If you think that I’m misunderstanding something and arguing from a false premise then please feel free to engage with the discussion.
If you think that I’m misunderstanding something and arguing from a false premise then please feel free to engage with the discussion.
I thought passkeys were supposed to be a hardware device?
This is typical embrace/extend/extinguish behavior from the large platforms that don’t want their web-SSO hegemony challenged because it would mean less data collection and less vendor lock-in.
The whole idea of passkeys provided by an online platform should have been ruled out by the specification. It completely defeats the purpose of passkeys which is that the user has everything they need to authenticate themself.
It’s pretty easy to check and see that this isn’t how it works. I checked both my instance and yours and both of them host the images that have been posted to communities on other instances, so clearly images are transferred (or cached) between instances.
Goodhart’s law is an adage often stated as, “When a measure becomes a target, it ceases to be a good measure”
Otherwise you start getting pushed around by other superpowers
This is more a coincidence of the status quo rather than a consequence of an inherent correlation between economic output and geopolitical power.
If you read the article, the described attack allows a man-in-the-middle attack on two devices while they are pairing.
This means that someone could intercept and modify your bluetooth mouse or keyboard inputs, resulting in complete compromise of the device they are connected to.
If you think that international diplomacy between nation states is like handling kids then you’re not a veteran diplomat either.
I’m no “veteran diplomat” but in my experience it is only the people without real power who make threats. When you have power, you don’t need to make threats. You just respond to events with whatever proportionate response is necessary and within your capability. You don’t need to provide a preview of what those responses will be.
Setting “red lines” looks to me like weakness because it is essentially a plea to the other side not to do those things that you don’t want them to do, and it invites them to push up to those red lines, do anything but, and test their boundaries to test your commitment to them.
Halt and Catch Fire
Then what you bought is not a mouse, it’s a proprietary peripheral that emulates a mouse when you install its propretary drivers.
You clicked the tree somewhere and it would tell you either to try again, or you would win something. I think most people who won got $5 and a monkey plush toy. I’m not sure anyone ever won the jackpot. You could just click over and over again trying to remember where you had previously clicked, like a treasure hunt. Meanwhile they’re showing banner ads on the page.
It worked using the ismap
attribute on the image which tells the browser to add the x,y coordinates of the user’s click to the link when fetching the result.
Does anyone remember the TreeLoot.com MoneyTree? It existed from 1998-2004 and looked like this:
I’m all in favor of going back to the old internet, but… not this.
Sorry, there’s no way Qualcomm is buying Intel as is
At the end of its third quarter of its fiscal 2024, […] Qualcomm had $7.8 billion in cash and […] just over $23 billion in total assets. That means Qualcomm, […] is almost certainly looking at a stock-for-stock transaction. As of writing, Qualcomm’s market cap is $188 billion, just more than double that of Intel’s at $93 billion.
In fact, Chipzilla may not be worth much to Qualcomm unless it can renegotiate the x86/x86-64 cross-licensing patent agreement between Intel and AMD, which dates back to 2009. That agreement is terminated if a change in control happens at either Intel or AMD.
While a number of the patents expired in 2021, it’s our understanding that agreement is still in force and Qualcomm would be subject to change of control rules. In other words, Qualcomm wouldn’t be able to produce Intel-designed x86-64 chips unless AMD gave the green light.
So your approach to security is that you cross your fingers and hope?
Ventoy has a lot of work to do if they want to earn our trust:
Remove BLOBs from the source tree #2795
This ticket has been open now for 5 months with no engagement from the maintainer.
Your install media and anything that modifies your EFI partition or UEFI firmware settings needs to be the most trusted part of your system. And here is Ventoy, a tool that looks open source and then includes a large number of binary blobs in its repository, with no indication of how they were compiled. This is horrible security practice and for me that’s enough for me to never use it.
You can also see a discussion on the subject on HN here: https://news.ycombinator.com/item?id=40689629
A much better alternative, if you want a multi-boot USB, is GLIM: https://github.com/thias/glim
It’s just a collection of Grub configs, so very simple and easy to audit.
From my understanding, a lot of code in the graphics drivers is special-case handling for specific games to optimize for the way that the game uses the APIs. Is this correct?
In which case it would make sense to have the game-specific code loaded dynamically when that game is launched, since 99.99% of the game specific code will be for games that the user never runs.
they can’t be jammed the way radio can.
I wonder how well these satellite laser links do with various types of cloud cover.
Did you read the article?