Doom entirely from DNS records

3 days ago (github.com)

To clarify, a good title would be "Loading Doom entirely from DNS records"

Neither one plays Doom over DNS nor is the first paragraph in the README correct, because DNS is only abused for storage, not for computing/processing/executing instructions:

> At some point, a reasonable person asked "DNS resolves names to IP addresses, what else can it do?" The answer, apparently, is run DOOM.

I never stop being impressed by these "<something-crazy> running Doom" posts. AFAIC, whenever we get to Mars, we won't truly have arrived until someone is playing Doom on Mars, and without wasting valuable resources by doing so. Running Doom, the canonical measurement of truly mastering a thing's capabilities.

Malware could still use DNS records for storage and access to bootstrapped payloads correct?

  • Yes, but it's not a problem, any more than downloading any arbitrary text is. You'd still have to have something execute the binary.

Gotta admit that it didn't occur to me that "can it run DOOM?" would stretch all the way to DNS.

At this point I am wondering if people will somehow port DOOM over to the MONIAC.

Super cool. Never thought of this. Would this be useful for seeding LLMs?

  • This is a data storage system, so I guess yes, data is useful to train LLMs?

    Why does everything get turned into an LLM discussion?