My needle on my BS-meter just snapped off.
My needle on my BS-meter just snapped off.
Somebody starts streaming VR porn on the same cell network. Latency drops to a second. Patient flatlines.
The future is here.
This is as useful as polling relatives on whether a couple should go through with a divorce.
“It also includes optimized support for Raspberry Pi SBCs to deliver enhanced performance and compatibility.”
Have you looked into the suid bit? You can set it on the file, then change the script owner to root and it runs in elevated mode: https://linuxhandbook.com/suid-sgid-sticky-bit/
The year is 2245. The heirs finally locate a working, antique reader that can handle the ancient USB key, hoping to find great-great-grandpa’s crypto-wallet or the pin-code to a long-lost Maltese bank account.
Instead, they find a 4-bit, VGA-quality scan of Miss October.
Haha. Thanks for checking. Given the C pre-processor, I’m sure there’s a way to maliciously bork it if someone sets their mind to it.
MSVC supports unicode. In C or C++, you could try:
#define ; ;
Second one is the greek semicolon but the client I’m using may strip it out. I’m too lazy to try.
Let’s not forget… the reason this type of licensing exists is because large cloud providers were taking a large code base and selling them as services . Often, the main path for the creators to make any money from their code is to offer a paid, managed tier, along with professional services. They would end up competing, and losing, against those cloud providers.
Not saying this kind of license is good or bad, but the reason is often not to stop self-hosting or screw contributors, but to maintain couple of the only pathways FOSS can bring in revenue.
Ignore them. Send a pull request with the full source of Arch Linux.
Be fun to see the same M3Max with an ad and tracker blocker. See how much their top line improves.
Non-competes have been null and void in California for some time. Employees can also recover attorney fees if someone tries to enforce one. It’s one of the reasons startups can be started here without fear of persecution by a previous employer.
It’s great to see this become national policy.
Most products should validate their assumptions before they even start laying down designs, code, or hardware. If it’s super cutting edge (like this one) there is a temptation to question the feedback and get into ‘build it and they will come’ mode.
But most of the time, testing with real users and validating the revenue model is the prudent path. Hopium is not a currency.
"You miss 100% of the shots you don’t take.”
– Wayne Gretzky
You can tell it’s fake because the robot vacuum doesn’t get hopelessly stuck on the edge of the rug.
Translation:
“My blog posts and vitamin enhancement pill business are not doing so well. Let me see if I can goose up outrage and get some attention.”
Host: “All right! Amen!”
The RP2040 solution was pretty clever. And that’s just for line sniffing. He can still add clock or crowbar glitching into the toolkit to work around more advanced defenses. This is something that car ECU hackers figured out a long time ago. There’s no software solution to work around that bit of nightmare. FWIW, ChipWhisperer can do all of these, including the synchronous sampling method used to fake a clock signal right out of the box.
As the piece mentions, setting a PIN can help, but all it does is annoy the user (who will likely choose something obvious and easy to remember) and transfer the problem to a simple dictionary attack.
The minute you put the security component in a separate module, you’ve opened yourself up to line-sniffing and MITM. And as soon as someone has physical access to a device, all bets are off.
'Last thing I remember
I was running for the door
I had to find the passage back to the place I was before
“Relax,” said the night man
"We are programmed to receive
You can check-out any time you like
But you can never leave!"’