Clouds, Streams, Microservices and WoT
WebSocket Perspectives 2015 - Clouds, Streams, Microservices and WoTWebSocket Perspectives 2015 - Clouds, Streams, Microservices and WoT
WebSocket Perspectives 2015 - Clouds, Streams, Microservices and WoT
 
14 network tools
14 network tools14 network tools
14 network tools
 
Networking and Go: An Engineer's Journey (Strangeloop 2019)
Networking and Go: An Engineer's Journey (Strangeloop 2019)Networking and Go: An Engineer's Journey (Strangeloop 2019)
Networking and Go: An Engineer's Journey (Strangeloop 2019)
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
VISUG - Approaches for application request throttling
VISUG - Approaches for application request throttlingVISUG - Approaches for application request throttling
VISUG - Approaches for application request throttling
 

More from Igalia

Building End-user Applications on Embedded Devices with WPE
Building End-user Applications on Embedded Devices with WPEBuilding End-user Applications on Embedded Devices with WPE
Building End-user Applications on Embedded Devices with WPE
Igalia
 
Automated Testing for Web-based Systems on Embedded Devices
Automated Testing for Web-based Systems on Embedded DevicesAutomated Testing for Web-based Systems on Embedded Devices
Automated Testing for Web-based Systems on Embedded Devices
Igalia
 
Running JS via WASM faster with JIT
Running JS via WASM      faster with JITRunning JS via WASM      faster with JIT
Running JS via WASM faster with JIT
Igalia
 
Introducción a Mesa. Caso específico dos dispositivos Raspberry Pi por Igalia
Introducción a Mesa. Caso específico dos dispositivos Raspberry Pi por IgaliaIntroducción a Mesa. Caso específico dos dispositivos Raspberry Pi por Igalia
Introducción a Mesa. Caso específico dos dispositivos Raspberry Pi por Igalia
Igalia
 

More from Igalia (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Building End-user Applications on Embedded Devices with WPE
Building End-user Applications on Embedded Devices with WPEBuilding End-user Applications on Embedded Devices with WPE
Building End-user Applications on Embedded Devices with WPE
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automated Testing for Web-based Systems on Embedded Devices
Automated Testing for Web-based Systems on Embedded DevicesAutomated Testing for Web-based Systems on Embedded Devices
Automated Testing for Web-based Systems on Embedded Devices
 
Embedding WPE WebKit - from Bring-up to Maintenance
Embedding WPE WebKit - from Bring-up to MaintenanceEmbedding WPE WebKit - from Bring-up to Maintenance
Embedding WPE WebKit - from Bring-up to Maintenance
 
Optimizing Scheduler for Linux Gaming.pdf
Optimizing Scheduler for Linux Gaming.pdfOptimizing Scheduler for Linux Gaming.pdf
Optimizing Scheduler for Linux Gaming.pdf
 
Running JS via WASM faster with JIT
Running JS via WASM      faster with JITRunning JS via WASM      faster with JIT
Running JS via WASM faster with JIT
 
To crash or not to crash: if you do, at least recover fast!
To crash or not to crash: if you do, at least recover fast!To crash or not to crash: if you do, at least recover fast!
To crash or not to crash: if you do, at least recover fast!
 
Implementing a Vulkan Video Encoder From Mesa to GStreamer
Implementing a Vulkan Video Encoder From Mesa to GStreamerImplementing a Vulkan Video Encoder From Mesa to GStreamer
Implementing a Vulkan Video Encoder From Mesa to GStreamer
 
8 Years of Open Drivers, including the State of Vulkan in Mesa
8 Years of Open Drivers, including the State of Vulkan in Mesa8 Years of Open Drivers, including the State of Vulkan in Mesa
8 Years of Open Drivers, including the State of Vulkan in Mesa
 
Introducción a Mesa. Caso específico dos dispositivos Raspberry Pi por Igalia
Introducción a Mesa. Caso específico dos dispositivos Raspberry Pi por IgaliaIntroducción a Mesa. Caso específico dos dispositivos Raspberry Pi por Igalia
Introducción a Mesa. Caso específico dos dispositivos Raspberry Pi por Igalia
 
2023 in Chimera Linux
2023 in Chimera                    Linux2023 in Chimera                    Linux
2023 in Chimera Linux
 
Building a Linux distro with LLVM
Building a Linux distro        with LLVMBuilding a Linux distro        with LLVM
Building a Linux distro with LLVM
 
turnip: Update on Open Source Vulkan Driver for Adreno GPUs
turnip: Update on Open Source Vulkan Driver for Adreno GPUsturnip: Update on Open Source Vulkan Driver for Adreno GPUs
turnip: Update on Open Source Vulkan Driver for Adreno GPUs
 
Graphics stack updates for Raspberry Pi devices
Graphics stack updates for Raspberry Pi devicesGraphics stack updates for Raspberry Pi devices
Graphics stack updates for Raspberry Pi devices
 
Delegated Compositing - Utilizing Wayland Protocols for Chromium on ChromeOS
Delegated Compositing - Utilizing Wayland Protocols for Chromium on ChromeOSDelegated Compositing - Utilizing Wayland Protocols for Chromium on ChromeOS
Delegated Compositing - Utilizing Wayland Protocols for Chromium on ChromeOS
 
MessageFormat: The future of i18n on the web
MessageFormat: The future of i18n on the webMessageFormat: The future of i18n on the web
MessageFormat: The future of i18n on the web
 
Replacing the geometry pipeline with mesh shaders
Replacing the geometry pipeline with mesh shadersReplacing the geometry pipeline with mesh shaders
Replacing the geometry pipeline with mesh shaders
 
I'm not an AMD expert, but...
I'm not an AMD expert, but...I'm not an AMD expert, but...
I'm not an AMD expert, but...
 
Status of Vulkan on Raspberry
Status of Vulkan on RaspberryStatus of Vulkan on Raspberry
Status of Vulkan on Raspberry
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

DIY Internet: Snappy, Secure Networking with MinimaLT (JSConf EU 2013)