I firmly believe that designing custom silicon is currently needlessly difficult. I’m also an unabashed supporter of auditable, privacy-respecting silicon.

Lastly, I’m just another programmer with a fancy camera working for a startup. The date on a page is when it was first written, not when it was last edited. Find my archived content here

For quick reference, here is the yosys manual as of July 26, 2021.

Just How Bad are Backdoors?


Some brief thoughts on backdoors and security. What are Backdoors? From MalwareBytes.com “A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application.” Backdoors are often installed by software or hardware makers as a deliberate means of gaining access to their technology after the fact.…
Read more ⟶

The Case for Auditability


Seeing is Believing Without the design files for your computer processor, how do you know that: A. it does only what you tell it to B. it respects your privacy You don’t. As of the time of writing, there are currently no modern auditable computer processors on the market. Backdoors An easy way to prove your system doesn’t have backdoors is to release it’s designs for extensive auditing. Auditing Auditing designs can sometimes take a lot of time, and a lot of capital.…
Read more ⟶